Analysis

  • max time kernel
    480s
  • max time network
    391s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2024 05:48

General

  • Target

    subscription_1617056233.xlsb

  • Size

    177KB

  • MD5

    1d1ba411ff36cdd1b1350341624ac008

  • SHA1

    becdec14b92c6d67b3aa28fdbf4293dabb7b0055

  • SHA256

    ae6dbc08e0e21b217352175f916cfd5269c4fd8d5de6bff2d0a93a366f78e8d1

  • SHA512

    89a9df6e41300e05c71af3eb45acd7cd6c3915bc511d00cc2a420c5d3a274a704798b3e48e93ffccd7813ee2a25e96a2c1c1f4d1e84ed86c144f2e79af501ef0

  • SSDEEP

    3072:jMozgZ9S08bSe71IeyGJE+pCm7nXEMyQuvYKrp/wR+bhzKbzvXAJ732:TgLSPB76eyGjwm75yQuvPSjwJr2

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Signatures

  • Nloader

    Simple loader that includes the keyword 'campo' in the URL used to download other families.

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Nloader payload 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Program crash 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\subscription_1617056233.xlsb
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c certutil -decode %PUBLIC%\4123.xsg %PUBLIC%\4123.do1
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Windows\SysWOW64\certutil.exe
        certutil -decode C:\Users\Public\4123.xsg C:\Users\Public\4123.do1
        3⤵
          PID:2556
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32 C:\Users\Public\4123.do1,DF1
        2⤵
        • Process spawned unexpected child process
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2916
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 456
          3⤵
          • Program crash
          PID:2464
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1612
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2456
      • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"
        1⤵
        • Enumerates system info in registry
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2592
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
        1⤵
          PID:2140
        • C:\Windows\SysWOW64\DllHost.exe
          C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
          1⤵
            PID:1204

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Defense Evasion

          Modify Registry

          1
          T1112

          Discovery

          Query Registry

          1
          T1012

          System Information Discovery

          1
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
            Filesize

            130B

            MD5

            59ebe82c4a9fecae76ed48cc3bbcc434

            SHA1

            41b9e1a9d35700786cfe9c468d5971e550cf4730

            SHA256

            eaac90e9eced9e540a823a8027b7a93b266fb56fa2281e815f6e521c083f927e

            SHA512

            c4b8002981062dc73862a8b585a6d2409b468f5854ec3584a2fd0fa74f7eabb3d61ce03bacac03898527852d4d66e15f642f0c25f2bc36c965ee798b6a59881b

          • C:\Users\Public\4123.do1
            Filesize

            48KB

            MD5

            f776deb4df137b37dcae5406c8f3a07a

            SHA1

            f6a31b594fca39c118927405fa4d14353b8fd49a

            SHA256

            93cc5e6a6b671d9b0124ade32ae8b09269de9f03c5c5e66347fbfc7a8c3b305e

            SHA512

            4077b4214b4683bb4776d470027e61fcc3cb3e78beb9377674e4a4de9115d52911e39cb29a566ab446c6962a252ce01020ffd616b5854a9d8230414262bfafe2

          • C:\Users\Public\4123.xsg
            Filesize

            64KB

            MD5

            c87e1dee1275fed1f7ee813b97ccb17b

            SHA1

            e8313978e3c0dff6355b843cd470949c719032c6

            SHA256

            92bb3324b68e8780d718ed808cb9633dc1ef1f7988d2b85cc0f9f431ed63a63d

            SHA512

            2d2177413ed0767651789363c2b952ff8fba26de6ebb84a6390af6bc87927577bedf08b802f5bd6e937e7462bddbd707100108ccf6ef4f39ded65bdcb8b40f35

          • memory/1932-82-0x0000000071D0D000-0x0000000071D18000-memory.dmp
            Filesize

            44KB

          • memory/1932-1-0x0000000071D0D000-0x0000000071D18000-memory.dmp
            Filesize

            44KB

          • memory/1932-0-0x000000005FFF0000-0x0000000060000000-memory.dmp
            Filesize

            64KB

          • memory/1932-65-0x0000000006D70000-0x0000000006D71000-memory.dmp
            Filesize

            4KB

          • memory/1932-81-0x000000005FFF0000-0x0000000060000000-memory.dmp
            Filesize

            64KB

          • memory/1932-71-0x0000000006D70000-0x0000000006D71000-memory.dmp
            Filesize

            4KB

          • memory/1932-62-0x0000000071D0D000-0x0000000071D18000-memory.dmp
            Filesize

            44KB

          • memory/1932-66-0x0000000006D90000-0x0000000006D92000-memory.dmp
            Filesize

            8KB

          • memory/2456-63-0x0000000140000000-0x00000001405E8000-memory.dmp
            Filesize

            5.9MB

          • memory/2456-64-0x0000000140000000-0x00000001405E8000-memory.dmp
            Filesize

            5.9MB

          • memory/2592-84-0x00000000730AD000-0x00000000730B8000-memory.dmp
            Filesize

            44KB

          • memory/2592-83-0x000000005FFF0000-0x0000000060000000-memory.dmp
            Filesize

            64KB

          • memory/2592-85-0x0000000005C80000-0x0000000005C81000-memory.dmp
            Filesize

            4KB

          • memory/2592-86-0x0000000006C10000-0x0000000006C12000-memory.dmp
            Filesize

            8KB

          • memory/2592-87-0x00000000730AD000-0x00000000730B8000-memory.dmp
            Filesize

            44KB

          • memory/2592-88-0x0000000005C80000-0x0000000005C81000-memory.dmp
            Filesize

            4KB

          • memory/2592-94-0x00000000730AD000-0x00000000730B8000-memory.dmp
            Filesize

            44KB

          • memory/2916-52-0x0000000000120000-0x0000000000126000-memory.dmp
            Filesize

            24KB

          • memory/2916-55-0x0000000000140000-0x0000000000147000-memory.dmp
            Filesize

            28KB

          • memory/2916-59-0x0000000000170000-0x0000000000175000-memory.dmp
            Filesize

            20KB

          • memory/2916-50-0x0000000000130000-0x0000000000139000-memory.dmp
            Filesize

            36KB