Analysis

  • max time kernel
    150s
  • max time network
    106s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-02-2023 10:14

General

  • Target

    2.docx

  • Size

    10KB

  • MD5

    6735d0c45ca69ea598bda6fdd9c2cc62

  • SHA1

    7ef80d7b65e5c30517f1b5c8f7e1be00bfa6f461

  • SHA256

    e4dc9cb9964c7f525c257d9a56c3e2f0774d14b0ae9f2df7b49ae1293016d6e1

  • SHA512

    82820b67b03916b488713cb9b5cbf7f5e96ca1f8e521d565f8dd075ea96eca13d8f378cccc13cc1e5b80f424e69cdac428b73a126f9a65f37fcce175b75b0ea6

  • SSDEEP

    192:ScIMmtP0xfUW70vG/b3kgOi4OU7us+1pReDnc37f0F:SPX+si10ni4OIyeDnMr8

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1708
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:916
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pfbsKVCKbOh.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1880

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Exploitation for Client Execution

    1
    T1203

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{F737AC92-B0BF-4D46-917E-217FA0C6CD35}.FSD
      Filesize

      128KB

      MD5

      2552960b4106c177b045a451e02ae5b2

      SHA1

      8d0a6629b71e6048c0661f0455c3d80b501746e2

      SHA256

      c6bf48cfefec56f19c0946c2fea7215871cde390b82fe1838c3cafb38b057ee4

      SHA512

      04b1d0b20fc2c9ee11773c6c8ca2ff53db3c6640962c10100bc528bf15141c707353c05c88345ed015878dbf31d244c6070bce3eab34ce76016a2a0add93979f

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      9a8a527d3360c96383ea64acb571e374

      SHA1

      b1a8ff2ce9dd7c4f8c3705b674ba771e9d0744dd

      SHA256

      8303e6a486faac93faa86f3aa76d369d35e313b41fb4f86cde5bb00f6a577e8d

      SHA512

      6492253c27d5eca51cead6be86727804485331f9ca8fe80b395642756fe2c9e9a09482695ce05b5eb4c1e9240c2d06e2a07a773fd75ef47ce2fcdcb392e81094

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{88A42159-F90B-42BD-98BE-49E6E4B183FF}.FSD
      Filesize

      128KB

      MD5

      871127698f0af30fa9e00efe737075d3

      SHA1

      f6306cc118a5a270a0b0f56b0608b04eeabf8397

      SHA256

      29dd337416bbf204fd5fafc367840582515acd71a7f6287649fd59ebdcdce603

      SHA512

      57605583189b56054b82b4bfa14c848b07051283b18f272fca2437f11133c156888a910619848e6bf8503a6fd68608de0493dba888d7a9cf2f7ef992f921f0ae

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VQ77JNZF\O-OO[1].doc
      Filesize

      16KB

      MD5

      f5fa15de93803a87e9b2ab1a136607f9

      SHA1

      a0f6c055032bcc2cb547e1be9c8ca2cea992ecd4

      SHA256

      68b3b4b4b491482f3c44e62d6b3863b5f4aeedb9608a6c27e4eeac44f8a375e3

      SHA512

      00afdb4459868b2fadd2fe5a9ded9df7b290006abf109514b4cdf7e5859ff4354c9c7c54880ef8256473f4f0e463c82430917a793a832e58b4049d78e4298f96

    • C:\Users\Admin\AppData\Local\Temp\{F3677F41-DCBC-4ADC-9515-B24E4B114133}
      Filesize

      128KB

      MD5

      25361736ed8ffd2e30039a286185853e

      SHA1

      7d0950b014586b75dc78b13bcf9836804c02b3dd

      SHA256

      d9d6e1724b00493548454f76a218d98f9bdb59b4209a2202ec6feef5578c57b9

      SHA512

      75d522c975d8cf4027e660c4aff794b576d785b29f18adbde61bb129c9d3a81d20034689719a0de247be7bd3ae8fd13beab7e3b411dd47956cd1660c5533fb17

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      fd2a93ae3adda5c115c26a924804587d

      SHA1

      6a56a7b00d5a14f26c43d8c663d0f9fe5ad04841

      SHA256

      5e91112ca15cb8841d37b980268cfe8b5e46efc8efdb6f1e1b13c5a0908e4370

      SHA512

      b8169b56991bd2e1d84fb67ff1ceb58f2258799bdbcf71fa55cb79144be50f1fcc9a9da5d315e46dd8fe6d851ca4b0ea4bcd91b78f4476df09ecdb1febaa0ed6

    • C:\Users\Public\vbc.exe
      Filesize

      979KB

      MD5

      fc4f1b555ec348ccf814fedbf06a45cc

      SHA1

      33a666dd9b6ee57bde594d3720adba26191ca9d5

      SHA256

      5f4426ef4ff23950b7ca635f689c0e2274a36ddb3233509e22e7a6b19d6719ae

      SHA512

      31fe3ffd25f5829d0a175155a4d00f061dd8235f4d5f3507d7d7fb4500b5690f553de79930aded6fe9170bf990f1979291546960a2ba1daaa62cdc102a1c69bb

    • C:\Users\Public\vbc.exe
      Filesize

      979KB

      MD5

      fc4f1b555ec348ccf814fedbf06a45cc

      SHA1

      33a666dd9b6ee57bde594d3720adba26191ca9d5

      SHA256

      5f4426ef4ff23950b7ca635f689c0e2274a36ddb3233509e22e7a6b19d6719ae

      SHA512

      31fe3ffd25f5829d0a175155a4d00f061dd8235f4d5f3507d7d7fb4500b5690f553de79930aded6fe9170bf990f1979291546960a2ba1daaa62cdc102a1c69bb

    • C:\Users\Public\vbc.exe
      Filesize

      979KB

      MD5

      fc4f1b555ec348ccf814fedbf06a45cc

      SHA1

      33a666dd9b6ee57bde594d3720adba26191ca9d5

      SHA256

      5f4426ef4ff23950b7ca635f689c0e2274a36ddb3233509e22e7a6b19d6719ae

      SHA512

      31fe3ffd25f5829d0a175155a4d00f061dd8235f4d5f3507d7d7fb4500b5690f553de79930aded6fe9170bf990f1979291546960a2ba1daaa62cdc102a1c69bb

    • \Users\Public\vbc.exe
      Filesize

      979KB

      MD5

      fc4f1b555ec348ccf814fedbf06a45cc

      SHA1

      33a666dd9b6ee57bde594d3720adba26191ca9d5

      SHA256

      5f4426ef4ff23950b7ca635f689c0e2274a36ddb3233509e22e7a6b19d6719ae

      SHA512

      31fe3ffd25f5829d0a175155a4d00f061dd8235f4d5f3507d7d7fb4500b5690f553de79930aded6fe9170bf990f1979291546960a2ba1daaa62cdc102a1c69bb

    • memory/916-145-0x0000000000230000-0x0000000000244000-memory.dmp
      Filesize

      80KB

    • memory/916-159-0x0000000004CA0000-0x0000000004CE0000-memory.dmp
      Filesize

      256KB

    • memory/916-142-0x0000000001030000-0x000000000112C000-memory.dmp
      Filesize

      1008KB

    • memory/916-150-0x0000000004CA0000-0x0000000004CE0000-memory.dmp
      Filesize

      256KB

    • memory/916-151-0x0000000000440000-0x000000000044C000-memory.dmp
      Filesize

      48KB

    • memory/916-152-0x0000000007E90000-0x0000000007F48000-memory.dmp
      Filesize

      736KB

    • memory/916-158-0x0000000004CA0000-0x0000000004CE0000-memory.dmp
      Filesize

      256KB

    • memory/916-144-0x0000000004CA0000-0x0000000004CE0000-memory.dmp
      Filesize

      256KB

    • memory/916-163-0x0000000004CA0000-0x0000000004CE0000-memory.dmp
      Filesize

      256KB

    • memory/916-162-0x0000000004CA0000-0x0000000004CE0000-memory.dmp
      Filesize

      256KB

    • memory/1880-161-0x0000000002600000-0x0000000002640000-memory.dmp
      Filesize

      256KB

    • memory/1880-160-0x0000000002600000-0x0000000002640000-memory.dmp
      Filesize

      256KB

    • memory/1976-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1976-190-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB