Analysis

  • max time kernel
    102s
  • max time network
    106s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08-03-2023 10:25

General

  • Target

    20899b27a51843830df2084dce88cc97d752a7e2dd1a64ad3238080a145fceaf.docx

  • Size

    10KB

  • MD5

    f300f686821deba927b954a36cb74874

  • SHA1

    1c076c17f47e2942035fcf63709aa85213c4f83d

  • SHA256

    20899b27a51843830df2084dce88cc97d752a7e2dd1a64ad3238080a145fceaf

  • SHA512

    7ddb21922884a405da9a865953c767eafec3ee2ea60b39de3388319cff15d74f11818e391823a42a38729bf973cb86edaee7fe503e7ed75da8d3cd728bcd0e68

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uOAl+CVWBXJC0c3De:SPXU/slT+LOAHkZC9q

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\20899b27a51843830df2084dce88cc97d752a7e2dd1a64ad3238080a145fceaf.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1532
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1096
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1592
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TdPQEEr.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:924

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Exploitation for Client Execution

    1
    T1203

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      fff5711f15c4f9ede82783cbff9e386d

      SHA1

      a90b346dc8831caf22168a385e20b2063648daca

      SHA256

      1a888331b6b8652d48125c5c56c8fb28f2b96e79d8b0e60b45e9b26445042046

      SHA512

      1f1ff2e183406a330fd8fbc9545829c9702e5db0f51d69cb995ad8e8568948bfa4d51f9ff9dd6e48bbdf34e95fb5c9131fee532850f0cf7d638525fd436d9b30

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{864F43B9-781C-4AA1-9C13-A81A0F77979F}.FSD
      Filesize

      128KB

      MD5

      ee0e783546c6a4271fc84d90ddbf688e

      SHA1

      2bc88d66b9c6594e456949651a4a4f6ec53abc23

      SHA256

      dd3ced2e8a93da57372545ca4fa35b44bb866d06417cc94795e01f8bb119bc88

      SHA512

      37843a502e0f1933723c093277528a98ad8d9e2074c1876660c7e2b98ea2a7c408b408fb23e94df46ff243c76a97d33fe94deaf452abd3ab50c83da683f1df8c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ACT9UUKV\31.31.31[1].doc
      Filesize

      11KB

      MD5

      53b7ecf8450a8d221651aafd0a799b05

      SHA1

      cb563241140c9f2dc9842fa777bfe3affcab639a

      SHA256

      caa7719f6020d911cc3e6ad542331508e22180445d7fa9206bf60193cb69d5e9

      SHA512

      1891caf0aea18f7a77598c663a2ad0f39649e28235af340f5db19cef4611d3c55634d689b614caef2cc146e9cbdf3dc0da27b7e1578eccab8c58e39aa1622673

    • C:\Users\Admin\AppData\Local\Temp\{F6AF17A4-D285-4344-82AF-6399E81286A3}
      Filesize

      128KB

      MD5

      ebf82775db9bec2d961c875a1fd3b265

      SHA1

      af4cb231006931c8911b629175d8f867230e9f1f

      SHA256

      d073acf15bb90af722305442f6611ad998c4403853c1899dd174be18516fd1d7

      SHA512

      00df575ad65513591bb59d84b195dafdd7863c64bf76dab175ee46dc549bb406ea4010678db63aab140ebf0ef8da3c42bb9b68cfff1d14685b535d538e2a90bc

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
      Filesize

      72B

      MD5

      ab23a470ff5376d604db419fb5b2bebd

      SHA1

      0a551a563c64e4cc85422b5d61adf5e041463eef

      SHA256

      1252f040391357cb272f398f38980dff24c1b917a53044cdde512602085fa5cf

      SHA512

      180d6e46c60496c0002fe7937b3ad13568293a0a56b0a17c020ffab9129af311d9fa3566f6dcf8b552fb2178a384f6320fb9b98cea64dff88a79370b298a5957

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      fcf288fa67dba89aa1f13040419dc427

      SHA1

      501a1205a2b58e0c3d09c4b0bd6ceac8728baff5

      SHA256

      f970ddde44a839325432766adc464ff6b328554a758b28aae4f70587144ae692

      SHA512

      3102fde9082ed2f3679e543ff43fd55b0de0dda77e36718a28de15066af02836617236ffe036c895a37f915e237a07b97b9eeec31e6cb28f61bd23c39e851df6

    • C:\Users\Public\vbc.exe
      Filesize

      1003KB

      MD5

      c4e6210df23d8c36b5fc72a04d91bd89

      SHA1

      9a0e48c1fb63bc93d3c56e134f8f037c9b8292ff

      SHA256

      120de63b8f726ad218289a7562f96160b9a01b5cc62bf98761628b1667502bfa

      SHA512

      fcc4a472ef7895386f2e84c9946f0ae0eda6e1f71f6110690bcbdd5a191d9026045962586528601b1504d117165258a9f7d7fa9ae0c92f7a016acb66b8916fa0

    • C:\Users\Public\vbc.exe
      Filesize

      1003KB

      MD5

      c4e6210df23d8c36b5fc72a04d91bd89

      SHA1

      9a0e48c1fb63bc93d3c56e134f8f037c9b8292ff

      SHA256

      120de63b8f726ad218289a7562f96160b9a01b5cc62bf98761628b1667502bfa

      SHA512

      fcc4a472ef7895386f2e84c9946f0ae0eda6e1f71f6110690bcbdd5a191d9026045962586528601b1504d117165258a9f7d7fa9ae0c92f7a016acb66b8916fa0

    • C:\Users\Public\vbc.exe
      Filesize

      1003KB

      MD5

      c4e6210df23d8c36b5fc72a04d91bd89

      SHA1

      9a0e48c1fb63bc93d3c56e134f8f037c9b8292ff

      SHA256

      120de63b8f726ad218289a7562f96160b9a01b5cc62bf98761628b1667502bfa

      SHA512

      fcc4a472ef7895386f2e84c9946f0ae0eda6e1f71f6110690bcbdd5a191d9026045962586528601b1504d117165258a9f7d7fa9ae0c92f7a016acb66b8916fa0

    • \Users\Public\vbc.exe
      Filesize

      1003KB

      MD5

      c4e6210df23d8c36b5fc72a04d91bd89

      SHA1

      9a0e48c1fb63bc93d3c56e134f8f037c9b8292ff

      SHA256

      120de63b8f726ad218289a7562f96160b9a01b5cc62bf98761628b1667502bfa

      SHA512

      fcc4a472ef7895386f2e84c9946f0ae0eda6e1f71f6110690bcbdd5a191d9026045962586528601b1504d117165258a9f7d7fa9ae0c92f7a016acb66b8916fa0

    • memory/924-160-0x0000000002450000-0x0000000002490000-memory.dmp
      Filesize

      256KB

    • memory/924-159-0x0000000002450000-0x0000000002490000-memory.dmp
      Filesize

      256KB

    • memory/924-158-0x0000000002450000-0x0000000002490000-memory.dmp
      Filesize

      256KB

    • memory/1592-143-0x0000000000360000-0x0000000000376000-memory.dmp
      Filesize

      88KB

    • memory/1592-150-0x0000000000500000-0x0000000000540000-memory.dmp
      Filesize

      256KB

    • memory/1592-151-0x00000000003D0000-0x00000000003DC000-memory.dmp
      Filesize

      48KB

    • memory/1592-152-0x0000000005F80000-0x000000000602A000-memory.dmp
      Filesize

      680KB

    • memory/1592-142-0x0000000000500000-0x0000000000540000-memory.dmp
      Filesize

      256KB

    • memory/1592-141-0x0000000000840000-0x0000000000942000-memory.dmp
      Filesize

      1.0MB

    • memory/2012-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2012-187-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB