Analysis
-
max time kernel
103s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-03-2023 13:32
Static task
static1
Behavioral task
behavioral1
Sample
Need Price No.34 10-03-2023.xlsx
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Need Price No.34 10-03-2023.xlsx
Resource
win10v2004-20230220-en
General
-
Target
Need Price No.34 10-03-2023.xlsx
-
Size
1.0MB
-
MD5
afd2e15a47dc9394c96f5e83078ea288
-
SHA1
b17977343c32004cc7e2f692fd04ee0ec3bea0b5
-
SHA256
c1158a1df03d75859f08f5e9f8909ea8bf5c63a6dbc78485d543dfa461cfe478
-
SHA512
04fe7fc6491f67a7aa52bfd1a9a47861ea555c3a68b5bf75b79727126cb8b9ff6b33d1dfff7797ff60cd4cf35f596f376348b053da230f44e62f2640be7ea1a9
-
SSDEEP
24576:9bvFPyNd0ViftpBbbnKpm7BYYnhyovhkfbXk/jj2HB:bPyNqif7VnK5Aysh8XmjKh
Malware Config
Extracted
warzonerat
konkation.duckdns.org:6548
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/692-80-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral1/memory/692-84-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral1/memory/692-85-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral1/memory/692-86-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral1/memory/692-87-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat -
Blocklisted process makes network request 1 IoCs
Processes:
EQNEDT32.EXEflow pid process 4 1420 EQNEDT32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
word.execbfwfm.execbfwfm.exepid process 564 word.exe 1680 cbfwfm.exe 692 cbfwfm.exe -
Loads dropped DLL 4 IoCs
Processes:
EQNEDT32.EXEword.execbfwfm.exepid process 1420 EQNEDT32.EXE 564 word.exe 564 word.exe 1680 cbfwfm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cbfwfm.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\pyienjscxh = "C:\\Users\\Admin\\AppData\\Roaming\\plueajsoxtd\\mirbwgckt.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\cbfwfm.exe\" C:\\Users\\Admin\\AppData\\Loc" cbfwfm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cbfwfm.exedescription pid process target process PID 1680 set thread context of 692 1680 cbfwfm.exe cbfwfm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
-
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE -
Modifies registry class 64 IoCs
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1388 EXCEL.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
cbfwfm.exepid process 1680 cbfwfm.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
EXCEL.EXEcbfwfm.exepid process 1388 EXCEL.EXE 1388 EXCEL.EXE 1388 EXCEL.EXE 692 cbfwfm.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
EQNEDT32.EXEword.execbfwfm.exedescription pid process target process PID 1420 wrote to memory of 564 1420 EQNEDT32.EXE word.exe PID 1420 wrote to memory of 564 1420 EQNEDT32.EXE word.exe PID 1420 wrote to memory of 564 1420 EQNEDT32.EXE word.exe PID 1420 wrote to memory of 564 1420 EQNEDT32.EXE word.exe PID 564 wrote to memory of 1680 564 word.exe cbfwfm.exe PID 564 wrote to memory of 1680 564 word.exe cbfwfm.exe PID 564 wrote to memory of 1680 564 word.exe cbfwfm.exe PID 564 wrote to memory of 1680 564 word.exe cbfwfm.exe PID 1680 wrote to memory of 692 1680 cbfwfm.exe cbfwfm.exe PID 1680 wrote to memory of 692 1680 cbfwfm.exe cbfwfm.exe PID 1680 wrote to memory of 692 1680 cbfwfm.exe cbfwfm.exe PID 1680 wrote to memory of 692 1680 cbfwfm.exe cbfwfm.exe PID 1680 wrote to memory of 692 1680 cbfwfm.exe cbfwfm.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Need Price No.34 10-03-2023.xlsx"1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\word.exeC:\Users\Admin\AppData\Roaming\word.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cbfwfm.exe"C:\Users\Admin\AppData\Local\Temp\cbfwfm.exe" C:\Users\Admin\AppData\Local\Temp\ontipan.ad3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cbfwfm.exe"C:\Users\Admin\AppData\Local\Temp\cbfwfm.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\cagre.ecrFilesize
118KB
MD5f9e7e2b025055998a8e9325cc9cb979a
SHA15a11be58906d43ca8d8bc0c93c1c56fd44092d06
SHA256f24fb4a0bcc5bcd05d689c600265b84b3312022b1ab83115503a1fe498cf3e4f
SHA512ebce4d867beac04df2e5aea7bd310febcbcc0abbbea0aaea3956c79b85134ce8c4ae7cdf8aed6b83a4cfe36ce73c4bec5df81463fa39239cedce48544c2ce431
-
C:\Users\Admin\AppData\Local\Temp\cbfwfm.exeFilesize
52KB
MD5a508f5e6428e14f8069765a275203762
SHA1dfdfb6030dfff329df129b8867b61fc07d504c23
SHA256a115161d9d3b2fea2752ca1f4e1bc252a39aabac8905a5b9a0d131f051f442f4
SHA51294f57823d6a2ba94bc817e1157b17e615e6e1482872081a8a1398791589a2623d7e933ba2654b01046f64ff70264f3aa3db83807ec2046dd0f151bd39c1693c9
-
C:\Users\Admin\AppData\Local\Temp\cbfwfm.exeFilesize
52KB
MD5a508f5e6428e14f8069765a275203762
SHA1dfdfb6030dfff329df129b8867b61fc07d504c23
SHA256a115161d9d3b2fea2752ca1f4e1bc252a39aabac8905a5b9a0d131f051f442f4
SHA51294f57823d6a2ba94bc817e1157b17e615e6e1482872081a8a1398791589a2623d7e933ba2654b01046f64ff70264f3aa3db83807ec2046dd0f151bd39c1693c9
-
C:\Users\Admin\AppData\Local\Temp\cbfwfm.exeFilesize
52KB
MD5a508f5e6428e14f8069765a275203762
SHA1dfdfb6030dfff329df129b8867b61fc07d504c23
SHA256a115161d9d3b2fea2752ca1f4e1bc252a39aabac8905a5b9a0d131f051f442f4
SHA51294f57823d6a2ba94bc817e1157b17e615e6e1482872081a8a1398791589a2623d7e933ba2654b01046f64ff70264f3aa3db83807ec2046dd0f151bd39c1693c9
-
C:\Users\Admin\AppData\Local\Temp\cbfwfm.exeFilesize
52KB
MD5a508f5e6428e14f8069765a275203762
SHA1dfdfb6030dfff329df129b8867b61fc07d504c23
SHA256a115161d9d3b2fea2752ca1f4e1bc252a39aabac8905a5b9a0d131f051f442f4
SHA51294f57823d6a2ba94bc817e1157b17e615e6e1482872081a8a1398791589a2623d7e933ba2654b01046f64ff70264f3aa3db83807ec2046dd0f151bd39c1693c9
-
C:\Users\Admin\AppData\Local\Temp\ontipan.adFilesize
7KB
MD5a110333ff38bf9ff2f10115ef7a8d7d2
SHA13e4525ea307e805efb04ed91d141d691d337e80d
SHA2562a15e782ed7543edf77774fd70223ee754239bf81ef34e0591d6be58ee0d7f13
SHA51236dc22ab774a784417b9dfa391c328b40057f88fa22845e78d8c1a4ad8c4a3ad0417c6fdb04bc253073e729a2df3a9494d605d3a673fbe62dbc599fbdbbeef30
-
C:\Users\Admin\AppData\Roaming\word.exeFilesize
173KB
MD58680a5f11b1be1a28ee90eac5c6b1a66
SHA18b98db38f355689079eb6337b5f42ca5af0afa66
SHA256dc323a8e0f5791312026fc4694620848be068af5561fd59e7de1ef56b188cebb
SHA51271464025ee1791af9fd3fbb9b2956c399868e848bd7e16871ffefa4331ee97fb7f97f01308467a7c8b8c1ffd201758007dc7c9aaa719bae2355b7250d3fb6a2d
-
C:\Users\Admin\AppData\Roaming\word.exeFilesize
173KB
MD58680a5f11b1be1a28ee90eac5c6b1a66
SHA18b98db38f355689079eb6337b5f42ca5af0afa66
SHA256dc323a8e0f5791312026fc4694620848be068af5561fd59e7de1ef56b188cebb
SHA51271464025ee1791af9fd3fbb9b2956c399868e848bd7e16871ffefa4331ee97fb7f97f01308467a7c8b8c1ffd201758007dc7c9aaa719bae2355b7250d3fb6a2d
-
C:\Users\Admin\AppData\Roaming\word.exeFilesize
173KB
MD58680a5f11b1be1a28ee90eac5c6b1a66
SHA18b98db38f355689079eb6337b5f42ca5af0afa66
SHA256dc323a8e0f5791312026fc4694620848be068af5561fd59e7de1ef56b188cebb
SHA51271464025ee1791af9fd3fbb9b2956c399868e848bd7e16871ffefa4331ee97fb7f97f01308467a7c8b8c1ffd201758007dc7c9aaa719bae2355b7250d3fb6a2d
-
\Users\Admin\AppData\Local\Temp\cbfwfm.exeFilesize
52KB
MD5a508f5e6428e14f8069765a275203762
SHA1dfdfb6030dfff329df129b8867b61fc07d504c23
SHA256a115161d9d3b2fea2752ca1f4e1bc252a39aabac8905a5b9a0d131f051f442f4
SHA51294f57823d6a2ba94bc817e1157b17e615e6e1482872081a8a1398791589a2623d7e933ba2654b01046f64ff70264f3aa3db83807ec2046dd0f151bd39c1693c9
-
\Users\Admin\AppData\Local\Temp\cbfwfm.exeFilesize
52KB
MD5a508f5e6428e14f8069765a275203762
SHA1dfdfb6030dfff329df129b8867b61fc07d504c23
SHA256a115161d9d3b2fea2752ca1f4e1bc252a39aabac8905a5b9a0d131f051f442f4
SHA51294f57823d6a2ba94bc817e1157b17e615e6e1482872081a8a1398791589a2623d7e933ba2654b01046f64ff70264f3aa3db83807ec2046dd0f151bd39c1693c9
-
\Users\Admin\AppData\Local\Temp\cbfwfm.exeFilesize
52KB
MD5a508f5e6428e14f8069765a275203762
SHA1dfdfb6030dfff329df129b8867b61fc07d504c23
SHA256a115161d9d3b2fea2752ca1f4e1bc252a39aabac8905a5b9a0d131f051f442f4
SHA51294f57823d6a2ba94bc817e1157b17e615e6e1482872081a8a1398791589a2623d7e933ba2654b01046f64ff70264f3aa3db83807ec2046dd0f151bd39c1693c9
-
\Users\Admin\AppData\Roaming\word.exeFilesize
173KB
MD58680a5f11b1be1a28ee90eac5c6b1a66
SHA18b98db38f355689079eb6337b5f42ca5af0afa66
SHA256dc323a8e0f5791312026fc4694620848be068af5561fd59e7de1ef56b188cebb
SHA51271464025ee1791af9fd3fbb9b2956c399868e848bd7e16871ffefa4331ee97fb7f97f01308467a7c8b8c1ffd201758007dc7c9aaa719bae2355b7250d3fb6a2d
-
memory/692-80-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/692-84-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/692-85-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/692-86-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/692-87-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/1388-54-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1388-89-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB