Analysis
-
max time kernel
1801s -
max time network
1799s -
platform
windows7_x64 -
resource
win7-20220414-es -
submitted
21-06-2022 18:02
Static task
static1
Behavioral task
behavioral1
Sample
PO1286482.xlsx
Resource
win7-20220414-es
Behavioral task
behavioral2
Sample
PO1286482.xlsx
Resource
win10v2004-20220414-es
General
-
Target
PO1286482.xlsx
-
Size
78KB
-
MD5
1122f29208098e9d39655827fe7efbd6
-
SHA1
fca1db5fff0698113d88e70c876a63e630a6ff0e
-
SHA256
756240595bd69e9c3415ff6c49e8703dc2bb54bdaa0d2914ce5e33ab92f51813
-
SHA512
16469a4999250767b4cc4a6df0642fc7215b1d87fd77fb60ae06b32cda06c871b04b63f8b7187cb49faaa331825006118c0308af946f5d38201b430b393a5416
Malware Config
Extracted
xloader
2.6
zgtb
gabriellep.com
honghe4.xyz
anisaofrendas.com
happy-tile.com
thesulkies.com
international-ipo.com
tazeco.info
hhhzzz.xyz
vrmonster.xyz
theearthresidencia.com
sportape.xyz
elshadaibaterias.com
koredeiihibi.com
taxtaa.com
globalcityb.com
fxivcama.com
dagsmith.com
elmar-bhp.com
peakice.net
jhcdjewelry.com
moradagroup.tech
luminantentertainment.com
originalfatfrog.com
istanbulbahis239.com
digismart.cloud
egclass.com
video-raamsdonk.online
enjoyhavoc.online
elegantmuka.com
crememeup.store
gasgangllc.com
worldmarketking.com
johnywan.icu
ctxd089.com
vipbuy-my.com
cboelua.com
sitesv.com
7788tiepin.com
unionfound.com
freecrdditreport.com
symmetrya.online
thinoe.com
line-view.com
immobilien-mj.com
alignedmagic.com
mecontaisso.com
plumberbalanced.com
zhouwuxiawu.com
obokbusinessbootcamp.com
chance-lo.com
jujuskiny.com
kkrcrzyz.xyz
daquan168.com
groupeinvictuscorporation.com
leadswebhosting.com
payphelpcenter950851354.info
subvip60.site
ink-desk.com
luminaurascent.com
jivraj9india.com
topproroofer.com
nxteam.net
can-amexico.com
premhub.club
zs-yaoshi.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Xloader Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1500-73-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral1/memory/1500-74-0x000000000041F1F0-mapping.dmp xloader behavioral1/memory/1500-76-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral1/memory/1308-84-0x0000000000080000-0x00000000000AB000-memory.dmp xloader -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
help.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run help.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\JXK46TRX_TF = "C:\\Program Files (x86)\\Rytnlwb\\mfcbdd.exe" help.exe -
Blocklisted process makes network request 1 IoCs
Processes:
EQNEDT32.EXEflow pid process 3 1732 EQNEDT32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
vbc.exemfcbdd.exepid process 1636 vbc.exe 1388 mfcbdd.exe -
Loads dropped DLL 4 IoCs
Processes:
EQNEDT32.EXEpid process 1732 EQNEDT32.EXE 1732 EQNEDT32.EXE 1732 EQNEDT32.EXE 1732 EQNEDT32.EXE -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
vbc.execvtres.exehelp.exedescription pid process target process PID 1636 set thread context of 1500 1636 vbc.exe cvtres.exe PID 1500 set thread context of 1392 1500 cvtres.exe Explorer.EXE PID 1308 set thread context of 1392 1308 help.exe Explorer.EXE -
Drops file in Program Files directory 2 IoCs
Processes:
help.exeExplorer.EXEdescription ioc process File opened for modification C:\Program Files (x86)\Rytnlwb\mfcbdd.exe help.exe File created C:\Program Files (x86)\Rytnlwb\mfcbdd.exe Explorer.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
-
Processes:
EXCEL.EXEhelp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Key created \Registry\User\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 help.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE -
Modifies registry class 64 IoCs
Processes:
EXCEL.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1868 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
vbc.execvtres.exehelp.exepid process 1636 vbc.exe 1636 vbc.exe 1500 cvtres.exe 1500 cvtres.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1392 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
cvtres.exehelp.exepid process 1500 cvtres.exe 1500 cvtres.exe 1500 cvtres.exe 1308 help.exe 1308 help.exe 1308 help.exe 1308 help.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
vbc.execvtres.exehelp.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1636 vbc.exe Token: SeDebugPrivilege 1500 cvtres.exe Token: SeDebugPrivilege 1308 help.exe Token: SeShutdownPrivilege 1392 Explorer.EXE Token: SeShutdownPrivilege 1392 Explorer.EXE Token: SeShutdownPrivilege 1392 Explorer.EXE Token: SeShutdownPrivilege 1392 Explorer.EXE Token: SeShutdownPrivilege 1392 Explorer.EXE Token: SeShutdownPrivilege 1392 Explorer.EXE Token: SeShutdownPrivilege 1392 Explorer.EXE Token: SeShutdownPrivilege 1392 Explorer.EXE Token: SeShutdownPrivilege 1392 Explorer.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
EQNEDT32.EXEvbc.exeExplorer.EXEhelp.exedescription pid process target process PID 1732 wrote to memory of 1636 1732 EQNEDT32.EXE vbc.exe PID 1732 wrote to memory of 1636 1732 EQNEDT32.EXE vbc.exe PID 1732 wrote to memory of 1636 1732 EQNEDT32.EXE vbc.exe PID 1732 wrote to memory of 1636 1732 EQNEDT32.EXE vbc.exe PID 1636 wrote to memory of 920 1636 vbc.exe cvtres.exe PID 1636 wrote to memory of 920 1636 vbc.exe cvtres.exe PID 1636 wrote to memory of 920 1636 vbc.exe cvtres.exe PID 1636 wrote to memory of 920 1636 vbc.exe cvtres.exe PID 1636 wrote to memory of 1500 1636 vbc.exe cvtres.exe PID 1636 wrote to memory of 1500 1636 vbc.exe cvtres.exe PID 1636 wrote to memory of 1500 1636 vbc.exe cvtres.exe PID 1636 wrote to memory of 1500 1636 vbc.exe cvtres.exe PID 1636 wrote to memory of 1500 1636 vbc.exe cvtres.exe PID 1636 wrote to memory of 1500 1636 vbc.exe cvtres.exe PID 1636 wrote to memory of 1500 1636 vbc.exe cvtres.exe PID 1392 wrote to memory of 1308 1392 Explorer.EXE help.exe PID 1392 wrote to memory of 1308 1392 Explorer.EXE help.exe PID 1392 wrote to memory of 1308 1392 Explorer.EXE help.exe PID 1392 wrote to memory of 1308 1392 Explorer.EXE help.exe PID 1308 wrote to memory of 824 1308 help.exe cmd.exe PID 1308 wrote to memory of 824 1308 help.exe cmd.exe PID 1308 wrote to memory of 824 1308 help.exe cmd.exe PID 1308 wrote to memory of 824 1308 help.exe cmd.exe PID 1308 wrote to memory of 1168 1308 help.exe Firefox.exe PID 1308 wrote to memory of 1168 1308 help.exe Firefox.exe PID 1308 wrote to memory of 1168 1308 help.exe Firefox.exe PID 1308 wrote to memory of 1168 1308 help.exe Firefox.exe PID 1308 wrote to memory of 1168 1308 help.exe Firefox.exe PID 1392 wrote to memory of 1388 1392 Explorer.EXE mfcbdd.exe PID 1392 wrote to memory of 1388 1392 Explorer.EXE mfcbdd.exe PID 1392 wrote to memory of 1388 1392 Explorer.EXE mfcbdd.exe PID 1392 wrote to memory of 1388 1392 Explorer.EXE mfcbdd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\PO1286482.xlsx2⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
-
C:\Program Files (x86)\Rytnlwb\mfcbdd.exe"C:\Program Files (x86)\Rytnlwb\mfcbdd.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\vbc.exe"C:\Users\Public\vbc.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Rytnlwb\mfcbdd.exeFilesize
42KB
MD5c09985ae74f0882f208d75de27770dfa
SHA131b7a087f3c0325d11f8de298f2d601ab8f94897
SHA256e24570abd130832732d0dd3ec4efb6e3e1835064513c8b8a2b1ae0d530b04534
SHA512d624e26d12588b8860f957f7dcfca29a84724dc087e26123136cd5e7e4e81c8233090fbd8455df17a73e452beaa780590d1f99b91ae27e151c39353999b11540
-
C:\Program Files (x86)\Rytnlwb\mfcbdd.exeFilesize
42KB
MD5c09985ae74f0882f208d75de27770dfa
SHA131b7a087f3c0325d11f8de298f2d601ab8f94897
SHA256e24570abd130832732d0dd3ec4efb6e3e1835064513c8b8a2b1ae0d530b04534
SHA512d624e26d12588b8860f957f7dcfca29a84724dc087e26123136cd5e7e4e81c8233090fbd8455df17a73e452beaa780590d1f99b91ae27e151c39353999b11540
-
C:\Users\Public\vbc.exeFilesize
285KB
MD548d4eafd1412fe11e58cb6778be9a6cc
SHA14df1a667d1c7de90a5492146b92ffbb667d689a2
SHA256a7492a3e2caa18c09290209462772d7356966ed9fe91f86830284d950604b300
SHA5125a34f30f6c9d9d92938f9a357454095ee8421102de1fcce5abb827a2468f7f4050178810d0df16a7174832747453f4218a41e70388195534a93f860cc97bc2e4
-
C:\Users\Public\vbc.exeFilesize
285KB
MD548d4eafd1412fe11e58cb6778be9a6cc
SHA14df1a667d1c7de90a5492146b92ffbb667d689a2
SHA256a7492a3e2caa18c09290209462772d7356966ed9fe91f86830284d950604b300
SHA5125a34f30f6c9d9d92938f9a357454095ee8421102de1fcce5abb827a2468f7f4050178810d0df16a7174832747453f4218a41e70388195534a93f860cc97bc2e4
-
\Users\Public\vbc.exeFilesize
285KB
MD548d4eafd1412fe11e58cb6778be9a6cc
SHA14df1a667d1c7de90a5492146b92ffbb667d689a2
SHA256a7492a3e2caa18c09290209462772d7356966ed9fe91f86830284d950604b300
SHA5125a34f30f6c9d9d92938f9a357454095ee8421102de1fcce5abb827a2468f7f4050178810d0df16a7174832747453f4218a41e70388195534a93f860cc97bc2e4
-
\Users\Public\vbc.exeFilesize
285KB
MD548d4eafd1412fe11e58cb6778be9a6cc
SHA14df1a667d1c7de90a5492146b92ffbb667d689a2
SHA256a7492a3e2caa18c09290209462772d7356966ed9fe91f86830284d950604b300
SHA5125a34f30f6c9d9d92938f9a357454095ee8421102de1fcce5abb827a2468f7f4050178810d0df16a7174832747453f4218a41e70388195534a93f860cc97bc2e4
-
\Users\Public\vbc.exeFilesize
285KB
MD548d4eafd1412fe11e58cb6778be9a6cc
SHA14df1a667d1c7de90a5492146b92ffbb667d689a2
SHA256a7492a3e2caa18c09290209462772d7356966ed9fe91f86830284d950604b300
SHA5125a34f30f6c9d9d92938f9a357454095ee8421102de1fcce5abb827a2468f7f4050178810d0df16a7174832747453f4218a41e70388195534a93f860cc97bc2e4
-
\Users\Public\vbc.exeFilesize
285KB
MD548d4eafd1412fe11e58cb6778be9a6cc
SHA14df1a667d1c7de90a5492146b92ffbb667d689a2
SHA256a7492a3e2caa18c09290209462772d7356966ed9fe91f86830284d950604b300
SHA5125a34f30f6c9d9d92938f9a357454095ee8421102de1fcce5abb827a2468f7f4050178810d0df16a7174832747453f4218a41e70388195534a93f860cc97bc2e4
-
memory/824-81-0x0000000000000000-mapping.dmp
-
memory/1308-85-0x0000000000660000-0x00000000006F0000-memory.dmpFilesize
576KB
-
memory/1308-84-0x0000000000080000-0x00000000000AB000-memory.dmpFilesize
172KB
-
memory/1308-83-0x0000000000760000-0x0000000000A63000-memory.dmpFilesize
3.0MB
-
memory/1308-82-0x0000000000AB0000-0x0000000000AB6000-memory.dmpFilesize
24KB
-
memory/1308-80-0x0000000000000000-mapping.dmp
-
memory/1388-91-0x0000000000000000-mapping.dmp
-
memory/1392-86-0x00000000072E0000-0x000000000740C000-memory.dmpFilesize
1.2MB
-
memory/1392-87-0x00000000072E0000-0x000000000740C000-memory.dmpFilesize
1.2MB
-
memory/1392-79-0x00000000071A0000-0x00000000072D8000-memory.dmpFilesize
1.2MB
-
memory/1500-74-0x000000000041F1F0-mapping.dmp
-
memory/1500-70-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/1500-77-0x0000000000AE0000-0x0000000000DE3000-memory.dmpFilesize
3.0MB
-
memory/1500-78-0x0000000000300000-0x0000000000311000-memory.dmpFilesize
68KB
-
memory/1500-76-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/1500-73-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/1500-71-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/1636-68-0x0000000000560000-0x0000000000594000-memory.dmpFilesize
208KB
-
memory/1636-67-0x0000000000EF0000-0x0000000000F3C000-memory.dmpFilesize
304KB
-
memory/1636-64-0x0000000000000000-mapping.dmp
-
memory/1868-69-0x000000007224D000-0x0000000072258000-memory.dmpFilesize
44KB
-
memory/1868-54-0x000000002F9A1000-0x000000002F9A4000-memory.dmpFilesize
12KB
-
memory/1868-58-0x000000007224D000-0x0000000072258000-memory.dmpFilesize
44KB
-
memory/1868-88-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1868-89-0x000000007224D000-0x0000000072258000-memory.dmpFilesize
44KB
-
memory/1868-57-0x00000000759D1000-0x00000000759D3000-memory.dmpFilesize
8KB
-
memory/1868-56-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1868-55-0x0000000071261000-0x0000000071263000-memory.dmpFilesize
8KB