Analysis

  • max time kernel
    101s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02-03-2023 14:17

General

  • Target

    POX010-240.docx

  • Size

    10KB

  • MD5

    84b25af93d91ad40962a0db9403cc644

  • SHA1

    d38e907dfbe22b0e0eb7ab7ae8515eb69a7dddbc

  • SHA256

    da53bd57af58ae908cd30e303113930cecbd995719404e2dbd7009f0bc54926d

  • SHA512

    ff3b085bde3ccff0592453ded391daac66819d5c8ad3035cb7c567891528ceb0c014c3265f8735cfa780de5d06c746a24f2d1504d669fbd17660f42ab855437c

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uOw4Nl+CVWBXJC0c3qe:SPXU/slT+LOw6HkZC9h

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\POX010-240.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:844
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:552
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:756
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\iioqULceCJUGWS.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:904
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iioqULceCJUGWS" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFF9.tmp"
          3⤵
          • Creates scheduled task(s)
          PID:916
        • C:\Users\Public\vbc.exe
          "C:\Users\Public\vbc.exe"
          3⤵
          • Executes dropped EXE
          PID:1724
        • C:\Users\Public\vbc.exe
          "C:\Users\Public\vbc.exe"
          3⤵
          • Executes dropped EXE
          PID:1580
        • C:\Users\Public\vbc.exe
          "C:\Users\Public\vbc.exe"
          3⤵
          • Executes dropped EXE
          PID:1748
        • C:\Users\Public\vbc.exe
          "C:\Users\Public\vbc.exe"
          3⤵
          • Executes dropped EXE
          PID:1504
        • C:\Users\Public\vbc.exe
          "C:\Users\Public\vbc.exe"
          3⤵
          • Executes dropped EXE
          PID:1280

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Scheduled Task

    1
    T1053

    Exploitation for Client Execution

    1
    T1203

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{28E8A8AF-8DFD-40F0-BE31-90032A989923}.FSD
      Filesize

      128KB

      MD5

      c50134d4422876a78d214167c4c50ce4

      SHA1

      85b7cb7ba9c23baa5b079dae81b1b9aed03b21fa

      SHA256

      7a0eb37d6fdd94b64a64ad7ccdc7fbb77aff0fa6fee37caf86a7eae6d209d8dd

      SHA512

      841618abdc9f764f12d6cfb50cf501eb1f6c97ac9dad69695984bfebcc6ff110b979e5943f85aba9dfddc818115792937f776154a1e2ed9f7e406ad33b5ebfe1

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      b638a146c5fac41943f2100cb366de35

      SHA1

      4e50800e6e975b5c46e76d8ac11334be390575ab

      SHA256

      d3024abfe47cd8065e5c0f0dc6f799aa56b0f36ef2e1714e9566325a862f3744

      SHA512

      793772ae56bd75f9b8d7013a9aad4417dd98898d5d343f541ca6f4c5314e0032b65b516683f607daf958f988d4844395c57087ce678371ea319eb5eadd7ef4f8

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{E4E51ABD-4F40-43E5-AE61-978A45D88771}.FSD
      Filesize

      128KB

      MD5

      563bc5fa0e15c0a1ab39da7919040a4e

      SHA1

      76c18b360c7574e3b649f17d1155b4e5b976d231

      SHA256

      4e9e33c971fb5f301792c8747653a605124740f323f0752c12639dfd68e80fd3

      SHA512

      90b160e94075ebcb8d3d9d1cd6f871e16e38133c6e635160233eb625db9ed82f9b731c818f9a9630a63937ec99a7c3d7467b0dd279f80e432dfa88d9a34537b3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TOS3MI7U\bg[1].doc
      Filesize

      12KB

      MD5

      ba628c629f3472e3b57de14e3cdb05d2

      SHA1

      b492c03cb6824682d575a6b77e3c1c3b7755a331

      SHA256

      e399cdab404d5046aba55ff32346f96349d482763a3b1c633c9a8fb594f09a17

      SHA512

      41fd46f514437a823eef56dd83adf3e8e2f7270ca1a24734a3f639ba3f82db55c170d5056854832602d65e75f2d5772847fbd18e8f9531fc406e8aa62db63cfb

    • C:\Users\Admin\AppData\Local\Temp\tmpFF9.tmp
      Filesize

      1KB

      MD5

      79798868e411b13e70ea6997052e9593

      SHA1

      f838bf07cde2b69cefefc57854bf5fd5d429fbd1

      SHA256

      b630e4415962b609bedf2ae6737dcd42d211bc6c47063236dba6648ab9b7ed43

      SHA512

      c7dba5b354c48f42ee749d1f8c70f146223335609a9286d33786f27d10a509f401c9c4a35467dd13eec598cccd3136ed26d7e297b98fecc79215b70abe8ed115

    • C:\Users\Admin\AppData\Local\Temp\{F25FDF59-B2CF-488F-91B3-525C92C8CD16}
      Filesize

      128KB

      MD5

      26a8877f5dcd902e8e614d253fe0624d

      SHA1

      84ca48720fd213a0b6950562e900148a331903ec

      SHA256

      49f915f6f137bd59eeb4537e1c45cd16fec5ddf2c2dce3fbe04993f976d3dca1

      SHA512

      cb021c106dea01bb3a294ea4b17bcaee66b8e971a04f40679a4fa88b8b413ffa0b0575391e6e0df510cc0ddd80234285e31b9c334400c0f0741d58adec8290cc

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
      Filesize

      84B

      MD5

      f6ba86c4321311e89c822975458c513a

      SHA1

      ad6a18c6038975d70e80a0f9a1a3492b8d2c3a30

      SHA256

      4cead7ce9aa7aaa1b5084b59ce763044784de135a7415ac01f8e694654d2c79f

      SHA512

      ac234cb8afa6e31cb20f6362c80d08bc50279bd9edfff859836b1be8481117b36c8b6befb6c83b1c60e51ea73449eac4b7f2e246066ae2e3f9cb8406707dcb1f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      ad2222f39399510ad91576f67f54e42b

      SHA1

      1aea4fddf5b606ff4765d8048d0a045deaf04128

      SHA256

      f15f8847aa5acb64d775e2fb79fec9c1482ca1d01922e22c38daa34ee1c5c258

      SHA512

      23e4fe9bca3f8d7e41af61f2cd8e84bf97dda34221da244d77e508b870df31d7d9dfdbaa65cc73816e2f1bf37a003eeaea08b35ce3a65084a1d0d954528d7079

    • C:\Users\Public\vbc.exe
      Filesize

      1.3MB

      MD5

      fbaac522046f0b2c2ded0ba88585f68a

      SHA1

      70f050f44b83c47a41e94de0fd5e88a4f3ba4cf2

      SHA256

      85d72481b46dae1f11917c668a2dcb054fd1d72109c90110d5509060c5f1f7e8

      SHA512

      4ea98ae5c04c5b2e888b4adfc4cf228b8cb634789d65ea3e6721932375252edc3f9c80ed6dda76fef0142bcd25ad5dacebb8272d2ba6ff69f9af68ee82a31046

    • C:\Users\Public\vbc.exe
      Filesize

      1.3MB

      MD5

      fbaac522046f0b2c2ded0ba88585f68a

      SHA1

      70f050f44b83c47a41e94de0fd5e88a4f3ba4cf2

      SHA256

      85d72481b46dae1f11917c668a2dcb054fd1d72109c90110d5509060c5f1f7e8

      SHA512

      4ea98ae5c04c5b2e888b4adfc4cf228b8cb634789d65ea3e6721932375252edc3f9c80ed6dda76fef0142bcd25ad5dacebb8272d2ba6ff69f9af68ee82a31046

    • C:\Users\Public\vbc.exe
      Filesize

      1.3MB

      MD5

      fbaac522046f0b2c2ded0ba88585f68a

      SHA1

      70f050f44b83c47a41e94de0fd5e88a4f3ba4cf2

      SHA256

      85d72481b46dae1f11917c668a2dcb054fd1d72109c90110d5509060c5f1f7e8

      SHA512

      4ea98ae5c04c5b2e888b4adfc4cf228b8cb634789d65ea3e6721932375252edc3f9c80ed6dda76fef0142bcd25ad5dacebb8272d2ba6ff69f9af68ee82a31046

    • C:\Users\Public\vbc.exe
      Filesize

      1.3MB

      MD5

      fbaac522046f0b2c2ded0ba88585f68a

      SHA1

      70f050f44b83c47a41e94de0fd5e88a4f3ba4cf2

      SHA256

      85d72481b46dae1f11917c668a2dcb054fd1d72109c90110d5509060c5f1f7e8

      SHA512

      4ea98ae5c04c5b2e888b4adfc4cf228b8cb634789d65ea3e6721932375252edc3f9c80ed6dda76fef0142bcd25ad5dacebb8272d2ba6ff69f9af68ee82a31046

    • C:\Users\Public\vbc.exe
      Filesize

      1.3MB

      MD5

      fbaac522046f0b2c2ded0ba88585f68a

      SHA1

      70f050f44b83c47a41e94de0fd5e88a4f3ba4cf2

      SHA256

      85d72481b46dae1f11917c668a2dcb054fd1d72109c90110d5509060c5f1f7e8

      SHA512

      4ea98ae5c04c5b2e888b4adfc4cf228b8cb634789d65ea3e6721932375252edc3f9c80ed6dda76fef0142bcd25ad5dacebb8272d2ba6ff69f9af68ee82a31046

    • C:\Users\Public\vbc.exe
      Filesize

      1.3MB

      MD5

      fbaac522046f0b2c2ded0ba88585f68a

      SHA1

      70f050f44b83c47a41e94de0fd5e88a4f3ba4cf2

      SHA256

      85d72481b46dae1f11917c668a2dcb054fd1d72109c90110d5509060c5f1f7e8

      SHA512

      4ea98ae5c04c5b2e888b4adfc4cf228b8cb634789d65ea3e6721932375252edc3f9c80ed6dda76fef0142bcd25ad5dacebb8272d2ba6ff69f9af68ee82a31046

    • C:\Users\Public\vbc.exe
      Filesize

      1.3MB

      MD5

      fbaac522046f0b2c2ded0ba88585f68a

      SHA1

      70f050f44b83c47a41e94de0fd5e88a4f3ba4cf2

      SHA256

      85d72481b46dae1f11917c668a2dcb054fd1d72109c90110d5509060c5f1f7e8

      SHA512

      4ea98ae5c04c5b2e888b4adfc4cf228b8cb634789d65ea3e6721932375252edc3f9c80ed6dda76fef0142bcd25ad5dacebb8272d2ba6ff69f9af68ee82a31046

    • C:\Users\Public\vbc.exe
      Filesize

      1.3MB

      MD5

      fbaac522046f0b2c2ded0ba88585f68a

      SHA1

      70f050f44b83c47a41e94de0fd5e88a4f3ba4cf2

      SHA256

      85d72481b46dae1f11917c668a2dcb054fd1d72109c90110d5509060c5f1f7e8

      SHA512

      4ea98ae5c04c5b2e888b4adfc4cf228b8cb634789d65ea3e6721932375252edc3f9c80ed6dda76fef0142bcd25ad5dacebb8272d2ba6ff69f9af68ee82a31046

    • \Users\Public\vbc.exe
      Filesize

      1.3MB

      MD5

      fbaac522046f0b2c2ded0ba88585f68a

      SHA1

      70f050f44b83c47a41e94de0fd5e88a4f3ba4cf2

      SHA256

      85d72481b46dae1f11917c668a2dcb054fd1d72109c90110d5509060c5f1f7e8

      SHA512

      4ea98ae5c04c5b2e888b4adfc4cf228b8cb634789d65ea3e6721932375252edc3f9c80ed6dda76fef0142bcd25ad5dacebb8272d2ba6ff69f9af68ee82a31046

    • \Users\Public\vbc.exe
      Filesize

      1.3MB

      MD5

      fbaac522046f0b2c2ded0ba88585f68a

      SHA1

      70f050f44b83c47a41e94de0fd5e88a4f3ba4cf2

      SHA256

      85d72481b46dae1f11917c668a2dcb054fd1d72109c90110d5509060c5f1f7e8

      SHA512

      4ea98ae5c04c5b2e888b4adfc4cf228b8cb634789d65ea3e6721932375252edc3f9c80ed6dda76fef0142bcd25ad5dacebb8272d2ba6ff69f9af68ee82a31046

    • memory/756-145-0x0000000004E00000-0x0000000004E40000-memory.dmp
      Filesize

      256KB

    • memory/756-163-0x0000000004420000-0x0000000004426000-memory.dmp
      Filesize

      24KB

    • memory/756-164-0x0000000004F60000-0x0000000004F92000-memory.dmp
      Filesize

      200KB

    • memory/756-153-0x0000000004E00000-0x0000000004E40000-memory.dmp
      Filesize

      256KB

    • memory/756-146-0x0000000000650000-0x000000000066A000-memory.dmp
      Filesize

      104KB

    • memory/756-155-0x0000000005780000-0x000000000582A000-memory.dmp
      Filesize

      680KB

    • memory/756-144-0x00000000002F0000-0x0000000000442000-memory.dmp
      Filesize

      1.3MB

    • memory/756-154-0x0000000000550000-0x000000000055C000-memory.dmp
      Filesize

      48KB

    • memory/904-171-0x0000000002600000-0x0000000002640000-memory.dmp
      Filesize

      256KB

    • memory/904-172-0x0000000002600000-0x0000000002640000-memory.dmp
      Filesize

      256KB

    • memory/904-170-0x0000000002600000-0x0000000002640000-memory.dmp
      Filesize

      256KB

    • memory/1768-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1768-199-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB