General

  • Target

    Scan Bill of Lading.xlsm

  • Size

    398KB

  • Sample

    200630-5m9l7sr2ae

  • MD5

    937aa5650aa985dd443f4a03156967c9

  • SHA1

    f40cd6481a66c1608a6b97580fe69f2e4904ed6d

  • SHA256

    f4dcd21a2e0b2f4432b665157a1f934e5063be6bbf7ef5f92b365bbbeca92331

  • SHA512

    8113094f933fbd159ec1d37bd7da487e42a515bfba57c6de6c82358223b2e202c6b592ea8fff18568694ca58fdbaebfb60b53f7974743a8c8c9f4abc1af68b93

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://kyivremont.com/vbc.exe

Targets

    • Target

      Scan Bill of Lading.xlsm

    • Size

      398KB

    • MD5

      937aa5650aa985dd443f4a03156967c9

    • SHA1

      f40cd6481a66c1608a6b97580fe69f2e4904ed6d

    • SHA256

      f4dcd21a2e0b2f4432b665157a1f934e5063be6bbf7ef5f92b365bbbeca92331

    • SHA512

      8113094f933fbd159ec1d37bd7da487e42a515bfba57c6de6c82358223b2e202c6b592ea8fff18568694ca58fdbaebfb60b53f7974743a8c8c9f4abc1af68b93

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blacklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Modifies system certificate store

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks