Analysis

  • max time kernel
    238s
  • max time network
    286s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2023 19:21

General

  • Target

    Cancellation_Letter_1890704928-02242021.xls

  • Size

    143KB

  • MD5

    0d77e619d3652249d3424f46650d85b5

  • SHA1

    62983f38e8a5275e3ac30f8a76e8886291c6fd7a

  • SHA256

    e6ea08afb1528f524fd091fae173be6aec7d4a02ea13725c547314df7dceff4d

  • SHA512

    9fd82d78380816b481b3eb1f1108832e098ce9286e3cc62a7a11931fbdf4047e5ca13023bf4618b5a4f7674b88197eadc1100e81a9965a18c1bda356767182a8

  • SSDEEP

    3072:6cPiTQAVW/89BQnmlcGvgZ6Gr3J8YUOMFt/BI/s/C/i/R/7/3/UQ/OhP/2/a/1/v:6cPiTQAVW/89BQnmlcGvgZ7r3J8YUOMK

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://sumonpro.xyz/nseoqnwbbvmc/44955850889583300000.dat

xlm40.dropper

http://vngkinderopvang.nl/rmyjq/44955850889583300000.dat

xlm40.dropper

http://stadt-fuchs.net/gwixglx/44955850889583300000.dat

xlm40.dropper

http://hdmedia.pro/noexyryqori/44955850889583300000.dat

xlm40.dropper

http://www.fernway.com/xjhuljbqv/44955850889583300000.dat

Signatures

  • Process spawned unexpected child process 5 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Cancellation_Letter_1890704928-02242021.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 ..\GDAS.UKDSR,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:796
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 ..\GDAS.UKDSR1,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:1340
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 ..\GDAS.UKDSR2,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:1556
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 ..\GDAS.UKDSR3,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:948
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 ..\GDAS.UKDSR4,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:2040

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\GDAS.UKDSR3
    Filesize

    24KB

    MD5

    2f977d5872cb7eb7a560eb0b0a540baf

    SHA1

    c8e2d0134632884763d3922bdae5d1245207259c

    SHA256

    3b8a21beff2c38dad1d682f7876cf1233fd7a8325b99292400828b6d9c4b3c38

    SHA512

    15f89220c95de08df80eeabf3acbfed6490e43df568d3869bf39677819ff017f68a64c986c2bd86aa39b13ad96317f84fcdb6a51e2f1bdb54c3992862b309b69

  • memory/796-59-0x0000000000000000-mapping.dmp
  • memory/948-65-0x0000000000000000-mapping.dmp
  • memory/1032-54-0x000000002FA61000-0x000000002FA64000-memory.dmp
    Filesize

    12KB

  • memory/1032-55-0x0000000070E01000-0x0000000070E03000-memory.dmp
    Filesize

    8KB

  • memory/1032-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1032-57-0x0000000071DED000-0x0000000071DF8000-memory.dmp
    Filesize

    44KB

  • memory/1032-58-0x0000000075441000-0x0000000075443000-memory.dmp
    Filesize

    8KB

  • memory/1340-61-0x0000000000000000-mapping.dmp
  • memory/1556-63-0x0000000000000000-mapping.dmp
  • memory/2040-68-0x0000000000000000-mapping.dmp