Analysis

  • max time kernel
    149s
  • max time network
    106s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-02-2023 15:31

General

  • Target

    US$16,082.10 Swift.docx

  • Size

    10KB

  • MD5

    6735d0c45ca69ea598bda6fdd9c2cc62

  • SHA1

    7ef80d7b65e5c30517f1b5c8f7e1be00bfa6f461

  • SHA256

    e4dc9cb9964c7f525c257d9a56c3e2f0774d14b0ae9f2df7b49ae1293016d6e1

  • SHA512

    82820b67b03916b488713cb9b5cbf7f5e96ca1f8e521d565f8dd075ea96eca13d8f378cccc13cc1e5b80f424e69cdac428b73a126f9a65f37fcce175b75b0ea6

  • SSDEEP

    192:ScIMmtP0xfUW70vG/b3kgOi4OU7us+1pReDnc37f0F:SPX+si10ni4OIyeDnMr8

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\US$16,082.10 Swift.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:328
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1300
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pfbsKVCKbOh.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1368

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Exploitation for Client Execution

    1
    T1203

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{13C08578-093E-428C-8770-7E6D1EF614C1}.FSD
      Filesize

      128KB

      MD5

      94af6041e73aad5f3fdb98c718864c56

      SHA1

      23a52eb502c07becf866be247c7efadb503a6468

      SHA256

      f2dd1735aeea31792e48bdf1fc86971ded991cb4427dcb43460c01fb20de7b96

      SHA512

      e96f2fc553cfad96c5ee791ef6656d9deb037dd0ed4991b4ac891c8f450b0e1bd88d2e8b1af1efb8e75e07bc6fcd3149adaef86fdacaacc756a4bfadabdc0b33

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      dd8f7ee7e7fc6b3c290b4c00d892b800

      SHA1

      ebf71d0e39e644d611d1ab45ec59a5f7c14f456c

      SHA256

      f4941e947f7028a78200e5fc238f983b90361b0bbc50ce38c9fd45d6a55c05a8

      SHA512

      ecab28e4bb0252a9d42fcb50a7b0ce4bcc22ea51827929a5d12ee7f92642fcf82ac408ce68aa989d68d8891efaf698e158d35891b96e7cd296bc45a22df02b5a

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{602C8B12-7D6F-4863-BE7F-FAC437493EB7}.FSD
      Filesize

      128KB

      MD5

      241e2294f90bda5995ba34426f9670c0

      SHA1

      8a969d63999505fc5c5f93a9abda5760f8caf8a1

      SHA256

      9f6e4c9986d5b115bf51f7e5861a1e96ad66eaf92001eb25b37b9e0b448ade42

      SHA512

      f482ea1db432f15e12f882ae1129b3ca3db1a275b8ebe68662971d528008ca144798ce5c1dffe99ebf91092e89dd424af97f7b879ccfbd0ae58d5acc50af2f5c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ACT9UUKV\O-OO[1].doc
      Filesize

      16KB

      MD5

      f5fa15de93803a87e9b2ab1a136607f9

      SHA1

      a0f6c055032bcc2cb547e1be9c8ca2cea992ecd4

      SHA256

      68b3b4b4b491482f3c44e62d6b3863b5f4aeedb9608a6c27e4eeac44f8a375e3

      SHA512

      00afdb4459868b2fadd2fe5a9ded9df7b290006abf109514b4cdf7e5859ff4354c9c7c54880ef8256473f4f0e463c82430917a793a832e58b4049d78e4298f96

    • C:\Users\Admin\AppData\Local\Temp\{6F9BD5C5-7008-4346-89D8-3C33CD74BD1C}
      Filesize

      128KB

      MD5

      fa1d47908795204c568012c46a1542bc

      SHA1

      554f35404e39196c76271964d17bff88ecf943ce

      SHA256

      be729ef5568e9c068ded956356b46dd998ba4344d77c49300e3e3d41a6d541be

      SHA512

      4bdba240f3fd3f142407c6b536bb58d309a93f4f90825a7a21f0f47c808ff917f03bfeadeb27d8c84bdc377b972ce3031dd0c9b7fb92149df654b695ade46dce

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      87782c5ecf691fbf1063b595b621d118

      SHA1

      7454b2c2d2fe93036bb54e6cc905ff3af8f14ca0

      SHA256

      8d5dccc1eca14bfa2900842427a6f516c847ea6bd577e3526186a58affd7168d

      SHA512

      1218ea79e134a8b1c45f39190dd74e2ee4239a917c7d2b624e19a44bc3d9185185fb147661b451a3bd0577a5b4a4c25cbde52d9450140f9f8f6a1ca89da9f50b

    • C:\Users\Public\vbc.exe
      Filesize

      979KB

      MD5

      fc4f1b555ec348ccf814fedbf06a45cc

      SHA1

      33a666dd9b6ee57bde594d3720adba26191ca9d5

      SHA256

      5f4426ef4ff23950b7ca635f689c0e2274a36ddb3233509e22e7a6b19d6719ae

      SHA512

      31fe3ffd25f5829d0a175155a4d00f061dd8235f4d5f3507d7d7fb4500b5690f553de79930aded6fe9170bf990f1979291546960a2ba1daaa62cdc102a1c69bb

    • C:\Users\Public\vbc.exe
      Filesize

      979KB

      MD5

      fc4f1b555ec348ccf814fedbf06a45cc

      SHA1

      33a666dd9b6ee57bde594d3720adba26191ca9d5

      SHA256

      5f4426ef4ff23950b7ca635f689c0e2274a36ddb3233509e22e7a6b19d6719ae

      SHA512

      31fe3ffd25f5829d0a175155a4d00f061dd8235f4d5f3507d7d7fb4500b5690f553de79930aded6fe9170bf990f1979291546960a2ba1daaa62cdc102a1c69bb

    • C:\Users\Public\vbc.exe
      Filesize

      979KB

      MD5

      fc4f1b555ec348ccf814fedbf06a45cc

      SHA1

      33a666dd9b6ee57bde594d3720adba26191ca9d5

      SHA256

      5f4426ef4ff23950b7ca635f689c0e2274a36ddb3233509e22e7a6b19d6719ae

      SHA512

      31fe3ffd25f5829d0a175155a4d00f061dd8235f4d5f3507d7d7fb4500b5690f553de79930aded6fe9170bf990f1979291546960a2ba1daaa62cdc102a1c69bb

    • \Users\Public\vbc.exe
      Filesize

      979KB

      MD5

      fc4f1b555ec348ccf814fedbf06a45cc

      SHA1

      33a666dd9b6ee57bde594d3720adba26191ca9d5

      SHA256

      5f4426ef4ff23950b7ca635f689c0e2274a36ddb3233509e22e7a6b19d6719ae

      SHA512

      31fe3ffd25f5829d0a175155a4d00f061dd8235f4d5f3507d7d7fb4500b5690f553de79930aded6fe9170bf990f1979291546960a2ba1daaa62cdc102a1c69bb

    • memory/1236-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1236-189-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1300-142-0x00000000001B0000-0x00000000002AC000-memory.dmp
      Filesize

      1008KB

    • memory/1300-150-0x0000000004EF0000-0x0000000004F30000-memory.dmp
      Filesize

      256KB

    • memory/1300-151-0x00000000003C0000-0x00000000003CC000-memory.dmp
      Filesize

      48KB

    • memory/1300-152-0x0000000006030000-0x00000000060E8000-memory.dmp
      Filesize

      736KB

    • memory/1300-158-0x0000000004EF0000-0x0000000004F30000-memory.dmp
      Filesize

      256KB

    • memory/1300-159-0x0000000004EF0000-0x0000000004F30000-memory.dmp
      Filesize

      256KB

    • memory/1300-161-0x0000000004EF0000-0x0000000004F30000-memory.dmp
      Filesize

      256KB

    • memory/1300-162-0x0000000004EF0000-0x0000000004F30000-memory.dmp
      Filesize

      256KB

    • memory/1300-149-0x0000000000390000-0x00000000003A4000-memory.dmp
      Filesize

      80KB

    • memory/1300-144-0x0000000004EF0000-0x0000000004F30000-memory.dmp
      Filesize

      256KB

    • memory/1368-160-0x00000000025F0000-0x0000000002630000-memory.dmp
      Filesize

      256KB