Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08-03-2023 01:00

General

  • Target

    f8f36bc29327d52d324ff8d2b7f332d0e00f1991e96406aae74ded560631cc99.xls

  • Size

    1.2MB

  • MD5

    18c55c7221e979c7dfd36a8fbb9e7b81

  • SHA1

    169c0f765fde44cddb8eca882b0b6a15e7f70536

  • SHA256

    f8f36bc29327d52d324ff8d2b7f332d0e00f1991e96406aae74ded560631cc99

  • SHA512

    fb4692390470a50598d72c95f844dce1715ab6c9a630682883756c9e66baf53d84ed41ff423f228644d738ac4405c61aed14006cba27f66d40f36e13ac79ed8d

  • SSDEEP

    24576:SLKfBftHlxFWQmmav30xoBb7tHlx/WQmmav30xA6Ff0BPwkDvG8ffqRv57:SLKfn7EQmmQ30S9N7uQmmQ30K6B2PwkE

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\f8f36bc29327d52d324ff8d2b7f332d0e00f1991e96406aae74ded560631cc99.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1980
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Public\vbc.exe
      "C:\Users\Public\vbc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7EBA6F3C.emf

    Filesize

    577KB

    MD5

    d3b4e7d83da7e1ee0106a097b6dcfb96

    SHA1

    534c16799ce03878b5c1adcaec0544714cf328a1

    SHA256

    4ba2df5524662ffb116232fce68c26a39c67136f3238145b92c84ed9afb584ac

    SHA512

    4e6406808d18b5091c1f39d7d3cd56ea1bcd6d002bb16aa7dbe57ee8ecaf09716342df6d6a44c961c95d1441931d2f394b08ff27364968d13abdbccbaded1dd5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\94A58E0D.emf

    Filesize

    34KB

    MD5

    4da86984b73a3de269d5c4267a993b3a

    SHA1

    6011a73f116538923f7f1ea9ccd42984fd6110db

    SHA256

    90004484d7ee2139ca1a19d575106162fa675a558ec4e255291afe0fc135c191

    SHA512

    fc8b66e41d54f5542947851d93f2b198978977a54eae99b78f68fa1301deea5a829726138f4e524b55c3c0dd980f826f68c29148b901fd7f7c820f254dc787c8

  • C:\Users\Public\vbc.exe

    Filesize

    127KB

    MD5

    4d5347cd6edbad9c467080f19bb542b3

    SHA1

    59c7ff6bd76d8e15e26d152dce5bfab744a30d6d

    SHA256

    6c82b21664ffc3883933ae0a1610bd5b5126d1ace96e434bcdbbe40c78de6e40

    SHA512

    1d691d6f7723b188a81873aed9f102b0c53f0be81222024846c6dabed0ea3e79560fc0f2043eb758aba6ef19d96f821d7eb664c881462119d8e48d206b8a5f82

  • C:\Users\Public\vbc.exe

    Filesize

    127KB

    MD5

    4d5347cd6edbad9c467080f19bb542b3

    SHA1

    59c7ff6bd76d8e15e26d152dce5bfab744a30d6d

    SHA256

    6c82b21664ffc3883933ae0a1610bd5b5126d1ace96e434bcdbbe40c78de6e40

    SHA512

    1d691d6f7723b188a81873aed9f102b0c53f0be81222024846c6dabed0ea3e79560fc0f2043eb758aba6ef19d96f821d7eb664c881462119d8e48d206b8a5f82

  • C:\Users\Public\vbc.exe

    Filesize

    127KB

    MD5

    4d5347cd6edbad9c467080f19bb542b3

    SHA1

    59c7ff6bd76d8e15e26d152dce5bfab744a30d6d

    SHA256

    6c82b21664ffc3883933ae0a1610bd5b5126d1ace96e434bcdbbe40c78de6e40

    SHA512

    1d691d6f7723b188a81873aed9f102b0c53f0be81222024846c6dabed0ea3e79560fc0f2043eb758aba6ef19d96f821d7eb664c881462119d8e48d206b8a5f82

  • \Users\Public\vbc.exe

    Filesize

    127KB

    MD5

    4d5347cd6edbad9c467080f19bb542b3

    SHA1

    59c7ff6bd76d8e15e26d152dce5bfab744a30d6d

    SHA256

    6c82b21664ffc3883933ae0a1610bd5b5126d1ace96e434bcdbbe40c78de6e40

    SHA512

    1d691d6f7723b188a81873aed9f102b0c53f0be81222024846c6dabed0ea3e79560fc0f2043eb758aba6ef19d96f821d7eb664c881462119d8e48d206b8a5f82

  • memory/544-73-0x0000000000150000-0x0000000000176000-memory.dmp

    Filesize

    152KB

  • memory/544-74-0x0000000000500000-0x0000000000540000-memory.dmp

    Filesize

    256KB

  • memory/544-76-0x0000000000500000-0x0000000000540000-memory.dmp

    Filesize

    256KB

  • memory/1980-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1980-82-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB