Analysis

  • max time kernel
    270s
  • max time network
    260s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2022, 21:10

General

  • Target

    ACH _WIRE REMITTANCE .xlsx

  • Size

    928KB

  • MD5

    806058f890f150b2c126f55c7dbb9b4d

  • SHA1

    4e46a797be8f83f7834bef9c4cd207020c22db2b

  • SHA256

    6d34d8dd2745afc2da57a3244fbb1417a3b0bae4ff41cd4bdc609274bac2a378

  • SHA512

    ab2dcdc57acd0b408595cb6cab5c03d57d2dbb7b21eda50f298dfa09b3f5856f520c29bbff419544b56dabf9a6deeb25a14a478962318854c17f4a3ab592fa44

  • SSDEEP

    24576:w0Pmg3wILJ4cccOY60EP4GTPJLEvMxqob7mwS7da:wEX3wWWcVOz0EP4GTBgw87I

Score
10/10

Malware Config

Signatures

  • Detected google phishing page
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\ACH _WIRE REMITTANCE .xlsx"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1768
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://accounts.google.com/v3/signin/identifier?dsh=S369351957%3A1667337117777230&continue=https%3A%2F%2Fsites.google.com%2Famricalturs.net%2F34323888%2Fhome&followup=https%3A%2F%2Fsites.google.com%2Famricalturs.net%2F34323888%2Fhome&osid=1&passive=1209600&flowName=WebLiteSignIn&flowEntry=ServiceLogin&ifkv=AQDHYWpqwVLgOVy2ndOCyhR-Wc3_9-qApV8InGT5RKeBUBzGG9klpswn-bLkx7kFKYkEoSloUS331g
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:872
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:872 CREDAT:275457 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1624

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      1KB

      MD5

      554eb57f7b7bd72af4b71f00daa127ac

      SHA1

      5685557552cfaf2ada736c88f878153cdcbc414c

      SHA256

      89f15723fa6db6c294246ff7e1df9cf2ae10f65d6968783e78c0fc1604ad97b9

      SHA512

      f4172284cdb637bbf6f6db6be66714ff9860b4f27512864c0f103b09228745d8487eceb07c47e328caf139908c9b49bc2f189729c930ff6be4603807e2f45852

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

      Filesize

      724B

      MD5

      f569e1d183b84e8078dc456192127536

      SHA1

      30c537463eed902925300dd07a87d820a713753f

      SHA256

      287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413

      SHA512

      49553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_EECB9A4360A2BD97C637E7B1C93B0D6F

      Filesize

      472B

      MD5

      daeb2082848a80d4b48e39594e791c03

      SHA1

      d6df43f31f36c80237cd360fdd57ef1a65ecba68

      SHA256

      df576dc713aed51606736179bb5ee625c556821049d5968529d2a4a74ee9d650

      SHA512

      a5b10f7febaac970ee79f6fbbecde45d4b67fbd6d68c9aaf8210300fa65e6dd02e31635cd978cec60dfb10ff881705d3f694041ad8cb3eba8664d43464cca756

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      9d8e8ed1884d896a9b18031bea5934ca

      SHA1

      d3ddf3eccf70766729e5d3f4ae4356607ef75ad1

      SHA256

      f82f12d9b5587e80ffcff4ef260a431298abbc1ea52f65a4070ab45876e7ecc3

      SHA512

      dd882dc36f0947c3fdea934cc1d73f98ca419548a217a13aec406eb065ab1f362931395c5f0c9c2199719e5bfb8b7fcbb8f89740c2d16a9f11cb0143861d1d6d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      340B

      MD5

      c2f1f5b1fd5bab0cdc44d642009fe6c4

      SHA1

      d0f38a8e33865c1986922da607dfa1afc3a4bf1b

      SHA256

      2d910f1125ce19653c8a4ea64d864d313b35aafffa233fbf28b17457d385e29e

      SHA512

      0db358bc7ca56ca829f664c52d4f64806c6e46a6c4b475fe0bfb41becc98c9746768baf400f9493df333f2161101000d20e01553aa3314d9a55e7ba6b8277274

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

      Filesize

      392B

      MD5

      f41c08f85f922177816bdaaa35bd20eb

      SHA1

      77861fb42ab73719d36e8464f271bda2351a8494

      SHA256

      45a09b851657fa9d7b2c2fef8ec96a8fe2796ec4d3b4f7de0dafdc2223af0cd4

      SHA512

      44515b12f0c834e80795e79a77034ae4be9b0f1b9b65f5f7c9671e259cb3b39f60aec334136d4cba74437f39607f57e61680d641e7b4be0e99648ebb8e016142

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_EECB9A4360A2BD97C637E7B1C93B0D6F

      Filesize

      410B

      MD5

      33cfb54944cc2e601a83856508ccc414

      SHA1

      1fbd47829a976b368b5a5db4195fd43bd597b12f

      SHA256

      fd7188e861e51dce04d456e6c6ca86651afdc617a3bdaf7083f300fa14d00482

      SHA512

      d01b0d9367aecb1202a2356f66358f6110c0772c221526889b08786194f5a605b2b96c7a9ab0ce8d0bdd9d83bbf007605ebbd0bf8d6a63a51fff8f7927a249ea

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

      Filesize

      9KB

      MD5

      a22893aad9420f36ad2786c4f7b33b1d

      SHA1

      5bd3b21709d4da09df15ff6fe8da69bd821cfd7c

      SHA256

      d13fb8ee30684893ae53d61db38d79a58c07aeaf155423edf87835f101872e07

      SHA512

      fe52a1c2f0c4eb20c0e8c5004be3e1006ab194446d38ec4af3622103955089e7788e4e1ecf04253837b4cc4066285cf2ba681f58ec6524e3a713c30534ca4ac9

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\9ZE0I536.txt

      Filesize

      239B

      MD5

      310913af6f69c9b43a714a3b95ade0b5

      SHA1

      77bd200e28ff2d7ba530bfd727dfb2cdf29846b9

      SHA256

      25be9efd581c18a959a2d1760393b842511b169ffc2fe25f1a871dde2ee61344

      SHA512

      0bfad6988cb9e97d088d3616801e05af0f004c5dffefcdb1b8f3d0e97a917679d3e1b796f8c769f80ac518382bb68bb02a877b0da438dbc1f9d22ab036d8928b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\CK929K72.txt

      Filesize

      130B

      MD5

      fac695fb6411c9218b927be77bd997b7

      SHA1

      67932fbd0d318cfc5af74f0170cd2a4cf5d7241d

      SHA256

      1304dac684b6e529f81866f8ff42bc71504f0a25b1917b2b61ee6ff4c5400c9f

      SHA512

      6718f02b13113daa6d955ab77e35d60461a5c639b23280a937b7cbf6ef982e522171af446a457dd0bbc41a97c68e94afe19f523519a3a84161a1ab31cad1e82e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JBUQ319B.txt

      Filesize

      603B

      MD5

      6504cf186c03880a6a4042f187a4bfc0

      SHA1

      a7f159c21fc92e12790cd78512851e23030a94b8

      SHA256

      2569771f7c3e7278a05daad82c31304b693b1ad350591463e47fa7b7ce36ad80

      SHA512

      3f3b86a940fe74e77c7cdbd06cd688146cfe638d44b1ebe9051a162e8a47ae45e1d541d788a17d73974c5457544c2d71bef32246d74f2b2d422d7e1a7bb29fbf

    • memory/1768-61-0x000007FEFB831000-0x000007FEFB833000-memory.dmp

      Filesize

      8KB

    • memory/1980-54-0x000000002F671000-0x000000002F674000-memory.dmp

      Filesize

      12KB

    • memory/1980-59-0x00000000720BD000-0x00000000720C8000-memory.dmp

      Filesize

      44KB

    • memory/1980-58-0x00000000720BD000-0x00000000720C8000-memory.dmp

      Filesize

      44KB

    • memory/1980-57-0x0000000076031000-0x0000000076033000-memory.dmp

      Filesize

      8KB

    • memory/1980-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1980-55-0x00000000710D1000-0x00000000710D3000-memory.dmp

      Filesize

      8KB