Resubmissions

08-10-2022 00:17

221008-alen5seafl 10

07-10-2022 06:08

221007-gv6mjsbhhn 10

Analysis

  • max time kernel
    107s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2022 06:08

General

  • Target

    PKSJ Malware/1/VirusShare_0fea640a7da27f365b3675f73626b9c9.xls

  • Size

    937KB

  • MD5

    0fea640a7da27f365b3675f73626b9c9

  • SHA1

    fd4825f244e9c145486cb6930ad05695b9972668

  • SHA256

    64af94592f6707505fa6f42b58776c3635706a414e6362a92f707df84627679c

  • SHA512

    c9a10288762f3f5a3fdff17f8dd8560e7a884f1b83f405c2e85c6c86e42f69a30841c13aa0f2ecfc55aed42995d7aeb8fe40415e423ed0a306d2e7d00883dfbf

  • SSDEEP

    24576:h3zS0aqbCrxgFhFSQVB5DjDLG6/8otVBTN9s:K9Fo5VLDLGwTBT

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Signatures

  • TA505

    Cybercrime group active since 2015, responsible for families like Dridex and Locky.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\PKSJ Malware\1\VirusShare_0fea640a7da27f365b3675f73626b9c9.xls"
    1⤵
    • Loads dropped DLL
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1048

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\contract_.dll
    Filesize

    328KB

    MD5

    2b111f00ad27acb2e312c693e9901f54

    SHA1

    3af7391cb25b2ebcab1c5b014a61af7d4b718f1a

    SHA256

    90517af7a1a1a468bea6ea125f2f32ba021bfaa9593fda800067e1a47bc2228a

    SHA512

    73a022859d1874e57e51ed7780a656f3ee66cb9ddd14749adbe31f2e45c06af99b33ac465dfdb8ff32588d8f159e81682fb08721480a3b4e927d186c1e05cf78

  • memory/1048-68-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-101-0x0000000072A5D000-0x0000000072A68000-memory.dmp
    Filesize

    44KB

  • memory/1048-57-0x0000000072A5D000-0x0000000072A68000-memory.dmp
    Filesize

    44KB

  • memory/1048-58-0x0000000076171000-0x0000000076173000-memory.dmp
    Filesize

    8KB

  • memory/1048-59-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-60-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-61-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-62-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-63-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-64-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-65-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-66-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-103-0x0000000072A5D000-0x0000000072A68000-memory.dmp
    Filesize

    44KB

  • memory/1048-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1048-78-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-75-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-76-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-77-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-69-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-79-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-83-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-89-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-95-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB

  • memory/1048-55-0x0000000071A71000-0x0000000071A73000-memory.dmp
    Filesize

    8KB

  • memory/1048-100-0x0000000010000000-0x0000000010053000-memory.dmp
    Filesize

    332KB

  • memory/1048-54-0x000000002F8B1000-0x000000002F8B4000-memory.dmp
    Filesize

    12KB

  • memory/1048-102-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1048-67-0x000000000069A000-0x000000000069E000-memory.dmp
    Filesize

    16KB