Analysis

  • max time kernel
    102s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08-03-2023 08:07

General

  • Target

    PaymentXSlip.docx

  • Size

    10KB

  • MD5

    f300f686821deba927b954a36cb74874

  • SHA1

    1c076c17f47e2942035fcf63709aa85213c4f83d

  • SHA256

    20899b27a51843830df2084dce88cc97d752a7e2dd1a64ad3238080a145fceaf

  • SHA512

    7ddb21922884a405da9a865953c767eafec3ee2ea60b39de3388319cff15d74f11818e391823a42a38729bf973cb86edaee7fe503e7ed75da8d3cd728bcd0e68

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uOAl+CVWBXJC0c3De:SPXU/slT+LOAHkZC9q

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\PaymentXSlip.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:884
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1712
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1896
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TdPQEEr.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1472

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Exploitation for Client Execution

    1
    T1203

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{785B820E-B3EF-49AF-8DB6-ED518417D4A3}.FSD
      Filesize

      128KB

      MD5

      887f7a996525480791942630fac74971

      SHA1

      30c2e62749223de206cf9c7dca8cb1ea38827ece

      SHA256

      a33eb1fd292bb9750412df9544e67d50131dc5ba7cb40ea5bb54747b7159f85c

      SHA512

      7f386ee90f967f0e199d7f9cb9f1e04f419bea288c76be837acd20523e72e8c0e33ffbbfef1b454effd53845a2596ee6634f5e34520dcb890389b3fdb0ccae81

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      72389810badd45b94b92a22de4012500

      SHA1

      d3392e696f8e197060b6066174814bf870449691

      SHA256

      9b47e5331ea073c820fa36de0bf574a75aabd040a984b7dde932f3ca0f37dce7

      SHA512

      43247539a2d4de45efbd2abcd66e3d1e09ba611d028dfd65ac7c5faac098bac95466716050083d56a4e70b7af330d699a1b682be7bcf9531c034979514ed9c48

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{BCD115AA-A2BD-4369-B7C0-5707EF4BC338}.FSD
      Filesize

      128KB

      MD5

      6d93e74d19aa4f0e7196d3673e600e33

      SHA1

      9d89608f186082cc6c43329e6c263ec2cadadf44

      SHA256

      3542dbffe1367b9dc187de33f655473db32d9abc878ed600219e392c09af0610

      SHA512

      dd753caa0dcc7fd31f248758cea02db60d4dec455c2b58aa93042126be6bc6cda21512400d6bb6a91026727ba83e238a85f781184a51aca87e0960acaade456f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EV74ZOZO\31.31.31[1].doc
      Filesize

      11KB

      MD5

      53b7ecf8450a8d221651aafd0a799b05

      SHA1

      cb563241140c9f2dc9842fa777bfe3affcab639a

      SHA256

      caa7719f6020d911cc3e6ad542331508e22180445d7fa9206bf60193cb69d5e9

      SHA512

      1891caf0aea18f7a77598c663a2ad0f39649e28235af340f5db19cef4611d3c55634d689b614caef2cc146e9cbdf3dc0da27b7e1578eccab8c58e39aa1622673

    • C:\Users\Admin\AppData\Local\Temp\{647A29A5-1132-4411-BE1E-EE793DB89437}
      Filesize

      128KB

      MD5

      13b80497762bbf01fac2b89d014669cd

      SHA1

      54d80f65a8be0d56b3ff5f483cf49162a2795cfd

      SHA256

      15d65d9056e0ab02771bf6846553d5c8b65a9e55bace23556e7fa75e047bb21c

      SHA512

      5f206413f963d9fe8061380c4a051970b5d205f66e4a2a663cefc33a567bfbb75c15c93cb6381c4fe0dbab300d1d7c1371e99ebc7a2dde79f4e6d81e382a57af

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      c9ead579ab76a90efaf8a3b2dad492c7

      SHA1

      e8e3199218c620ac96b5467ad36ec3f5eddfea2d

      SHA256

      3cb33115044db94eed6b3b0e3ae9c404e5abddc26ab16a59c4f0720b20b252dc

      SHA512

      7480c8db0f891549060c9fa26756fa6b2ad8a3491a720201769fe1c3b03580fa498d408ccb750f46a2b662453c62729100f01230da39de456649c7349864722c

    • C:\Users\Public\vbc.exe
      Filesize

      1003KB

      MD5

      c4e6210df23d8c36b5fc72a04d91bd89

      SHA1

      9a0e48c1fb63bc93d3c56e134f8f037c9b8292ff

      SHA256

      120de63b8f726ad218289a7562f96160b9a01b5cc62bf98761628b1667502bfa

      SHA512

      fcc4a472ef7895386f2e84c9946f0ae0eda6e1f71f6110690bcbdd5a191d9026045962586528601b1504d117165258a9f7d7fa9ae0c92f7a016acb66b8916fa0

    • C:\Users\Public\vbc.exe
      Filesize

      1003KB

      MD5

      c4e6210df23d8c36b5fc72a04d91bd89

      SHA1

      9a0e48c1fb63bc93d3c56e134f8f037c9b8292ff

      SHA256

      120de63b8f726ad218289a7562f96160b9a01b5cc62bf98761628b1667502bfa

      SHA512

      fcc4a472ef7895386f2e84c9946f0ae0eda6e1f71f6110690bcbdd5a191d9026045962586528601b1504d117165258a9f7d7fa9ae0c92f7a016acb66b8916fa0

    • C:\Users\Public\vbc.exe
      Filesize

      1003KB

      MD5

      c4e6210df23d8c36b5fc72a04d91bd89

      SHA1

      9a0e48c1fb63bc93d3c56e134f8f037c9b8292ff

      SHA256

      120de63b8f726ad218289a7562f96160b9a01b5cc62bf98761628b1667502bfa

      SHA512

      fcc4a472ef7895386f2e84c9946f0ae0eda6e1f71f6110690bcbdd5a191d9026045962586528601b1504d117165258a9f7d7fa9ae0c92f7a016acb66b8916fa0

    • \Users\Public\vbc.exe
      Filesize

      1003KB

      MD5

      c4e6210df23d8c36b5fc72a04d91bd89

      SHA1

      9a0e48c1fb63bc93d3c56e134f8f037c9b8292ff

      SHA256

      120de63b8f726ad218289a7562f96160b9a01b5cc62bf98761628b1667502bfa

      SHA512

      fcc4a472ef7895386f2e84c9946f0ae0eda6e1f71f6110690bcbdd5a191d9026045962586528601b1504d117165258a9f7d7fa9ae0c92f7a016acb66b8916fa0

    • memory/884-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/884-187-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1472-159-0x00000000002D0000-0x0000000000310000-memory.dmp
      Filesize

      256KB

    • memory/1472-160-0x00000000002D0000-0x0000000000310000-memory.dmp
      Filesize

      256KB

    • memory/1472-158-0x00000000002D0000-0x0000000000310000-memory.dmp
      Filesize

      256KB

    • memory/1896-141-0x00000000010E0000-0x00000000011E2000-memory.dmp
      Filesize

      1.0MB

    • memory/1896-152-0x0000000006090000-0x000000000613A000-memory.dmp
      Filesize

      680KB

    • memory/1896-151-0x0000000000460000-0x000000000046C000-memory.dmp
      Filesize

      48KB

    • memory/1896-150-0x0000000004F30000-0x0000000004F70000-memory.dmp
      Filesize

      256KB

    • memory/1896-143-0x0000000000390000-0x00000000003A6000-memory.dmp
      Filesize

      88KB

    • memory/1896-142-0x0000000004F30000-0x0000000004F70000-memory.dmp
      Filesize

      256KB