Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2023 19:21

General

  • Target

    Cancellation_Letter_1890704928-02242021.xls

  • Size

    143KB

  • MD5

    0d77e619d3652249d3424f46650d85b5

  • SHA1

    62983f38e8a5275e3ac30f8a76e8886291c6fd7a

  • SHA256

    e6ea08afb1528f524fd091fae173be6aec7d4a02ea13725c547314df7dceff4d

  • SHA512

    9fd82d78380816b481b3eb1f1108832e098ce9286e3cc62a7a11931fbdf4047e5ca13023bf4618b5a4f7674b88197eadc1100e81a9965a18c1bda356767182a8

  • SSDEEP

    3072:6cPiTQAVW/89BQnmlcGvgZ6Gr3J8YUOMFt/BI/s/C/i/R/7/3/UQ/OhP/2/a/1/v:6cPiTQAVW/89BQnmlcGvgZ7r3J8YUOMK

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://sumonpro.xyz/nseoqnwbbvmc/44955848520486100000.dat

xlm40.dropper

http://vngkinderopvang.nl/rmyjq/44955848520486100000.dat

xlm40.dropper

http://stadt-fuchs.net/gwixglx/44955848520486100000.dat

xlm40.dropper

http://hdmedia.pro/noexyryqori/44955848520486100000.dat

xlm40.dropper

http://www.fernway.com/xjhuljbqv/44955848520486100000.dat

Signatures

  • Process spawned unexpected child process 5 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Cancellation_Letter_1890704928-02242021.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4208
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\GDAS.UKDSR,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:4044
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\GDAS.UKDSR1,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:4256
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\GDAS.UKDSR2,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:3516
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\GDAS.UKDSR3,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:3772
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\GDAS.UKDSR4,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:4816

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\GDAS.UKDSR3
    Filesize

    24KB

    MD5

    2f977d5872cb7eb7a560eb0b0a540baf

    SHA1

    c8e2d0134632884763d3922bdae5d1245207259c

    SHA256

    3b8a21beff2c38dad1d682f7876cf1233fd7a8325b99292400828b6d9c4b3c38

    SHA512

    15f89220c95de08df80eeabf3acbfed6490e43df568d3869bf39677819ff017f68a64c986c2bd86aa39b13ad96317f84fcdb6a51e2f1bdb54c3992862b309b69

  • memory/3516-141-0x0000000000000000-mapping.dmp
  • memory/3772-142-0x0000000000000000-mapping.dmp
  • memory/4044-139-0x0000000000000000-mapping.dmp
  • memory/4208-135-0x00007FFA45370000-0x00007FFA45380000-memory.dmp
    Filesize

    64KB

  • memory/4208-137-0x00007FFA42FA0000-0x00007FFA42FB0000-memory.dmp
    Filesize

    64KB

  • memory/4208-138-0x00007FFA42FA0000-0x00007FFA42FB0000-memory.dmp
    Filesize

    64KB

  • memory/4208-136-0x00007FFA45370000-0x00007FFA45380000-memory.dmp
    Filesize

    64KB

  • memory/4208-132-0x00007FFA45370000-0x00007FFA45380000-memory.dmp
    Filesize

    64KB

  • memory/4208-134-0x00007FFA45370000-0x00007FFA45380000-memory.dmp
    Filesize

    64KB

  • memory/4208-133-0x00007FFA45370000-0x00007FFA45380000-memory.dmp
    Filesize

    64KB

  • memory/4256-140-0x0000000000000000-mapping.dmp
  • memory/4816-144-0x0000000000000000-mapping.dmp