Resubmissions

19-03-2023 18:05

230319-wpjcdsbf4x 10

04-07-2022 18:06

220704-wprzjaaegl 10

Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-03-2023 18:05

General

  • Target

    MV. NEW BRIDGE (EX THORCO SVENDBORG)..xll

  • Size

    1.7MB

  • MD5

    e772d046be7fbfbe96e90eca5ab20566

  • SHA1

    286d9bcf13c0cb309f9041f2ea03e5ce99848669

  • SHA256

    92c7146dd4dd24206b2c0b9dee831bdd772eced8b8d5c67b3b73e31bababea82

  • SHA512

    4c79623f6c7c557169da85715e69f387ef2d98a16ab35516768ef921e65e791d1301d2574a6703b1e7c9fb6902d69bef341908294ba31469e57321533de70103

  • SSDEEP

    24576:G7wsfP/WNl5dgI/XvETj7g+bWfqHnm9yX1eeXqmqBXQ:G7T3WNdnn+gryHnmqXqm

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\MV. NEW BRIDGE (EX THORCO SVENDBORG)..xll"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /C certutil -decode C:\Users\Admin\Downloads\appXMNGZCDUPG.txt C:\Users\Admin\Downloads\appXMNGZCDUPG.txt.xlsx
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1020
      • C:\Windows\system32\certutil.exe
        certutil -decode C:\Users\Admin\Downloads\appXMNGZCDUPG.txt C:\Users\Admin\Downloads\appXMNGZCDUPG.txt.xlsx
        3⤵
          PID:1368
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /C certutil -decode C:\Users\Admin\Downloads\appXMNGZCDUPG.txt C:\Users\Admin\Downloads\appXMNGZCDUPG.txt.exe &
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:3568
        • C:\Windows\system32\certutil.exe
          certutil -decode C:\Users\Admin\Downloads\appXMNGZCDUPG.txt C:\Users\Admin\Downloads\appXMNGZCDUPG.txt.exe
          3⤵
            PID:3376
        • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
          "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 5412
          2⤵
          • Process spawned suspicious child process
          • Suspicious use of WriteProcessMemory
          PID:1660
          • C:\Windows\system32\dwwin.exe
            C:\Windows\system32\dwwin.exe -x -s 5412
            3⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            PID:2416

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\MV. NEW BRIDGE (EX THORCO SVENDBORG)..xll
        Filesize

        1.7MB

        MD5

        e772d046be7fbfbe96e90eca5ab20566

        SHA1

        286d9bcf13c0cb309f9041f2ea03e5ce99848669

        SHA256

        92c7146dd4dd24206b2c0b9dee831bdd772eced8b8d5c67b3b73e31bababea82

        SHA512

        4c79623f6c7c557169da85715e69f387ef2d98a16ab35516768ef921e65e791d1301d2574a6703b1e7c9fb6902d69bef341908294ba31469e57321533de70103

      • C:\Users\Admin\AppData\Local\Temp\MV. NEW BRIDGE (EX THORCO SVENDBORG)..xll
        Filesize

        1.7MB

        MD5

        e772d046be7fbfbe96e90eca5ab20566

        SHA1

        286d9bcf13c0cb309f9041f2ea03e5ce99848669

        SHA256

        92c7146dd4dd24206b2c0b9dee831bdd772eced8b8d5c67b3b73e31bababea82

        SHA512

        4c79623f6c7c557169da85715e69f387ef2d98a16ab35516768ef921e65e791d1301d2574a6703b1e7c9fb6902d69bef341908294ba31469e57321533de70103

      • C:\Users\Admin\Downloads\appXMNGZCDUPG.txt
        Filesize

        24KB

        MD5

        fbefbe8ae4a09ba8018b2d7ff9143f3e

        SHA1

        c03cd7561d6a64f754c65bda8faa5a434eb04e0b

        SHA256

        881a15d10e000d20b2179290d340e1234f46301569f19e34fe06f82f37cb32c8

        SHA512

        490167845d6930e10339e83a5e60181e78a718b8975eccb6bb104467020b4fd4b080be20e463e5bfe681549e843999a2b90b3f48db737229e8a0bdc198af7189

      • C:\Users\Admin\Downloads\appXMNGZCDUPG.txt
        Filesize

        58B

        MD5

        759d88148f2999ed1b1db44c9b1be24d

        SHA1

        6a427759e0dfb9ebc2826a239dd3c7ffb2d39a36

        SHA256

        22a3bb08dd922fa426a32104fb211b5b6897f286913f74e349c55dcec45e307c

        SHA512

        0b3c1cbc98c7f6839b7654f80037e5efd0ea06a62ef3afb52423d27cd283aee4b844befed5fb0f1f65f89fe472a455a255f911e9a296206758e53666fdd5d852

      • C:\Users\Admin\Downloads\appXMNGZCDUPG.txt.xlsx
        Filesize

        18KB

        MD5

        aea065e068a1c885c5c82b9da16de628

        SHA1

        f6c1af23d9e30b77160bf0da4f56eaef94d853c1

        SHA256

        fcd49a887692286cd815e911fd667f9323152c4d13e37020f065aabd023ab0ca

        SHA512

        092247866bca90694c95e7d1db658baba7fd88c192fd8e2c132de896541b3a09b74b17055022dbb03789814a0a31c3ae57072e6ef6f3c88f2cd23c0ca8275c8a

      • memory/1660-179-0x00007FFA7F050000-0x00007FFA7F060000-memory.dmp
        Filesize

        64KB

      • memory/1660-178-0x00007FFA7F050000-0x00007FFA7F060000-memory.dmp
        Filesize

        64KB

      • memory/1660-177-0x00007FFA7F050000-0x00007FFA7F060000-memory.dmp
        Filesize

        64KB

      • memory/1660-176-0x00007FFA7F050000-0x00007FFA7F060000-memory.dmp
        Filesize

        64KB

      • memory/2292-138-0x00007FFA7CFF0000-0x00007FFA7D000000-memory.dmp
        Filesize

        64KB

      • memory/2292-148-0x0000015352BA0000-0x0000015352BB0000-memory.dmp
        Filesize

        64KB

      • memory/2292-149-0x0000015352BA0000-0x0000015352BB0000-memory.dmp
        Filesize

        64KB

      • memory/2292-150-0x0000015352BA0000-0x0000015352BB0000-memory.dmp
        Filesize

        64KB

      • memory/2292-151-0x0000015352BA0000-0x0000015352BB0000-memory.dmp
        Filesize

        64KB

      • memory/2292-152-0x0000015352BA0000-0x0000015352BB0000-memory.dmp
        Filesize

        64KB

      • memory/2292-144-0x0000015351030000-0x0000015351203000-memory.dmp
        Filesize

        1.8MB

      • memory/2292-139-0x00007FFA7CFF0000-0x00007FFA7D000000-memory.dmp
        Filesize

        64KB

      • memory/2292-133-0x00007FFA7F050000-0x00007FFA7F060000-memory.dmp
        Filesize

        64KB

      • memory/2292-137-0x00007FFA7F050000-0x00007FFA7F060000-memory.dmp
        Filesize

        64KB

      • memory/2292-136-0x00007FFA7F050000-0x00007FFA7F060000-memory.dmp
        Filesize

        64KB

      • memory/2292-135-0x00007FFA7F050000-0x00007FFA7F060000-memory.dmp
        Filesize

        64KB

      • memory/2292-134-0x00007FFA7F050000-0x00007FFA7F060000-memory.dmp
        Filesize

        64KB