Analysis

  • max time kernel
    103s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2023 10:23

General

  • Target

    NEW PO#10123.xls

  • Size

    1.2MB

  • MD5

    29e47e965aac7474d30b61f1c0889eb3

  • SHA1

    fb752bc267f366a95afe4ef6df9cfa335113983e

  • SHA256

    1008f41fbb9f5f59b36e40fe285c18f0ead78d68ef4bfa630123ee9cd2629729

  • SHA512

    da3169dd3c6626033d17c19c59b0af547dd2c02b16abf4dc385908dd90eb07c780c8dfffac93e37d621349cc1d401ed1027b0c9b1128f5716243ad1b7dfa4b37

  • SSDEEP

    24576:WLKgBUWQmmav30xVBLWQmmav30xfyWQmmav30xkB7oWQmmav30xV6EE15irKuypT:WLKgBpQmmQ30rUQmmQ30N3QmmQ306l9d

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\NEW PO#10123.xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1920
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Launches Equation Editor
    PID:1072

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4D51BA0F.emf

    Filesize

    34KB

    MD5

    f73a3efe342adfa0702f96aa3701620a

    SHA1

    470a70e344798253fe37d5dd2c6d5b36de645867

    SHA256

    d3a45bc30791fb3eace3667f5a42281ba030145dd744dce24e4856486ebe53ac

    SHA512

    372e98abe72bc80ce5013c154713e98de1bc6db954d27945e1bc0bfdd5f394846b84c19ab50f71d1626749790972d9ae7907541fd8bffff93bb85375d9cff9cb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B47E3B99.emf

    Filesize

    577KB

    MD5

    3a7ca870131b151a91e4ab8fa0729e10

    SHA1

    1cbc12d6bd7445bb12b4fbc1b2083cdddd5bc809

    SHA256

    43b9c12e49d5b0e9382ad219417d5bedcaca2bc4d22e70e6834d9b9f84bbdeaf

    SHA512

    26f246adc6fc1788d9d3b8594f9641deb85261b5331c9d862d060d2b7d4749256f7e93491bf3bc711ef4ef7d721aef92c4b598ffa3eebe3362a941cb6f277f7d

  • memory/1920-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1920-69-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB