Analysis

  • max time kernel
    102s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    16-08-2021 16:50

General

  • Target

    Quotations.xlsx

  • Size

    1.2MB

  • MD5

    fd084269903ab4b2354aabb96cf46764

  • SHA1

    4f1ebf3cf19d8eb1a53b50bd4eaafff005c628cb

  • SHA256

    d764c472456716972abf910c9568dffe1301cee889b69f5fee31521bbc950255

  • SHA512

    f9b0b387c7ef1d409910826d639e1cea552098ff11eaaf1c6f9485cd06a0c75b9d9247b31dbb4b44845c5077b53a089dbc5ac2a25c43fedfa91cc9ba807b1cef

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Quotations.xlsx
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1068
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Users\Public\vbc.exe
      "C:\Users\Public\vbc.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:800
      • C:\Program Files (x86)\internet explorer\ieinstal.exe
        "C:\Program Files (x86)\internet explorer\ieinstal.exe"
        3⤵
        • Modifies system executable filetype association
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        PID:940

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Scripting

1
T1064

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\Content.IE5\G2KS51P3\VBC_1_~1.EXE
    MD5

    2e11cb22fcff3e1fbf803fea30380e75

    SHA1

    f38c38f3e9d80b3b3855266c30a993e56ab61bca

    SHA256

    fe1291793c9992efdb89799f37f0cf50cb9ef51f3a10d97d20431a2e4fadae70

    SHA512

    ec1e00dafb2bd5bdc65787b32d3f2611c540dd7500edbf8714af54678325a5c7df41366415cff240b10640de8f39f208392053e1b8b27b961d2f0a3336a3ae32

  • C:\Users\Public\LIBRAR~1\Zmlkqoj\Zmlkqoj.exe
    MD5

    2e11cb22fcff3e1fbf803fea30380e75

    SHA1

    f38c38f3e9d80b3b3855266c30a993e56ab61bca

    SHA256

    fe1291793c9992efdb89799f37f0cf50cb9ef51f3a10d97d20431a2e4fadae70

    SHA512

    ec1e00dafb2bd5bdc65787b32d3f2611c540dd7500edbf8714af54678325a5c7df41366415cff240b10640de8f39f208392053e1b8b27b961d2f0a3336a3ae32

  • C:\Users\Public\vbc.exe
    MD5

    2e11cb22fcff3e1fbf803fea30380e75

    SHA1

    f38c38f3e9d80b3b3855266c30a993e56ab61bca

    SHA256

    fe1291793c9992efdb89799f37f0cf50cb9ef51f3a10d97d20431a2e4fadae70

    SHA512

    ec1e00dafb2bd5bdc65787b32d3f2611c540dd7500edbf8714af54678325a5c7df41366415cff240b10640de8f39f208392053e1b8b27b961d2f0a3336a3ae32

  • C:\Users\Public\vbc.exe
    MD5

    2e11cb22fcff3e1fbf803fea30380e75

    SHA1

    f38c38f3e9d80b3b3855266c30a993e56ab61bca

    SHA256

    fe1291793c9992efdb89799f37f0cf50cb9ef51f3a10d97d20431a2e4fadae70

    SHA512

    ec1e00dafb2bd5bdc65787b32d3f2611c540dd7500edbf8714af54678325a5c7df41366415cff240b10640de8f39f208392053e1b8b27b961d2f0a3336a3ae32

  • \PROGRA~2\Google\Temp\GUME011.tmp\GOFB2B~1.EXE
    MD5

    583ff3367e050c4d62bc03516473b40a

    SHA1

    6aa1d26352b78310e711884829c35a69ed1bf0f9

    SHA256

    6b63f8dd47d8b3baa71b6cd205d428861b96bf09cf479071e75ddd23f97c0146

    SHA512

    e9bdd5cc2e29db48cc524488fbadb08e808f17f6e18fa595cfebae229c94f2547079e52a2ada214169577b89b2ffbef424729cd90acdea3774f5c76aec192be0

  • \PROGRA~2\Google\Update\1335~1.452\GOFB2B~1.EXE
    MD5

    583ff3367e050c4d62bc03516473b40a

    SHA1

    6aa1d26352b78310e711884829c35a69ed1bf0f9

    SHA256

    6b63f8dd47d8b3baa71b6cd205d428861b96bf09cf479071e75ddd23f97c0146

    SHA512

    e9bdd5cc2e29db48cc524488fbadb08e808f17f6e18fa595cfebae229c94f2547079e52a2ada214169577b89b2ffbef424729cd90acdea3774f5c76aec192be0

  • \Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\Content.IE5\G2KS51P3\VBC_1_~1.EXE
    MD5

    2e11cb22fcff3e1fbf803fea30380e75

    SHA1

    f38c38f3e9d80b3b3855266c30a993e56ab61bca

    SHA256

    fe1291793c9992efdb89799f37f0cf50cb9ef51f3a10d97d20431a2e4fadae70

    SHA512

    ec1e00dafb2bd5bdc65787b32d3f2611c540dd7500edbf8714af54678325a5c7df41366415cff240b10640de8f39f208392053e1b8b27b961d2f0a3336a3ae32

  • \Users\Public\LIBRAR~1\Zmlkqoj\Zmlkqoj.exe
    MD5

    2e11cb22fcff3e1fbf803fea30380e75

    SHA1

    f38c38f3e9d80b3b3855266c30a993e56ab61bca

    SHA256

    fe1291793c9992efdb89799f37f0cf50cb9ef51f3a10d97d20431a2e4fadae70

    SHA512

    ec1e00dafb2bd5bdc65787b32d3f2611c540dd7500edbf8714af54678325a5c7df41366415cff240b10640de8f39f208392053e1b8b27b961d2f0a3336a3ae32

  • \Users\Public\vbc.exe
    MD5

    2e11cb22fcff3e1fbf803fea30380e75

    SHA1

    f38c38f3e9d80b3b3855266c30a993e56ab61bca

    SHA256

    fe1291793c9992efdb89799f37f0cf50cb9ef51f3a10d97d20431a2e4fadae70

    SHA512

    ec1e00dafb2bd5bdc65787b32d3f2611c540dd7500edbf8714af54678325a5c7df41366415cff240b10640de8f39f208392053e1b8b27b961d2f0a3336a3ae32

  • \Users\Public\vbc.exe
    MD5

    2e11cb22fcff3e1fbf803fea30380e75

    SHA1

    f38c38f3e9d80b3b3855266c30a993e56ab61bca

    SHA256

    fe1291793c9992efdb89799f37f0cf50cb9ef51f3a10d97d20431a2e4fadae70

    SHA512

    ec1e00dafb2bd5bdc65787b32d3f2611c540dd7500edbf8714af54678325a5c7df41366415cff240b10640de8f39f208392053e1b8b27b961d2f0a3336a3ae32

  • \Users\Public\vbc.exe
    MD5

    2e11cb22fcff3e1fbf803fea30380e75

    SHA1

    f38c38f3e9d80b3b3855266c30a993e56ab61bca

    SHA256

    fe1291793c9992efdb89799f37f0cf50cb9ef51f3a10d97d20431a2e4fadae70

    SHA512

    ec1e00dafb2bd5bdc65787b32d3f2611c540dd7500edbf8714af54678325a5c7df41366415cff240b10640de8f39f208392053e1b8b27b961d2f0a3336a3ae32

  • \Users\Public\vbc.exe
    MD5

    2e11cb22fcff3e1fbf803fea30380e75

    SHA1

    f38c38f3e9d80b3b3855266c30a993e56ab61bca

    SHA256

    fe1291793c9992efdb89799f37f0cf50cb9ef51f3a10d97d20431a2e4fadae70

    SHA512

    ec1e00dafb2bd5bdc65787b32d3f2611c540dd7500edbf8714af54678325a5c7df41366415cff240b10640de8f39f208392053e1b8b27b961d2f0a3336a3ae32

  • \Users\Public\vbc.exe
    MD5

    2e11cb22fcff3e1fbf803fea30380e75

    SHA1

    f38c38f3e9d80b3b3855266c30a993e56ab61bca

    SHA256

    fe1291793c9992efdb89799f37f0cf50cb9ef51f3a10d97d20431a2e4fadae70

    SHA512

    ec1e00dafb2bd5bdc65787b32d3f2611c540dd7500edbf8714af54678325a5c7df41366415cff240b10640de8f39f208392053e1b8b27b961d2f0a3336a3ae32

  • memory/800-68-0x0000000000000000-mapping.dmp
  • memory/800-71-0x00000000003B0000-0x00000000003B1000-memory.dmp
    Filesize

    4KB

  • memory/940-79-0x00000000000D0000-0x00000000000D1000-memory.dmp
    Filesize

    4KB

  • memory/940-77-0x0000000000000000-mapping.dmp
  • memory/940-82-0x0000000010530000-0x00000000105B1000-memory.dmp
    Filesize

    516KB

  • memory/940-81-0x0000000000180000-0x0000000000181000-memory.dmp
    Filesize

    4KB

  • memory/940-80-0x0000000000150000-0x0000000000151000-memory.dmp
    Filesize

    4KB

  • memory/940-83-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1068-75-0x0000000005637000-0x000000000563A000-memory.dmp
    Filesize

    12KB

  • memory/1068-60-0x000000002FEB1000-0x000000002FEB4000-memory.dmp
    Filesize

    12KB

  • memory/1068-72-0x0000000005630000-0x0000000005633000-memory.dmp
    Filesize

    12KB

  • memory/1068-73-0x0000000005635000-0x0000000005637000-memory.dmp
    Filesize

    8KB

  • memory/1068-74-0x0000000005633000-0x0000000005635000-memory.dmp
    Filesize

    8KB

  • memory/1068-62-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1068-61-0x0000000071671000-0x0000000071673000-memory.dmp
    Filesize

    8KB

  • memory/1068-91-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1700-63-0x0000000076661000-0x0000000076663000-memory.dmp
    Filesize

    8KB