Analysis
-
max time kernel
104s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
05-07-2022 12:17
Static task
static1
Behavioral task
behavioral1
Sample
177.xlsx
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
177.xlsx
Resource
win10v2004-20220414-en
General
-
Target
177.xlsx
-
Size
176KB
-
MD5
5ffe37b62296142c38cd3660a5c15351
-
SHA1
472afded700a957d3a862cc49c0a7519092d00fb
-
SHA256
d9c6ae4ceb7ede24afeb4c598e3fef327002b6583272a4fa07ba868578d3d62a
-
SHA512
85f3b64ebe22cf5fa505c6f0611745146a45c91a20ff22761174d101d02d0851af381491df485f431e639f45ed734ada373043cb76ccda302a6a9289b1a36f97
Malware Config
Extracted
asyncrat
0.5.7B
Default
37.0.14.204:2022
37.0.14.204:2019
37.0.14.204:5631
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
-
suricata: ET MALWARE MSIL/GenKryptik.FQRH Download Request
suricata: ET MALWARE MSIL/GenKryptik.FQRH Download Request
-
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Async RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1736-78-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1736-79-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1736-81-0x000000000040C71E-mapping.dmp asyncrat behavioral1/memory/1736-80-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1736-84-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1736-86-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1736-88-0x00000000004B0000-0x00000000004D4000-memory.dmp asyncrat -
Blocklisted process makes network request 1 IoCs
Processes:
EQNEDT32.EXEflow pid process 3 1488 EQNEDT32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
vbc.exevbc.exepid process 828 vbc.exe 1736 vbc.exe -
Loads dropped DLL 2 IoCs
Processes:
EQNEDT32.EXEvbc.exepid process 1488 EQNEDT32.EXE 828 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
vbc.exedescription pid process target process PID 828 set thread context of 1736 828 vbc.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1732 timeout.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
-
Processes:
EXCEL.EXEdescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE -
Modifies registry class 64 IoCs
Processes:
EXCEL.EXEdescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2004 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exevbc.exepid process 836 powershell.exe 828 vbc.exe 828 vbc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exevbc.exevbc.exedescription pid process Token: SeDebugPrivilege 836 powershell.exe Token: SeDebugPrivilege 828 vbc.exe Token: SeDebugPrivilege 1736 vbc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 2004 EXCEL.EXE 2004 EXCEL.EXE 2004 EXCEL.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
EQNEDT32.EXEvbc.exevbc.execmd.exedescription pid process target process PID 1488 wrote to memory of 828 1488 EQNEDT32.EXE vbc.exe PID 1488 wrote to memory of 828 1488 EQNEDT32.EXE vbc.exe PID 1488 wrote to memory of 828 1488 EQNEDT32.EXE vbc.exe PID 1488 wrote to memory of 828 1488 EQNEDT32.EXE vbc.exe PID 1488 wrote to memory of 828 1488 EQNEDT32.EXE vbc.exe PID 1488 wrote to memory of 828 1488 EQNEDT32.EXE vbc.exe PID 1488 wrote to memory of 828 1488 EQNEDT32.EXE vbc.exe PID 828 wrote to memory of 836 828 vbc.exe powershell.exe PID 828 wrote to memory of 836 828 vbc.exe powershell.exe PID 828 wrote to memory of 836 828 vbc.exe powershell.exe PID 828 wrote to memory of 836 828 vbc.exe powershell.exe PID 828 wrote to memory of 1736 828 vbc.exe vbc.exe PID 828 wrote to memory of 1736 828 vbc.exe vbc.exe PID 828 wrote to memory of 1736 828 vbc.exe vbc.exe PID 828 wrote to memory of 1736 828 vbc.exe vbc.exe PID 828 wrote to memory of 1736 828 vbc.exe vbc.exe PID 828 wrote to memory of 1736 828 vbc.exe vbc.exe PID 828 wrote to memory of 1736 828 vbc.exe vbc.exe PID 828 wrote to memory of 1736 828 vbc.exe vbc.exe PID 828 wrote to memory of 1736 828 vbc.exe vbc.exe PID 828 wrote to memory of 1736 828 vbc.exe vbc.exe PID 828 wrote to memory of 1736 828 vbc.exe vbc.exe PID 828 wrote to memory of 1736 828 vbc.exe vbc.exe PID 1736 wrote to memory of 580 1736 vbc.exe cmd.exe PID 1736 wrote to memory of 580 1736 vbc.exe cmd.exe PID 1736 wrote to memory of 580 1736 vbc.exe cmd.exe PID 1736 wrote to memory of 580 1736 vbc.exe cmd.exe PID 580 wrote to memory of 1732 580 cmd.exe timeout.exe PID 580 wrote to memory of 1732 580 cmd.exe timeout.exe PID 580 wrote to memory of 1732 580 cmd.exe timeout.exe PID 580 wrote to memory of 1732 580 cmd.exe timeout.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\177.xlsx1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\vbc.exe"C:\Users\Public\vbc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwAA==3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Public\vbc.exeC:\Users\Public\vbc.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpD10E.tmp.bat""4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpD10E.tmp.batFilesize
137B
MD5d77ff0d8fc8b0dce5adf0c63755f7acf
SHA1b586892a0c46fb7736aa729b6a7719eef2670d6e
SHA25687dccc31d590a6bccf6ec79846155893ad538f175d4a9115bf26c124cdcfb73e
SHA5120a9dcae0aebb080ba0274595aa82afd7a26665e969c1fa84e9e4203e5f5c4f5eb97eae8e6fd6b8bf28e6714103b160491e013884ab75049ce131f787419d61ad
-
C:\Users\Public\vbc.exeFilesize
502KB
MD536b5e3120ffe3468078cb5aa1a55a9da
SHA1ea449fdeb6b5dc01c4f9cf503d2c7a5b66d5cc60
SHA256d9837c768f392a3bb98836aedc39c89e1b0641f1b51949d744bfb1a128cb23aa
SHA512e7e730e6b74ee4c9eec154908c991c26a548bb35e31b0e8e3cabd2e7457470ec967903060ceb74ec2e3727a2db16c378b43cad9b27eabcafc5d4a3062de700a3
-
C:\Users\Public\vbc.exeFilesize
502KB
MD536b5e3120ffe3468078cb5aa1a55a9da
SHA1ea449fdeb6b5dc01c4f9cf503d2c7a5b66d5cc60
SHA256d9837c768f392a3bb98836aedc39c89e1b0641f1b51949d744bfb1a128cb23aa
SHA512e7e730e6b74ee4c9eec154908c991c26a548bb35e31b0e8e3cabd2e7457470ec967903060ceb74ec2e3727a2db16c378b43cad9b27eabcafc5d4a3062de700a3
-
C:\Users\Public\vbc.exeFilesize
502KB
MD536b5e3120ffe3468078cb5aa1a55a9da
SHA1ea449fdeb6b5dc01c4f9cf503d2c7a5b66d5cc60
SHA256d9837c768f392a3bb98836aedc39c89e1b0641f1b51949d744bfb1a128cb23aa
SHA512e7e730e6b74ee4c9eec154908c991c26a548bb35e31b0e8e3cabd2e7457470ec967903060ceb74ec2e3727a2db16c378b43cad9b27eabcafc5d4a3062de700a3
-
\Users\Public\vbc.exeFilesize
502KB
MD536b5e3120ffe3468078cb5aa1a55a9da
SHA1ea449fdeb6b5dc01c4f9cf503d2c7a5b66d5cc60
SHA256d9837c768f392a3bb98836aedc39c89e1b0641f1b51949d744bfb1a128cb23aa
SHA512e7e730e6b74ee4c9eec154908c991c26a548bb35e31b0e8e3cabd2e7457470ec967903060ceb74ec2e3727a2db16c378b43cad9b27eabcafc5d4a3062de700a3
-
\Users\Public\vbc.exeFilesize
502KB
MD536b5e3120ffe3468078cb5aa1a55a9da
SHA1ea449fdeb6b5dc01c4f9cf503d2c7a5b66d5cc60
SHA256d9837c768f392a3bb98836aedc39c89e1b0641f1b51949d744bfb1a128cb23aa
SHA512e7e730e6b74ee4c9eec154908c991c26a548bb35e31b0e8e3cabd2e7457470ec967903060ceb74ec2e3727a2db16c378b43cad9b27eabcafc5d4a3062de700a3
-
memory/580-89-0x0000000000000000-mapping.dmp
-
memory/828-66-0x00000000021B0000-0x00000000021FC000-memory.dmpFilesize
304KB
-
memory/828-64-0x0000000000AB0000-0x0000000000B34000-memory.dmpFilesize
528KB
-
memory/828-65-0x0000000002120000-0x00000000021AA000-memory.dmpFilesize
552KB
-
memory/828-61-0x0000000000000000-mapping.dmp
-
memory/836-73-0x0000000068850000-0x0000000068DFB000-memory.dmpFilesize
5.7MB
-
memory/836-68-0x0000000000000000-mapping.dmp
-
memory/836-70-0x00000000023C0000-0x0000000002403000-memory.dmpFilesize
268KB
-
memory/836-71-0x0000000068850000-0x0000000068DFB000-memory.dmpFilesize
5.7MB
-
memory/1732-91-0x0000000000000000-mapping.dmp
-
memory/1736-78-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1736-84-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1736-75-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1736-76-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1736-88-0x00000000004B0000-0x00000000004D4000-memory.dmpFilesize
144KB
-
memory/1736-79-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1736-81-0x000000000040C71E-mapping.dmp
-
memory/1736-80-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1736-86-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2004-93-0x00000000722FD000-0x0000000072308000-memory.dmpFilesize
44KB
-
memory/2004-54-0x000000002F581000-0x000000002F584000-memory.dmpFilesize
12KB
-
memory/2004-56-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/2004-72-0x00000000722FD000-0x0000000072308000-memory.dmpFilesize
44KB
-
memory/2004-55-0x0000000071311000-0x0000000071313000-memory.dmpFilesize
8KB
-
memory/2004-58-0x00000000722FD000-0x0000000072308000-memory.dmpFilesize
44KB
-
memory/2004-92-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/2004-57-0x0000000075521000-0x0000000075523000-memory.dmpFilesize
8KB