Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2023, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
PO NO 6101588039.xlsx.exe
Resource
win7-20230220-en
General
-
Target
PO NO 6101588039.xlsx.exe
-
Size
1.2MB
-
MD5
ffca4cedcb2ac0c1b112b906b70ce798
-
SHA1
989abb84c0dd85c605778e1cf501265abfda5556
-
SHA256
d9cad53c2d0fbb0e6877167367a7a5c5f1ea2530d58848c72088a08550612276
-
SHA512
1310514f05bf112e64eefe8beafffbe1b637efad4d4af390d827f84081f20d9ee61340980d946dff21eaf9838cd86db30dc8f66e9d708eae83d1671214b0214d
-
SSDEEP
24576:1A6aT24MVkeYVNfGzA7IBhZKOIwafE43f3:16BnVhGzAOj9IjEs
Malware Config
Extracted
formbook
g44n
t60gB4YRvsDLttd9HG4=
xck8G7COQ+g7VIpX
BQQF3mmpLPskhQ==
eLWwmzNyK6ee+nF1jDvvkxuSGA==
3tlgNOzw8BBjpNOQMnc=
nOpNEJhoU0h+00S9E1YfgA==
xcvTpljkjIyEdvhp+VcGFtJC
bZxOHr5CtzY4
rOD304X0u1DN/m7cbA==
Knixl0HJyEOOiNckwk8GFtJC
S4JMDRNTUAol
Vp9wSwNZSfY7VIpX
0Nf/zlrpmpahnM+tpkYGFtJC
joXsuHiBcVp88DHEHMA7
yN8i9ppoZYHSSaqqk6NZnQ==
4UFEMfyKhSB4UovzjdabqolwhFtMH1M=
d3RiRcXCeR8wlgjEHMA7
eMUS8PSBPCe2rPg=
LCsR0X328UuSAmlf
/keifSXopayqjLt1EWQ=
x8Hdn0pOACh11lPPYXo=
NXkuHKtxYYAXG3hA
d5dE59banPxMmA==
0vJUL/UPu1HN/m7cbA==
cG3LiYu7/OkmhQ==
kcFYNbltO4XkzzLEHMA7
c3now24l3wQX9EW8E1YfgA==
6kE4FbVNNTmvwBldAWY=
KzTXxYN5AlmUlfA=
pN03EpAPvdoG3td9HG4=
HFxFE8xVAzYdmOSoxIRGsGfPrq2RWw==
QKMj+KSybRYojwTEHMA7
PYRSDRNTUAol
OU/wwlhkGLrLFHx6Y4tNmQ==
5SOc+gRCtzY4
Wpm/fyDn4/3+CVe5E1YfgA==
dYOdeSmnq2BbpQLEHMA7
5vBBzXlHCp/yEEZBRKetUjQ52IU0yTJk
bbmih0CBPMgoE2DLXmVpeGo=
4S2wkRvbxeLo00C8WmVpeGo=
uECyFReWXAol
jNu+mzKEhkrN/m7cbA==
4gAT76Z35fIJDFm5E1YfgA==
qADJh1HW2aS+D2Q1E1YfgA==
dcvSv2utZ/AJgMdevpFTnQ==
JTfVqz447pqn6T42UST9jGfPrq2RWw==
iY+7qTKHfAfwUMO7yWj3my2YHA==
WmeZXSgwNX67nd5C2U4GFtJC
7P/CoUpIP1lWSI3ch/yAAIOwONni
5+eJT9fhjh9hv9+SMWw=
Y3Z/PQTQl7DjzUC9SmVpeGo=
EiBDCpcTF6v40SzEHMA7
P2sC6LDSgQA7VIpX
5eWOfxDRj6Pp4VDbY2VpeGo=
dsEE1oKWIEAv
Ua2MVQydVIHU0DXEHMA7
hNkQ540Z0sNCG25K
b4tOMMbN0uY5lt+32djuHPtxAw==
teuvevj8CyJw4EUsE1YfgA==
tNsZ75ZlU1WpFoCBm1RaVsvskzc=
aLsI8IQZ0uL0yNd9HG4=
RUPKsWJ0gHa5LI2Nj0P5cFDOnsZ1AC62uw==
P5f+1WAqKEOSIzw7ZA==
Mdxb0fR4Aa8Zdu8=
carolinerosenstein.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation PO NO 6101588039.xlsx.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2656 set thread context of 4080 2656 PO NO 6101588039.xlsx.exe 92 PID 4080 set thread context of 3176 4080 PO NO 6101588039.xlsx.exe 49 PID 1272 set thread context of 3176 1272 ipconfig.exe 49 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1272 ipconfig.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 ipconfig.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4080 PO NO 6101588039.xlsx.exe 4080 PO NO 6101588039.xlsx.exe 4080 PO NO 6101588039.xlsx.exe 4080 PO NO 6101588039.xlsx.exe 4080 PO NO 6101588039.xlsx.exe 4080 PO NO 6101588039.xlsx.exe 4080 PO NO 6101588039.xlsx.exe 4080 PO NO 6101588039.xlsx.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3176 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 4080 PO NO 6101588039.xlsx.exe 4080 PO NO 6101588039.xlsx.exe 4080 PO NO 6101588039.xlsx.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe 1272 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 4080 PO NO 6101588039.xlsx.exe Token: SeDebugPrivilege 1272 ipconfig.exe Token: SeShutdownPrivilege 3176 Explorer.EXE Token: SeCreatePagefilePrivilege 3176 Explorer.EXE Token: SeShutdownPrivilege 3176 Explorer.EXE Token: SeCreatePagefilePrivilege 3176 Explorer.EXE Token: SeShutdownPrivilege 3176 Explorer.EXE Token: SeCreatePagefilePrivilege 3176 Explorer.EXE Token: SeShutdownPrivilege 3176 Explorer.EXE Token: SeCreatePagefilePrivilege 3176 Explorer.EXE Token: SeShutdownPrivilege 3176 Explorer.EXE Token: SeCreatePagefilePrivilege 3176 Explorer.EXE Token: SeShutdownPrivilege 3176 Explorer.EXE Token: SeCreatePagefilePrivilege 3176 Explorer.EXE Token: SeShutdownPrivilege 3176 Explorer.EXE Token: SeCreatePagefilePrivilege 3176 Explorer.EXE Token: SeShutdownPrivilege 3176 Explorer.EXE Token: SeCreatePagefilePrivilege 3176 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3176 Explorer.EXE 3176 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2656 wrote to memory of 4080 2656 PO NO 6101588039.xlsx.exe 92 PID 2656 wrote to memory of 4080 2656 PO NO 6101588039.xlsx.exe 92 PID 2656 wrote to memory of 4080 2656 PO NO 6101588039.xlsx.exe 92 PID 2656 wrote to memory of 4080 2656 PO NO 6101588039.xlsx.exe 92 PID 2656 wrote to memory of 4080 2656 PO NO 6101588039.xlsx.exe 92 PID 2656 wrote to memory of 4080 2656 PO NO 6101588039.xlsx.exe 92 PID 3176 wrote to memory of 1272 3176 Explorer.EXE 93 PID 3176 wrote to memory of 1272 3176 Explorer.EXE 93 PID 3176 wrote to memory of 1272 3176 Explorer.EXE 93 PID 1272 wrote to memory of 2760 1272 ipconfig.exe 95 PID 1272 wrote to memory of 2760 1272 ipconfig.exe 95 PID 1272 wrote to memory of 2760 1272 ipconfig.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\PO NO 6101588039.xlsx.exe"C:\Users\Admin\AppData\Local\Temp\PO NO 6101588039.xlsx.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\PO NO 6101588039.xlsx.exe"C:\Users\Admin\AppData\Local\Temp\PO NO 6101588039.xlsx.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2760
-
-