Overview
overview
10Static
static
10Challenge_...m.docx
windows7-x64
4Challenge_...1.docx
windows7-x64
4Challenge_...y.docx
windows7-x64
4Challenge_...1.docx
windows7-x64
4tools/numb...ing.py
windows7-x64
3oledump.py
windows7-x64
3plugin_biff.py
windows7-x64
3plugin_clsid.py
windows7-x64
3plugin_dridex.py
windows7-x64
3plugin_hifo.py
windows7-x64
3plugin_htt...ics.py
windows7-x64
3plugin_jumplist.py
windows7-x64
3plugin_linear.py
windows7-x64
3plugin_msg.py
windows7-x64
3plugin_msg_summary.py
windows7-x64
3plugin_msi.py
windows7-x64
3plugin_off...pto.py
windows7-x64
3plugin_ppt.py
windows7-x64
3plugin_str_sub.py
windows7-x64
3plugin_stream_o.py
windows7-x64
3plugin_str...ple.py
windows7-x64
3plugin_vba.py
windows7-x64
3plugin_vba_dco.py
windows7-x64
3plugin_vba...nes.py
windows7-x64
3plugin_vba_summary.py
windows7-x64
3plugin_vbaproject.py
windows7-x64
3plugin_version_vba.py
windows7-x64
3tools/re-search.py
windows7-x64
3tools/reextra.py
windows7-x64
3tools/reextra.pyc
windows7-x64
3tools/xmldump.py
windows7-x64
3tools/zipdump.py
windows7-x64
3Analysis
-
max time kernel
300s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26-03-2023 04:40
Static task
static1
Behavioral task
behavioral1
Sample
Challenge_FIles/Employee_W2_Form.docx
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Challenge_FIles/Employees_Contact_Audit_Oct_2021.docx
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
Challenge_FIles/Work_From_Home_Survey.docx
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Challenge_FIles/income_tax_and_benefit_return_2021.docx
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
tools/numbers-to-string.py
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
oledump.py
Resource
win7-20230220-en
Behavioral task
behavioral7
Sample
plugin_biff.py
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
plugin_clsid.py
Resource
win7-20230220-en
Behavioral task
behavioral9
Sample
plugin_dridex.py
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
plugin_hifo.py
Resource
win7-20230220-en
Behavioral task
behavioral11
Sample
plugin_http_heuristics.py
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
plugin_jumplist.py
Resource
win7-20230220-en
Behavioral task
behavioral13
Sample
plugin_linear.py
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
plugin_msg.py
Resource
win7-20230220-en
Behavioral task
behavioral15
Sample
plugin_msg_summary.py
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
plugin_msi.py
Resource
win7-20230220-en
Behavioral task
behavioral17
Sample
plugin_office_crypto.py
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
plugin_ppt.py
Resource
win7-20230220-en
Behavioral task
behavioral19
Sample
plugin_str_sub.py
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
plugin_stream_o.py
Resource
win7-20230220-en
Behavioral task
behavioral21
Sample
plugin_stream_sample.py
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
plugin_vba.py
Resource
win7-20230220-en
Behavioral task
behavioral23
Sample
plugin_vba_dco.py
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
plugin_vba_routines.py
Resource
win7-20230220-en
Behavioral task
behavioral25
Sample
plugin_vba_summary.py
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
plugin_vbaproject.py
Resource
win7-20230220-en
Behavioral task
behavioral27
Sample
plugin_version_vba.py
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
tools/re-search.py
Resource
win7-20230220-en
Behavioral task
behavioral29
Sample
tools/reextra.py
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
tools/reextra.pyc
Resource
win7-20230220-en
Behavioral task
behavioral31
Sample
tools/xmldump.py
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
tools/zipdump.py
Resource
win7-20230220-en
General
-
Target
plugin_vbaproject.py
-
Size
73KB
-
MD5
7e913e5e1a798cb40ad331ece2be1e1c
-
SHA1
20fd112918542100aa6c4eae355ddb466bbecca9
-
SHA256
02cb4e8fb79e9437145473d41c59dd2ab04d55d069085e57e898daa0f2ee77b2
-
SHA512
085428f72a04b2786b810c63ccf3fbc3135bdd5647e064b71473e66e04d1e9aa2fa192f7132ed12d39b9f91dec15d6e389696ecd67b9896d71bec66ee1bf04a2
-
SSDEEP
384:zSGaF70iUZ6l2dgyrZa0obavtGKvJEoMw8LJcTt/vf3yRTVBY9IvLWV/ds0snW2R:xi/2lYRbEQ8EoMkTtiYCvKmWPEMtK
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 1964 AcroRd32.exe 1964 AcroRd32.exe 1964 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 1604 wrote to memory of 1524 1604 cmd.exe rundll32.exe PID 1604 wrote to memory of 1524 1604 cmd.exe rundll32.exe PID 1604 wrote to memory of 1524 1604 cmd.exe rundll32.exe PID 1524 wrote to memory of 1964 1524 rundll32.exe AcroRd32.exe PID 1524 wrote to memory of 1964 1524 rundll32.exe AcroRd32.exe PID 1524 wrote to memory of 1964 1524 rundll32.exe AcroRd32.exe PID 1524 wrote to memory of 1964 1524 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\plugin_vbaproject.py1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\plugin_vbaproject.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\plugin_vbaproject.py"3⤵
- Suspicious use of SetWindowsHookEx