Analysis

  • max time kernel
    103s
  • max time network
    106s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08-03-2023 11:19

General

  • Target

    20899b27a51843830df2084dce88cc97d752a7e2dd1a64ad3238080a145fceaf.docx

  • Size

    10KB

  • MD5

    f300f686821deba927b954a36cb74874

  • SHA1

    1c076c17f47e2942035fcf63709aa85213c4f83d

  • SHA256

    20899b27a51843830df2084dce88cc97d752a7e2dd1a64ad3238080a145fceaf

  • SHA512

    7ddb21922884a405da9a865953c767eafec3ee2ea60b39de3388319cff15d74f11818e391823a42a38729bf973cb86edaee7fe503e7ed75da8d3cd728bcd0e68

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uOAl+CVWBXJC0c3De:SPXU/slT+LOAHkZC9q

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\20899b27a51843830df2084dce88cc97d752a7e2dd1a64ad3238080a145fceaf.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1176
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1744
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TdPQEEr.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:832

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Exploitation for Client Execution

    1
    T1203

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{39C10D5A-8A8D-400C-A8C0-F64FC5B0DA22}.FSD
      Filesize

      128KB

      MD5

      12c449709a6b6c61448e9e92aa723d21

      SHA1

      dc2628da37f3b517bd453c3cab0ab21a01acb634

      SHA256

      bbf5e593ca472974dde07a1c55b2a46fc21ce9bb2d1ff88cf5f5ec36911c937c

      SHA512

      6e393a511c92e3c18b7c32c49bcc1da68beb40daa2b36875b9c4fe9e0ef50696fbce6a57973e97a6a5344eeb5697c93b483fe553db7fb354aa206b907909fcec

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      377af2cc5d9d1c218cf7bafdd7a334d0

      SHA1

      693893e0be3d0381bd27c36ba261bd3e4ff29424

      SHA256

      7f28a6862841a811b9b6a64907f23a8166a6162f70abc02b3407ab72e7f0b13e

      SHA512

      cf59ad3bf508dcd2bce52fc147d405bcdf69a3111d95247e3aa207ba4922926e1301a9c61fa4bcd3e0a0d858ebb2fb15eb0b33062dd6e73af1e737412bbbb323

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{A056A53D-AD0D-4DF5-9106-61A5E85D1026}.FSD
      Filesize

      128KB

      MD5

      c0340c63cd00ab92a8651c3edaebfaa5

      SHA1

      33a2fe3f6f0b102e485ff47454301e8d1415fd68

      SHA256

      f8b3831178129d98cb0b1312dd416e89f20505d8ece8b4b57a3f4de3a01b57c4

      SHA512

      6c1c54fb5a402c78d61d8d52a8ce4944e6c4926e37877b5dd55b05da0560ae07169743dcfd8af0c5d56643f942f5d8905b8d26af5636f159131b8b9ca5ba0461

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QCNSQOTT\31.31.31[1].doc
      Filesize

      11KB

      MD5

      53b7ecf8450a8d221651aafd0a799b05

      SHA1

      cb563241140c9f2dc9842fa777bfe3affcab639a

      SHA256

      caa7719f6020d911cc3e6ad542331508e22180445d7fa9206bf60193cb69d5e9

      SHA512

      1891caf0aea18f7a77598c663a2ad0f39649e28235af340f5db19cef4611d3c55634d689b614caef2cc146e9cbdf3dc0da27b7e1578eccab8c58e39aa1622673

    • C:\Users\Admin\AppData\Local\Temp\{1C75ADFD-1D88-4279-8A09-C1B825D3DF34}
      Filesize

      128KB

      MD5

      52d6df970751f2395f0119dc1c909453

      SHA1

      e9409678054424810267e0227f89f98fcea757b5

      SHA256

      877554a7fd2721000ffacd7a7b973fbeaad6378b04b9e2449f29980afa682e52

      SHA512

      4db3b2a6d6f204059a83f98928f7ff96d1e083f29e2e588d2ba727abc05b62021655bcf9b69651fdccb21d62964d2512112ddd932560847648939af0249738e8

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
      Filesize

      72B

      MD5

      ab23a470ff5376d604db419fb5b2bebd

      SHA1

      0a551a563c64e4cc85422b5d61adf5e041463eef

      SHA256

      1252f040391357cb272f398f38980dff24c1b917a53044cdde512602085fa5cf

      SHA512

      180d6e46c60496c0002fe7937b3ad13568293a0a56b0a17c020ffab9129af311d9fa3566f6dcf8b552fb2178a384f6320fb9b98cea64dff88a79370b298a5957

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      32ac8e47dc55ec9a728de2e8aff2354b

      SHA1

      9c7049b29ee7b3f189ed317ffb45b5ee304441bb

      SHA256

      dd7d2e0e2a5008f34bd4f37a52f3e4d7d462e1e0a8db44967a23fe4543e73840

      SHA512

      85405a94f058b747a0b01b5c59c404e756717b7b8f2c8f082ab8ff69670c462301389bb831c87cfcb5e976eac7845bf5974e5d69e0411ba09f2b7c5892ad9584

    • C:\Users\Public\vbc.exe
      Filesize

      1003KB

      MD5

      c4e6210df23d8c36b5fc72a04d91bd89

      SHA1

      9a0e48c1fb63bc93d3c56e134f8f037c9b8292ff

      SHA256

      120de63b8f726ad218289a7562f96160b9a01b5cc62bf98761628b1667502bfa

      SHA512

      fcc4a472ef7895386f2e84c9946f0ae0eda6e1f71f6110690bcbdd5a191d9026045962586528601b1504d117165258a9f7d7fa9ae0c92f7a016acb66b8916fa0

    • C:\Users\Public\vbc.exe
      Filesize

      1003KB

      MD5

      c4e6210df23d8c36b5fc72a04d91bd89

      SHA1

      9a0e48c1fb63bc93d3c56e134f8f037c9b8292ff

      SHA256

      120de63b8f726ad218289a7562f96160b9a01b5cc62bf98761628b1667502bfa

      SHA512

      fcc4a472ef7895386f2e84c9946f0ae0eda6e1f71f6110690bcbdd5a191d9026045962586528601b1504d117165258a9f7d7fa9ae0c92f7a016acb66b8916fa0

    • C:\Users\Public\vbc.exe
      Filesize

      1003KB

      MD5

      c4e6210df23d8c36b5fc72a04d91bd89

      SHA1

      9a0e48c1fb63bc93d3c56e134f8f037c9b8292ff

      SHA256

      120de63b8f726ad218289a7562f96160b9a01b5cc62bf98761628b1667502bfa

      SHA512

      fcc4a472ef7895386f2e84c9946f0ae0eda6e1f71f6110690bcbdd5a191d9026045962586528601b1504d117165258a9f7d7fa9ae0c92f7a016acb66b8916fa0

    • \Users\Public\vbc.exe
      Filesize

      1003KB

      MD5

      c4e6210df23d8c36b5fc72a04d91bd89

      SHA1

      9a0e48c1fb63bc93d3c56e134f8f037c9b8292ff

      SHA256

      120de63b8f726ad218289a7562f96160b9a01b5cc62bf98761628b1667502bfa

      SHA512

      fcc4a472ef7895386f2e84c9946f0ae0eda6e1f71f6110690bcbdd5a191d9026045962586528601b1504d117165258a9f7d7fa9ae0c92f7a016acb66b8916fa0

    • memory/832-159-0x00000000026B0000-0x00000000026F0000-memory.dmp
      Filesize

      256KB

    • memory/832-160-0x00000000026B0000-0x00000000026F0000-memory.dmp
      Filesize

      256KB

    • memory/832-158-0x00000000026B0000-0x00000000026F0000-memory.dmp
      Filesize

      256KB

    • memory/1744-142-0x0000000001070000-0x0000000001172000-memory.dmp
      Filesize

      1.0MB

    • memory/1744-152-0x0000000005E00000-0x0000000005EAA000-memory.dmp
      Filesize

      680KB

    • memory/1744-151-0x00000000006A0000-0x00000000006AC000-memory.dmp
      Filesize

      48KB

    • memory/1744-150-0x0000000004DE0000-0x0000000004E20000-memory.dmp
      Filesize

      256KB

    • memory/1744-149-0x0000000000630000-0x0000000000646000-memory.dmp
      Filesize

      88KB

    • memory/1744-143-0x0000000004DE0000-0x0000000004E20000-memory.dmp
      Filesize

      256KB

    • memory/2008-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2008-187-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB