Analysis

  • max time kernel
    102s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    10/01/2023, 14:39

General

  • Target

    40ba454f4baf1370b1891916313e0fe539a16bf2ef9eedc7982c758e2402ebbb.rtf

  • Size

    31KB

  • MD5

    21b0f108a099754e1701da5a18f13ced

  • SHA1

    7400bcfa90fe05a43f0d28d49e022187ba572734

  • SHA256

    40ba454f4baf1370b1891916313e0fe539a16bf2ef9eedc7982c758e2402ebbb

  • SHA512

    4cdb670172699fe6fc225365b1787ceac17f0a07c6d253821daa8bcd6b316c00a878eee7e76bf365acc8e13d7006336358836370980c13cb4c42d07164174906

  • SSDEEP

    768:+Fx0XaIsnPRIa4fwJMKiUj+nPuA7JrPY6xKbRAvMBTEgU54L:+f0Xvx3EMKiU6nGA75QbyvMB/5

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\40ba454f4baf1370b1891916313e0fe539a16bf2ef9eedc7982c758e2402ebbb.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1640
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:668
      • C:\Users\Admin\AppData\Roaming\ohoyecnyru65.exe
        "C:\Users\Admin\AppData\Roaming\ohoyecnyru65.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1280
        • C:\Users\Admin\AppData\Local\Temp\fzovcssdyv.exe
          "C:\Users\Admin\AppData\Local\Temp\fzovcssdyv.exe" C:\Users\Admin\AppData\Local\Temp\lzwbumz.xrk
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1100
          • C:\Users\Admin\AppData\Local\Temp\fzovcssdyv.exe
            "C:\Users\Admin\AppData\Local\Temp\fzovcssdyv.exe"
            4⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • outlook_office_path
            • outlook_win_path
            PID:1960

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\fzovcssdyv.exe

      Filesize

      84KB

      MD5

      c000be4b3261884e9f41cfc4b638a03c

      SHA1

      c90cd3029a2544ed6b4a66ebfaf22486c2f09acd

      SHA256

      b870a240d8423936195a3e9648e646ef90611e80ef5efc1e95daae119af35115

      SHA512

      57671dee13502cda42f890ff8e420b5486af94895e1fbd25147d30a1b3d87e3c37b8bb637b1778d267c7da679c30a4d9d4c6bc6fb1653e7063f03abfef7c7833

    • C:\Users\Admin\AppData\Local\Temp\fzovcssdyv.exe

      Filesize

      84KB

      MD5

      c000be4b3261884e9f41cfc4b638a03c

      SHA1

      c90cd3029a2544ed6b4a66ebfaf22486c2f09acd

      SHA256

      b870a240d8423936195a3e9648e646ef90611e80ef5efc1e95daae119af35115

      SHA512

      57671dee13502cda42f890ff8e420b5486af94895e1fbd25147d30a1b3d87e3c37b8bb637b1778d267c7da679c30a4d9d4c6bc6fb1653e7063f03abfef7c7833

    • C:\Users\Admin\AppData\Local\Temp\fzovcssdyv.exe

      Filesize

      84KB

      MD5

      c000be4b3261884e9f41cfc4b638a03c

      SHA1

      c90cd3029a2544ed6b4a66ebfaf22486c2f09acd

      SHA256

      b870a240d8423936195a3e9648e646ef90611e80ef5efc1e95daae119af35115

      SHA512

      57671dee13502cda42f890ff8e420b5486af94895e1fbd25147d30a1b3d87e3c37b8bb637b1778d267c7da679c30a4d9d4c6bc6fb1653e7063f03abfef7c7833

    • C:\Users\Admin\AppData\Local\Temp\lzwbumz.xrk

      Filesize

      5KB

      MD5

      0fd7afd3bfe7171d81a1d47d842bb9ce

      SHA1

      f0ba1898722f8154a98a0c999c58f016b2388de6

      SHA256

      5a5978044e5d568f13456d71c4f3e85adc244b34d2a0543026fac4a8e06c30ee

      SHA512

      13dfbd66e6f919384259bc78faeb7b5c19305e60bbd185390371b163e227b71f1c1ac595b1eb21af8eeffbc9c9a529c16c1028e20d7f97a9db2a82388efec805

    • C:\Users\Admin\AppData\Local\Temp\wnblnrrru.qwx

      Filesize

      261KB

      MD5

      3b12a5756719621ddf8fbef925360719

      SHA1

      e13cd4d2459b3a6be7d62ba1176acc0e418bedac

      SHA256

      eadfcff1e10278e4f12070e38ada28b37aaef9f50a576bf115284234d31e38e3

      SHA512

      185206f9bba89ad75c266f1ec2f081065d4dc337d3b59c93539efafe1868c327337567c536f425540ceb5cf8fdb4b4d029b831d333e5357abc12152000fa56c0

    • C:\Users\Admin\AppData\Roaming\ohoyecnyru65.exe

      Filesize

      463KB

      MD5

      538b445733e89bf3eaaaf93097070ce9

      SHA1

      ec8aa8460d01eb1f3371833cda1714562124069d

      SHA256

      aec1403ea61620ef0c9d054282c12023fd5f09928fa3f77741219db71af39f92

      SHA512

      811b27059cca34805b1c0094f52dc99fa4a0e1bd7ed21b20a32df40bfb478f8b95bfaadf676382ed1daf3d9930c44947b7005b9c757b4b4855a15f409334d780

    • C:\Users\Admin\AppData\Roaming\ohoyecnyru65.exe

      Filesize

      463KB

      MD5

      538b445733e89bf3eaaaf93097070ce9

      SHA1

      ec8aa8460d01eb1f3371833cda1714562124069d

      SHA256

      aec1403ea61620ef0c9d054282c12023fd5f09928fa3f77741219db71af39f92

      SHA512

      811b27059cca34805b1c0094f52dc99fa4a0e1bd7ed21b20a32df40bfb478f8b95bfaadf676382ed1daf3d9930c44947b7005b9c757b4b4855a15f409334d780

    • \Users\Admin\AppData\Local\Temp\fzovcssdyv.exe

      Filesize

      84KB

      MD5

      c000be4b3261884e9f41cfc4b638a03c

      SHA1

      c90cd3029a2544ed6b4a66ebfaf22486c2f09acd

      SHA256

      b870a240d8423936195a3e9648e646ef90611e80ef5efc1e95daae119af35115

      SHA512

      57671dee13502cda42f890ff8e420b5486af94895e1fbd25147d30a1b3d87e3c37b8bb637b1778d267c7da679c30a4d9d4c6bc6fb1653e7063f03abfef7c7833

    • \Users\Admin\AppData\Local\Temp\fzovcssdyv.exe

      Filesize

      84KB

      MD5

      c000be4b3261884e9f41cfc4b638a03c

      SHA1

      c90cd3029a2544ed6b4a66ebfaf22486c2f09acd

      SHA256

      b870a240d8423936195a3e9648e646ef90611e80ef5efc1e95daae119af35115

      SHA512

      57671dee13502cda42f890ff8e420b5486af94895e1fbd25147d30a1b3d87e3c37b8bb637b1778d267c7da679c30a4d9d4c6bc6fb1653e7063f03abfef7c7833

    • \Users\Admin\AppData\Local\Temp\fzovcssdyv.exe

      Filesize

      84KB

      MD5

      c000be4b3261884e9f41cfc4b638a03c

      SHA1

      c90cd3029a2544ed6b4a66ebfaf22486c2f09acd

      SHA256

      b870a240d8423936195a3e9648e646ef90611e80ef5efc1e95daae119af35115

      SHA512

      57671dee13502cda42f890ff8e420b5486af94895e1fbd25147d30a1b3d87e3c37b8bb637b1778d267c7da679c30a4d9d4c6bc6fb1653e7063f03abfef7c7833

    • \Users\Admin\AppData\Roaming\ohoyecnyru65.exe

      Filesize

      463KB

      MD5

      538b445733e89bf3eaaaf93097070ce9

      SHA1

      ec8aa8460d01eb1f3371833cda1714562124069d

      SHA256

      aec1403ea61620ef0c9d054282c12023fd5f09928fa3f77741219db71af39f92

      SHA512

      811b27059cca34805b1c0094f52dc99fa4a0e1bd7ed21b20a32df40bfb478f8b95bfaadf676382ed1daf3d9930c44947b7005b9c757b4b4855a15f409334d780

    • memory/1640-80-0x000007FEFB641000-0x000007FEFB643000-memory.dmp

      Filesize

      8KB

    • memory/1648-55-0x000000006FBB1000-0x000000006FBB3000-memory.dmp

      Filesize

      8KB

    • memory/1648-54-0x0000000072131000-0x0000000072134000-memory.dmp

      Filesize

      12KB

    • memory/1648-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1648-78-0x0000000070B9D000-0x0000000070BA8000-memory.dmp

      Filesize

      44KB

    • memory/1648-57-0x0000000075A31000-0x0000000075A33000-memory.dmp

      Filesize

      8KB

    • memory/1648-58-0x0000000070B9D000-0x0000000070BA8000-memory.dmp

      Filesize

      44KB

    • memory/1648-81-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1648-82-0x0000000070B9D000-0x0000000070BA8000-memory.dmp

      Filesize

      44KB

    • memory/1960-76-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1960-77-0x0000000002000000-0x0000000002030000-memory.dmp

      Filesize

      192KB