Analysis

  • max time kernel
    51s
  • max time network
    54s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2022 23:04

General

  • Target

    xlsKami_infect.xls

  • Size

    19KB

  • MD5

    cdeb779d95c6f19cf390d4dbadf12297

  • SHA1

    dd10513aa939df318e5bc20bf8a8858384c6fd39

  • SHA256

    8a4359a260e1aed19c98ad412cbd082575376099a401236c2281457287fc41ae

  • SHA512

    feec736a9ebd84550a51842511d18434c76d7bd7f12571ef34221a02d17b9bd3238727476c9430cb7b3def56d7198e7660e8e1f751cf7f35701dd97562ec4f44

  • SSDEEP

    384:mf5H+k3hOdsylLOlyvxopeiJTNhZFGzETqcL44KgltBAWs1iSo7KlIl9:wh+k3hOdsylKlgxopeiBNhZFGzE+cL4w

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://github.com/cyberisltd/NcatPortable/raw/master/ncat.exe

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\xlsKami_infect.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
      "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 4340
      2⤵
      • Process spawned suspicious child process
      • Suspicious use of WriteProcessMemory
      PID:328
      • C:\Windows\system32\dwwin.exe
        C:\Windows\system32\dwwin.exe -x -s 4340
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:936
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2708 -s 4376
      2⤵
      • Process spawned unexpected child process
      • Program crash
      PID:4684
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 468 -p 2708 -ip 2708
    1⤵
      PID:1840

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/328-149-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

      Filesize

      64KB

    • memory/328-148-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

      Filesize

      64KB

    • memory/328-147-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

      Filesize

      64KB

    • memory/328-146-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

      Filesize

      64KB

    • memory/2708-135-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

      Filesize

      64KB

    • memory/2708-138-0x00007FFA93F80000-0x00007FFA93F90000-memory.dmp

      Filesize

      64KB

    • memory/2708-137-0x00007FFA93F80000-0x00007FFA93F90000-memory.dmp

      Filesize

      64KB

    • memory/2708-136-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

      Filesize

      64KB

    • memory/2708-132-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

      Filesize

      64KB

    • memory/2708-134-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

      Filesize

      64KB

    • memory/2708-133-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

      Filesize

      64KB