Analysis
-
max time kernel
156s -
max time network
174s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
08-02-2022 08:03
Static task
static1
Behavioral task
behavioral1
Sample
Invoices From Last Year.xlsx
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Invoices From Last Year.xlsx
Resource
win10v2004-en-20220113
General
-
Target
Invoices From Last Year.xlsx
-
Size
187KB
-
MD5
9f024bcd343054384c4309d02eb8aa11
-
SHA1
446a3adcf4344d586b8548d36078196609e0c0b4
-
SHA256
df737ad5d92f25da55a1bc1ec33290e0d99f958bb40cdf45788adab8fe2a3088
-
SHA512
5dd0be5c118717be6b46d6304c36eed576e21b4bd39a778832850570b675823baaa1dcde2ec95755802293eb0f2fdac14e31f0006038136613428f3f38fd6a2f
Malware Config
Extracted
xloader
2.5
ahc8
methodicalservices.com
lojahelius.com
dxadxc.com
keshaunharris.club
hockeyengolfshop.online
sherranmanning.com
instylelimos.net
plick-click.com
tntexplode.com
movement-practice.net
nftlake.digital
134171.com
newhorizonseo.com
lm-solar.com
fahrrad-markt24.com
creatologiest.com
juststartmessy.com
sady-rossii-ural.com
blockchain-salt.com
bestoflakegeorge.guide
infinitymoversllc.com
javelephant.com
promocaozeraestoque.online
p60p.com
kreditineskorteleslt.com
chronicfit.store
onzep.store
shafiqandmudasir.com
vivemanku.online
chengfengdh.xyz
bets-bc-zrkqf.xyz
cellparts10.com
guardions.com
talenue.store
graffity-aws.com
buddingwsetcg.top
erikakorma.com
playex.ltd
jamaicarailways.com
nfthunter.art
ml-pilot.com
athleteteas.com
ruthdeliverance.info
medicmir.store
procurovariedades.com
undermour01.club
sneakeryeezy.com
dallmann.info
edm69.net
micj7870.com
silviomicalikush.xyz
activa.store
adeelnawaznj.com
travispilat.com
mercyships.kiwi
amazon939.com
talenterzllc.com
sbxip.com
phasernet.net
taggalla.com
pbspoolservices.com
34gjm.xyz
nuevochile.net
busdijogja.com
fyonkaly.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/972-80-0x0000000072480000-0x00000000724A9000-memory.dmp xloader behavioral1/memory/516-93-0x0000000072480000-0x00000000724A9000-memory.dmp xloader behavioral1/memory/748-99-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Blocklisted process makes network request 1 IoCs
Processes:
EQNEDT32.EXEflow pid process 4 748 EQNEDT32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
vbc.exepid process 972 vbc.exe -
Loads dropped DLL 5 IoCs
Processes:
EQNEDT32.EXEpid process 748 EQNEDT32.EXE 748 EQNEDT32.EXE 748 EQNEDT32.EXE 748 EQNEDT32.EXE 748 EQNEDT32.EXE -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Nknompwo = "C:\\Users\\Admin\\owpmonkN.url" vbc.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
DpiScaling.exesvchost.exedescription pid process target process PID 516 set thread context of 1268 516 DpiScaling.exe Explorer.EXE PID 516 set thread context of 1268 516 DpiScaling.exe Explorer.EXE PID 748 set thread context of 1268 748 svchost.exe Explorer.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
-
Processes:
EXCEL.EXEdescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE -
Modifies registry class 64 IoCs
Processes:
EXCEL.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1612 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
DpiScaling.exesvchost.exepid process 516 DpiScaling.exe 516 DpiScaling.exe 516 DpiScaling.exe 748 svchost.exe 748 svchost.exe 748 svchost.exe 748 svchost.exe 748 svchost.exe 748 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
DpiScaling.exesvchost.exepid process 516 DpiScaling.exe 516 DpiScaling.exe 516 DpiScaling.exe 516 DpiScaling.exe 748 svchost.exe 748 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
DpiScaling.exeExplorer.EXEsvchost.exedescription pid process Token: SeDebugPrivilege 516 DpiScaling.exe Token: SeShutdownPrivilege 1268 Explorer.EXE Token: SeShutdownPrivilege 1268 Explorer.EXE Token: SeDebugPrivilege 748 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 1612 EXCEL.EXE 1612 EXCEL.EXE 1612 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
EQNEDT32.EXEvbc.exeDpiScaling.exedescription pid process target process PID 748 wrote to memory of 972 748 EQNEDT32.EXE vbc.exe PID 748 wrote to memory of 972 748 EQNEDT32.EXE vbc.exe PID 748 wrote to memory of 972 748 EQNEDT32.EXE vbc.exe PID 748 wrote to memory of 972 748 EQNEDT32.EXE vbc.exe PID 972 wrote to memory of 516 972 vbc.exe DpiScaling.exe PID 972 wrote to memory of 516 972 vbc.exe DpiScaling.exe PID 972 wrote to memory of 516 972 vbc.exe DpiScaling.exe PID 972 wrote to memory of 516 972 vbc.exe DpiScaling.exe PID 972 wrote to memory of 516 972 vbc.exe DpiScaling.exe PID 972 wrote to memory of 516 972 vbc.exe DpiScaling.exe PID 972 wrote to memory of 516 972 vbc.exe DpiScaling.exe PID 516 wrote to memory of 748 516 DpiScaling.exe svchost.exe PID 516 wrote to memory of 748 516 DpiScaling.exe svchost.exe PID 516 wrote to memory of 748 516 DpiScaling.exe svchost.exe PID 516 wrote to memory of 748 516 DpiScaling.exe svchost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Invoices From Last Year.xlsx"2⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\vbc.exe"C:\Users\Public\vbc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\DpiScaling.exeC:\Windows\System32\DpiScaling.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Public\vbc.exeMD5
8809460ab60bc7113f8790dfecfe57da
SHA1ef0eca0892ba1d1e113f1fa2a63772534a2bbc54
SHA256b1d4e3af02c434b479ff7305d57cb5d1e64a6411fe4cc5d5335cc4eb5e7cf8f4
SHA512976320251b9f6fd5641bd859db1b35264e6c768d73825590975567a0ad6ca7ff46c5b123e6d00337d40bb7c499e58e3de831fc1502268b90eb590a96fe69226f
-
C:\Users\Public\vbc.exeMD5
8809460ab60bc7113f8790dfecfe57da
SHA1ef0eca0892ba1d1e113f1fa2a63772534a2bbc54
SHA256b1d4e3af02c434b479ff7305d57cb5d1e64a6411fe4cc5d5335cc4eb5e7cf8f4
SHA512976320251b9f6fd5641bd859db1b35264e6c768d73825590975567a0ad6ca7ff46c5b123e6d00337d40bb7c499e58e3de831fc1502268b90eb590a96fe69226f
-
\Users\Public\vbc.exeMD5
8809460ab60bc7113f8790dfecfe57da
SHA1ef0eca0892ba1d1e113f1fa2a63772534a2bbc54
SHA256b1d4e3af02c434b479ff7305d57cb5d1e64a6411fe4cc5d5335cc4eb5e7cf8f4
SHA512976320251b9f6fd5641bd859db1b35264e6c768d73825590975567a0ad6ca7ff46c5b123e6d00337d40bb7c499e58e3de831fc1502268b90eb590a96fe69226f
-
\Users\Public\vbc.exeMD5
8809460ab60bc7113f8790dfecfe57da
SHA1ef0eca0892ba1d1e113f1fa2a63772534a2bbc54
SHA256b1d4e3af02c434b479ff7305d57cb5d1e64a6411fe4cc5d5335cc4eb5e7cf8f4
SHA512976320251b9f6fd5641bd859db1b35264e6c768d73825590975567a0ad6ca7ff46c5b123e6d00337d40bb7c499e58e3de831fc1502268b90eb590a96fe69226f
-
\Users\Public\vbc.exeMD5
8809460ab60bc7113f8790dfecfe57da
SHA1ef0eca0892ba1d1e113f1fa2a63772534a2bbc54
SHA256b1d4e3af02c434b479ff7305d57cb5d1e64a6411fe4cc5d5335cc4eb5e7cf8f4
SHA512976320251b9f6fd5641bd859db1b35264e6c768d73825590975567a0ad6ca7ff46c5b123e6d00337d40bb7c499e58e3de831fc1502268b90eb590a96fe69226f
-
\Users\Public\vbc.exeMD5
8809460ab60bc7113f8790dfecfe57da
SHA1ef0eca0892ba1d1e113f1fa2a63772534a2bbc54
SHA256b1d4e3af02c434b479ff7305d57cb5d1e64a6411fe4cc5d5335cc4eb5e7cf8f4
SHA512976320251b9f6fd5641bd859db1b35264e6c768d73825590975567a0ad6ca7ff46c5b123e6d00337d40bb7c499e58e3de831fc1502268b90eb590a96fe69226f
-
\Users\Public\vbc.exeMD5
8809460ab60bc7113f8790dfecfe57da
SHA1ef0eca0892ba1d1e113f1fa2a63772534a2bbc54
SHA256b1d4e3af02c434b479ff7305d57cb5d1e64a6411fe4cc5d5335cc4eb5e7cf8f4
SHA512976320251b9f6fd5641bd859db1b35264e6c768d73825590975567a0ad6ca7ff46c5b123e6d00337d40bb7c499e58e3de831fc1502268b90eb590a96fe69226f
-
memory/516-82-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/516-91-0x0000000000260000-0x0000000000271000-memory.dmpFilesize
68KB
-
memory/516-95-0x00000000002A0000-0x00000000002B1000-memory.dmpFilesize
68KB
-
memory/516-94-0x000000007249D000-0x000000007249E000-memory.dmpFilesize
4KB
-
memory/516-81-0x0000000072480000-0x00000000724A9000-memory.dmpFilesize
164KB
-
memory/516-93-0x0000000072480000-0x00000000724A9000-memory.dmpFilesize
164KB
-
memory/516-87-0x0000000000090000-0x0000000000091000-memory.dmpFilesize
4KB
-
memory/516-89-0x0000000001F50000-0x0000000002253000-memory.dmpFilesize
3.0MB
-
memory/516-90-0x000000007249D000-0x000000007249E000-memory.dmpFilesize
4KB
-
memory/748-101-0x0000000000490000-0x0000000000520000-memory.dmpFilesize
576KB
-
memory/748-100-0x00000000008B0000-0x0000000000BB3000-memory.dmpFilesize
3.0MB
-
memory/748-99-0x0000000000080000-0x00000000000A9000-memory.dmpFilesize
164KB
-
memory/748-98-0x0000000000F50000-0x0000000000F58000-memory.dmpFilesize
32KB
-
memory/972-80-0x0000000072480000-0x00000000724A9000-memory.dmpFilesize
164KB
-
memory/972-68-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/972-70-0x0000000000400000-0x0000000000531000-memory.dmpFilesize
1.2MB
-
memory/1268-104-0x000007FF3A290000-0x000007FF3A29A000-memory.dmpFilesize
40KB
-
memory/1268-103-0x000007FEF6190000-0x000007FEF62D3000-memory.dmpFilesize
1.3MB
-
memory/1268-92-0x0000000006EB0000-0x0000000006FD2000-memory.dmpFilesize
1.1MB
-
memory/1268-96-0x0000000006D10000-0x0000000006E1C000-memory.dmpFilesize
1.0MB
-
memory/1268-102-0x0000000006FE0000-0x00000000070BB000-memory.dmpFilesize
876KB
-
memory/1612-56-0x0000000071B21000-0x0000000071B23000-memory.dmpFilesize
8KB
-
memory/1612-57-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1612-58-0x0000000072B0D000-0x0000000072B18000-memory.dmpFilesize
44KB
-
memory/1612-97-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1612-59-0x0000000075B11000-0x0000000075B13000-memory.dmpFilesize
8KB
-
memory/1612-55-0x000000002F4B1000-0x000000002F4B4000-memory.dmpFilesize
12KB