Analysis

  • max time kernel
    149s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27-10-2022 09:13

General

  • Target

    Ref671005018.xls

  • Size

    232KB

  • MD5

    169f284d5cb718718ef756d97e962d66

  • SHA1

    f83c9e72f5d03e30e8d99b8ac3a7ea9e3ab98960

  • SHA256

    f9068e24dc32b9314c21966284886537051e1ea8b7044772489a99c4906925af

  • SHA512

    fd82a9a0044be3eb01b95dd5de63b0ac57072cf67fc2959ac1180f22f7ed5375ba9178e37b2fe3c2ddabe883aadb90e85d77c19406af1c5c41861d2d4bd34c26

  • SSDEEP

    6144:yk3hOdsylKlgryzc4bNhZF+E+W2knA1ADM/NuNNFNNXNNuNNdNNPNNaNNbNNWNNb:GAcNuNNFNNXNNuNNdNNPNNaNNbNNWNNb

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Ref671005018.xls
    1⤵
    • Loads dropped DLL
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Users\Admin\AppData\Local\temp\6_910\gst.exe
        "C:\Users\Admin\AppData\Local\temp\6_910\gst.exe" Saint-Étienne-du-Mont is a church located on the Montagne Sainte-Geneviève
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1408
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\9_105\pmsg.vbe"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1628
          • C:\Users\Admin\AppData\Local\Temp\9_105\akfng.exe
            "C:\Users\Admin\AppData\Local\Temp\9_105\akfng.exe" whofhgk.sos
            5⤵
            • Executes dropped EXE
            • Drops startup file
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1576
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              6⤵
                PID:1720
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\6_910\npssxoovaq.vbe"
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1692
          • C:\Users\Admin\AppData\Local\Temp\6_910\ddkvmcjj.exe
            "C:\Users\Admin\AppData\Local\Temp\6_910\ddkvmcjj.exe" cjnm.edm
            4⤵
            • Executes dropped EXE
            PID:1580

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\6_910\ddkvmcjj.exe

      Filesize

      911KB

      MD5

      81221edd11b5995e95e971646d9653c0

      SHA1

      f1b09d14995f24270af8d67050b4e5a38de074f3

      SHA256

      c809f3429bcc2c666d4b6135c720c8df30ff1ede2f76e73308b82202bd904a6f

      SHA512

      6780988267df3368e3aec9d1a58c7a9700117b6439bf9545291417cc490ed069ef6068d682138fe870093dab6c8a389a1b5f1256e21c103eb4681b1ac236248a

    • C:\Users\Admin\AppData\Local\Temp\6_910\ddkvmcjj.exe

      Filesize

      911KB

      MD5

      81221edd11b5995e95e971646d9653c0

      SHA1

      f1b09d14995f24270af8d67050b4e5a38de074f3

      SHA256

      c809f3429bcc2c666d4b6135c720c8df30ff1ede2f76e73308b82202bd904a6f

      SHA512

      6780988267df3368e3aec9d1a58c7a9700117b6439bf9545291417cc490ed069ef6068d682138fe870093dab6c8a389a1b5f1256e21c103eb4681b1ac236248a

    • C:\Users\Admin\AppData\Local\Temp\6_910\gst.exe

      Filesize

      1.1MB

      MD5

      110281413953d3f0417e6444b0004644

      SHA1

      236630dbc2635dbcb704a78278892948ea224c5d

      SHA256

      046d38d00b4703467e142264a3b66bea51ed16ca07da98ccf410e90ddd6e95c2

      SHA512

      a8abd219c73f8742cff7ea7b3ac73bc7276c9040c2f6ba6d868029129fd95c04c5346534bd6a83f0dd32d7ee6b81b45c702958914557cffc87a355648de84f84

    • C:\Users\Admin\AppData\Local\Temp\9_105\akfng.exe

      Filesize

      915KB

      MD5

      303c86d5e26a663bdb09481f93be2e90

      SHA1

      b269a394afcf82a26150a8e16daa933176c1d3b2

      SHA256

      1f13ccb643426fc2b63d2b8492ffd29eb86eb5de53ce3a7f598823fb5311263f

      SHA512

      7c239f299d29ecd4015e8b53da93188dc814d135597e49b81178ac3da7be1faed8cf2eef41d3eb8b6bbd8f06e6e09fd49b3e0346f1bd3a5c5acca1703b6de955

    • C:\Users\Admin\AppData\Local\Temp\9_105\akfng.exe

      Filesize

      915KB

      MD5

      303c86d5e26a663bdb09481f93be2e90

      SHA1

      b269a394afcf82a26150a8e16daa933176c1d3b2

      SHA256

      1f13ccb643426fc2b63d2b8492ffd29eb86eb5de53ce3a7f598823fb5311263f

      SHA512

      7c239f299d29ecd4015e8b53da93188dc814d135597e49b81178ac3da7be1faed8cf2eef41d3eb8b6bbd8f06e6e09fd49b3e0346f1bd3a5c5acca1703b6de955

    • C:\Users\Admin\AppData\Local\Temp\9_105\qcmqueptsl.ppt

      Filesize

      59KB

      MD5

      aa511ad88b62774609eccded56fe6921

      SHA1

      bc7995786dd2f464ca72e472588d0d2f8441cba5

      SHA256

      e1411732032805d54c5c51af508764272d144bb559ca7e45dff1e036049c741d

      SHA512

      7ec89454e2b09cb0d1dc2cfb8e97e9ca3c27ff552e206d5069ad117c961f607644e2512ff7eb76d78c3ee429c4a044f32c44931e710ba8f600ce36e2b516e960

    • C:\Users\Admin\AppData\Local\Temp\9_105\whofhgk.sos

      Filesize

      79.3MB

      MD5

      111689a0b6b4f08522b7b577692c1001

      SHA1

      5e88d66c4e5d21676ed9f7117669efbda2e71778

      SHA256

      92a969067cee6fa37cbe337baaebf53a2a1912975f09be78ef90384eeda6deda

      SHA512

      f11d8d57295ddb7ae812abfb77cbea08227b1d4751e3d93a9e6c6af7e8d130a2621fc8b30a1bcd0a1a3c41220f89289c10591ab8a7a42b6e29657d377678fcf6

    • C:\Users\Admin\AppData\Local\Temp\9_105\xsmiqu.crn

      Filesize

      405KB

      MD5

      81db3971acf8ec7739e75f8861885f89

      SHA1

      2f2b8a2302c29e72a28697afa6b7728819469c8e

      SHA256

      4ce2fd6069f41e43443cc1666a24ebc9e02833b70ba407b6c343cd1c1a3acc3a

      SHA512

      b237c9d227d69a8d3f42428040e6e162f7868a932272ef48ac92616281bb2ec8f28bc071e248de6b9ce4d762f5f673eef2c362cafac4badc54fc8e08e1abef13

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      2.1MB

      MD5

      71bc3a380454c4bf0c29f7ce462f5a44

      SHA1

      13d0575bffee9c37a4bd83f9636b1f0cd028f975

      SHA256

      c3b54b1b12f48682ca31c77c5783db4c235268c52fcf11f2f7a3ee0364c9f8df

      SHA512

      03da38432163c1c5f4b063eae32933492b9f60e21f6016c0a1c5c27d46d447672002fe0b82fbb648f497c35549497c999a6f8f68dc2567d350f30bf1eb6db5aa

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      2.1MB

      MD5

      71bc3a380454c4bf0c29f7ce462f5a44

      SHA1

      13d0575bffee9c37a4bd83f9636b1f0cd028f975

      SHA256

      c3b54b1b12f48682ca31c77c5783db4c235268c52fcf11f2f7a3ee0364c9f8df

      SHA512

      03da38432163c1c5f4b063eae32933492b9f60e21f6016c0a1c5c27d46d447672002fe0b82fbb648f497c35549497c999a6f8f68dc2567d350f30bf1eb6db5aa

    • C:\Users\Admin\AppData\Local\temp\6_910\gst.exe

      Filesize

      1.1MB

      MD5

      110281413953d3f0417e6444b0004644

      SHA1

      236630dbc2635dbcb704a78278892948ea224c5d

      SHA256

      046d38d00b4703467e142264a3b66bea51ed16ca07da98ccf410e90ddd6e95c2

      SHA512

      a8abd219c73f8742cff7ea7b3ac73bc7276c9040c2f6ba6d868029129fd95c04c5346534bd6a83f0dd32d7ee6b81b45c702958914557cffc87a355648de84f84

    • C:\Users\Admin\AppData\Local\temp\6_910\npssxoovaq.vbe

      Filesize

      28KB

      MD5

      e84f87dacfb7eb1b00eeec1aaac1d4cf

      SHA1

      b263f4462b1d3ecb6e0dfeae04ef6dadd96f608c

      SHA256

      c91dc9fae6dbf85acddcba2c0966de01d6a48e56a779488fec5731e6fda2e242

      SHA512

      a0449c4648f2e7356c9334fc0d7b6c201e7e646661e444d53961b6c9b847e7b53a772e06fb7be25f26019b70b78f51d67120fb2ee70ff7eee561526d2b3917c9

    • C:\Users\Admin\AppData\Local\temp\9_105\pmsg.vbe

      Filesize

      32KB

      MD5

      dbeb963635b0737ceca13c7f9bc566d7

      SHA1

      10b6334645131d81b311c71eca7a8f9ccde127d1

      SHA256

      01299ecd0169896c320e2690a782a45a7e8f2d94cbc221dbe153ceb694febbe6

      SHA512

      b48d909051ecbb73ab47c89fcfee3cbdb9a08c5a246e3e0ec4780e64e402e01d16ff2f2fa3025bc11f2efaaf28b47496aa83f1957db8d131e9ea8e7a20bef3d9

    • \Users\Admin\AppData\Local\Temp\6_910\ddkvmcjj.exe

      Filesize

      911KB

      MD5

      81221edd11b5995e95e971646d9653c0

      SHA1

      f1b09d14995f24270af8d67050b4e5a38de074f3

      SHA256

      c809f3429bcc2c666d4b6135c720c8df30ff1ede2f76e73308b82202bd904a6f

      SHA512

      6780988267df3368e3aec9d1a58c7a9700117b6439bf9545291417cc490ed069ef6068d682138fe870093dab6c8a389a1b5f1256e21c103eb4681b1ac236248a

    • \Users\Admin\AppData\Local\Temp\6_910\gst.exe

      Filesize

      1.1MB

      MD5

      110281413953d3f0417e6444b0004644

      SHA1

      236630dbc2635dbcb704a78278892948ea224c5d

      SHA256

      046d38d00b4703467e142264a3b66bea51ed16ca07da98ccf410e90ddd6e95c2

      SHA512

      a8abd219c73f8742cff7ea7b3ac73bc7276c9040c2f6ba6d868029129fd95c04c5346534bd6a83f0dd32d7ee6b81b45c702958914557cffc87a355648de84f84

    • \Users\Admin\AppData\Local\Temp\6_910\gst.exe

      Filesize

      1.1MB

      MD5

      110281413953d3f0417e6444b0004644

      SHA1

      236630dbc2635dbcb704a78278892948ea224c5d

      SHA256

      046d38d00b4703467e142264a3b66bea51ed16ca07da98ccf410e90ddd6e95c2

      SHA512

      a8abd219c73f8742cff7ea7b3ac73bc7276c9040c2f6ba6d868029129fd95c04c5346534bd6a83f0dd32d7ee6b81b45c702958914557cffc87a355648de84f84

    • \Users\Admin\AppData\Local\Temp\6_910\gst.exe

      Filesize

      1.1MB

      MD5

      110281413953d3f0417e6444b0004644

      SHA1

      236630dbc2635dbcb704a78278892948ea224c5d

      SHA256

      046d38d00b4703467e142264a3b66bea51ed16ca07da98ccf410e90ddd6e95c2

      SHA512

      a8abd219c73f8742cff7ea7b3ac73bc7276c9040c2f6ba6d868029129fd95c04c5346534bd6a83f0dd32d7ee6b81b45c702958914557cffc87a355648de84f84

    • \Users\Admin\AppData\Local\Temp\9_105\akfng.exe

      Filesize

      915KB

      MD5

      303c86d5e26a663bdb09481f93be2e90

      SHA1

      b269a394afcf82a26150a8e16daa933176c1d3b2

      SHA256

      1f13ccb643426fc2b63d2b8492ffd29eb86eb5de53ce3a7f598823fb5311263f

      SHA512

      7c239f299d29ecd4015e8b53da93188dc814d135597e49b81178ac3da7be1faed8cf2eef41d3eb8b6bbd8f06e6e09fd49b3e0346f1bd3a5c5acca1703b6de955

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      2.1MB

      MD5

      71bc3a380454c4bf0c29f7ce462f5a44

      SHA1

      13d0575bffee9c37a4bd83f9636b1f0cd028f975

      SHA256

      c3b54b1b12f48682ca31c77c5783db4c235268c52fcf11f2f7a3ee0364c9f8df

      SHA512

      03da38432163c1c5f4b063eae32933492b9f60e21f6016c0a1c5c27d46d447672002fe0b82fbb648f497c35549497c999a6f8f68dc2567d350f30bf1eb6db5aa

    • memory/1408-92-0x0000000000000000-mapping.dmp

    • memory/1428-85-0x0000000000000000-mapping.dmp

    • memory/1576-107-0x0000000000000000-mapping.dmp

    • memory/1580-105-0x0000000000000000-mapping.dmp

    • memory/1628-99-0x0000000000000000-mapping.dmp

    • memory/1692-94-0x0000000000000000-mapping.dmp

    • memory/2032-68-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-67-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-81-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-83-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-82-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-79-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-78-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-76-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-77-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-75-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-74-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-71-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-72-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-73-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-70-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-69-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-54-0x000000002F211000-0x000000002F214000-memory.dmp

      Filesize

      12KB

    • memory/2032-80-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-66-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-65-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-64-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-63-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-59-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-60-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-61-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-62-0x0000000000451000-0x000000000045C000-memory.dmp

      Filesize

      44KB

    • memory/2032-58-0x00000000766D1000-0x00000000766D3000-memory.dmp

      Filesize

      8KB

    • memory/2032-57-0x0000000072ACD000-0x0000000072AD8000-memory.dmp

      Filesize

      44KB

    • memory/2032-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2032-114-0x0000000072ACD000-0x0000000072AD8000-memory.dmp

      Filesize

      44KB

    • memory/2032-55-0x0000000071AE1000-0x0000000071AE3000-memory.dmp

      Filesize

      8KB

    • memory/2032-116-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2032-117-0x0000000072ACD000-0x0000000072AD8000-memory.dmp

      Filesize

      44KB