Analysis

  • max time kernel
    254s
  • max time network
    11s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    21-11-2020 23:55

General

  • Target

    2044.20200.xlsx

  • Size

    327KB

  • MD5

    6fe9f85abfe8ef2ded7ab31c4faa454a

  • SHA1

    7e3b43d0df03c59b1941174646398ef456f1e1ed

  • SHA256

    77230b54c465750579d7ceae5bb91dd37b232c03be340b7fb0ffd0ad4f5ea1c9

  • SHA512

    9f95e913c505b627301dad1f20802e205c97da1a4fe31258ec397e23d6d44a869daba8584860c26d88e4a0323e8c60f865a2c2147779c76c49b8d702bf1b357a

Score
8/10

Malware Config

Signatures

  • Blacklisted process makes network request 3 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\2044.20200.xlsx
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1096
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blacklisted process makes network request
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\ProgramData\inceinspoperhbvrbeiciwpqmoqz.bat"
      2⤵
        PID:1632

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Exploitation for Client Execution

    1
    T1203

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1632-0-0x0000000000000000-mapping.dmp