Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22-03-2023 10:01
Static task
static1
Behavioral task
behavioral1
Sample
Items Required.pdf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Items Required.pdf
Resource
win10v2004-20230220-en
General
-
Target
Items Required.pdf
-
Size
3.1MB
-
MD5
7bce6abaafcc35245df3d74e76855558
-
SHA1
678f93c6d46c3194a4440e9e7856e21efd84c198
-
SHA256
752d06bd8ff5e075fb69e52626f9983bcfeb51e5eed191ebbf7ca453bc524d1d
-
SHA512
c6ebfa6f8a4e7aee8e74127bf714e7a6918d03daa52ea1abaa3e653baf91e6bf3ce42a7130460b98b0034c694e42705a6d4ccd3a269845640b7b5ccdfc513358
-
SSDEEP
98304:T4R97CScENc/i//clqkMRScE1416sXHWiLLVKG:/ScENc/i//clqkMRScE1413nnkG
Malware Config
Extracted
formbook
4.1
bk08
chloie.net
fastingersecure.monster
foundersterrace.online
ytorly.xyz
kiralayolla.com
corporacionalpi.com
planfortheworld.com
disciplinecoaching.co.uk
rubi33.com
digitlabmedia.com
ky20033.com
h4q7.com
91ye260.xyz
coconceptevents.com
ukusizas.africa
utainnovative.africa
ted-clean.co.uk
haus-huelsche.com
ca-refund.website
football.salon
cloudprovident.com
donesgaiwork.com
lilycandles.com
fiedjapan.com
bioticawater.co.uk
adaptiveinvestmentsllc.com
coreypowers.com
kci.biz
everlegacycoldstorage.online
blackmatchgaming.com
alnour-avocats.com
hotelvillaverdehn.com
furniture-47390.com
bnekesoi.link
hitidigital.net
c66u.xyz
inc64.com
autoe.live
ttl7645.com
ergoconstructionservices.ltd
mythologynme.com
6n899.com
haveskeimany.com
ghhhrhbdfghapi02.xyz
cookiesseedzbank.com
diyet.app
denizatiplushotel.com
indiahalalexpo.com
evklvq.com
distrolution.app
accel.top
laniemade.com
n13ax.com
19luxu.com
funfact-infoworld.com
acnereset.com
jamestownohiochamber.com
leadgeneration.works
1wijjx.top
appsinclouds.site
biz4search.online
houseofperson.com
karencaseyphoto.net
76845.site
7701666.vip
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/912-135-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/912-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1740-147-0x0000000000090000-0x00000000000BF000-memory.dmp formbook behavioral1/memory/1740-149-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Blocklisted process makes network request 1 IoCs
Processes:
EQNEDT32.EXEflow pid process 3 1796 EQNEDT32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
vbc.exevbc.exepid process 1344 vbc.exe 912 vbc.exe -
Loads dropped DLL 2 IoCs
Processes:
EQNEDT32.EXEpid process 1796 EQNEDT32.EXE 1796 EQNEDT32.EXE -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
vbc.exevbc.exemsiexec.exedescription pid process target process PID 1344 set thread context of 912 1344 vbc.exe vbc.exe PID 912 set thread context of 1220 912 vbc.exe Explorer.EXE PID 1740 set thread context of 1220 1740 msiexec.exe Explorer.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
-
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE -
Modifies registry class 64 IoCs
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 748 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
vbc.exemsiexec.exepid process 912 vbc.exe 912 vbc.exe 1740 msiexec.exe 1740 msiexec.exe 1740 msiexec.exe 1740 msiexec.exe 1740 msiexec.exe 1740 msiexec.exe 1740 msiexec.exe 1740 msiexec.exe 1740 msiexec.exe 1740 msiexec.exe 1740 msiexec.exe 1740 msiexec.exe 1740 msiexec.exe 1740 msiexec.exe 1740 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
vbc.exemsiexec.exepid process 912 vbc.exe 912 vbc.exe 912 vbc.exe 1740 msiexec.exe 1740 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
vbc.exemsiexec.exedescription pid process Token: SeDebugPrivilege 912 vbc.exe Token: SeDebugPrivilege 1740 msiexec.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
Processes:
AcroRd32.exeEXCEL.EXEWINWORD.EXEpid process 1724 AcroRd32.exe 1724 AcroRd32.exe 1724 AcroRd32.exe 748 EXCEL.EXE 748 EXCEL.EXE 748 EXCEL.EXE 296 WINWORD.EXE 296 WINWORD.EXE 296 WINWORD.EXE 296 WINWORD.EXE 296 WINWORD.EXE 296 WINWORD.EXE 296 WINWORD.EXE 296 WINWORD.EXE 296 WINWORD.EXE 296 WINWORD.EXE 296 WINWORD.EXE 296 WINWORD.EXE 296 WINWORD.EXE 296 WINWORD.EXE 296 WINWORD.EXE 296 WINWORD.EXE -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
AcroRd32.exeEQNEDT32.EXEWINWORD.EXEvbc.exeExplorer.EXEmsiexec.exedescription pid process target process PID 1724 wrote to memory of 748 1724 AcroRd32.exe EXCEL.EXE PID 1724 wrote to memory of 748 1724 AcroRd32.exe EXCEL.EXE PID 1724 wrote to memory of 748 1724 AcroRd32.exe EXCEL.EXE PID 1724 wrote to memory of 748 1724 AcroRd32.exe EXCEL.EXE PID 1724 wrote to memory of 748 1724 AcroRd32.exe EXCEL.EXE PID 1724 wrote to memory of 748 1724 AcroRd32.exe EXCEL.EXE PID 1724 wrote to memory of 748 1724 AcroRd32.exe EXCEL.EXE PID 1724 wrote to memory of 748 1724 AcroRd32.exe EXCEL.EXE PID 1724 wrote to memory of 748 1724 AcroRd32.exe EXCEL.EXE PID 1796 wrote to memory of 1344 1796 EQNEDT32.EXE vbc.exe PID 1796 wrote to memory of 1344 1796 EQNEDT32.EXE vbc.exe PID 1796 wrote to memory of 1344 1796 EQNEDT32.EXE vbc.exe PID 1796 wrote to memory of 1344 1796 EQNEDT32.EXE vbc.exe PID 296 wrote to memory of 1840 296 WINWORD.EXE splwow64.exe PID 296 wrote to memory of 1840 296 WINWORD.EXE splwow64.exe PID 296 wrote to memory of 1840 296 WINWORD.EXE splwow64.exe PID 296 wrote to memory of 1840 296 WINWORD.EXE splwow64.exe PID 1344 wrote to memory of 912 1344 vbc.exe vbc.exe PID 1344 wrote to memory of 912 1344 vbc.exe vbc.exe PID 1344 wrote to memory of 912 1344 vbc.exe vbc.exe PID 1344 wrote to memory of 912 1344 vbc.exe vbc.exe PID 1344 wrote to memory of 912 1344 vbc.exe vbc.exe PID 1344 wrote to memory of 912 1344 vbc.exe vbc.exe PID 1344 wrote to memory of 912 1344 vbc.exe vbc.exe PID 1220 wrote to memory of 1740 1220 Explorer.EXE msiexec.exe PID 1220 wrote to memory of 1740 1220 Explorer.EXE msiexec.exe PID 1220 wrote to memory of 1740 1220 Explorer.EXE msiexec.exe PID 1220 wrote to memory of 1740 1220 Explorer.EXE msiexec.exe PID 1220 wrote to memory of 1740 1220 Explorer.EXE msiexec.exe PID 1220 wrote to memory of 1740 1220 Explorer.EXE msiexec.exe PID 1220 wrote to memory of 1740 1220 Explorer.EXE msiexec.exe PID 1740 wrote to memory of 784 1740 msiexec.exe cmd.exe PID 1740 wrote to memory of 784 1740 msiexec.exe cmd.exe PID 1740 wrote to memory of 784 1740 msiexec.exe cmd.exe PID 1740 wrote to memory of 784 1740 msiexec.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Items Required.pdf"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde3⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:748 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Public\vbc.exe"3⤵PID:784
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Public\vbc.exe"C:\Users\Public\vbc.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Public\vbc.exe"C:\Users\Public\vbc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:912
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1840
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRO0000.docFilesize
64KB
MD5b75d52e13a2f179e53e8395e88163408
SHA17d32e5b88cb6a4e784642943b135a481da67fc0c
SHA256545c24055623e2e35f544fb5d861cacfb4c5ba5391165245fe671704d7597a97
SHA5123f7cb56037665f7cdd466702b29eca7f3ce9738cd1a5eb8ec0478dc9a24b54684aa4477fdcc267838c1c5cab29e5491b493c667035c6bc566dfdd401f0786b00
-
C:\Users\Admin\AppData\Local\Temp\A9RFCB.tmp\has been verified. However IMG, PDF, doc, .xlsFilesize
1.1MB
MD5bccdc13184e15d08b6d4f53a25d639b7
SHA1b58c790be201b8a19e541044805e543976630806
SHA256eb0f19666baf7af710240250c811b225881e5afc78dbbf7967ed1079c92aff8a
SHA512fd180b4367a3f10fe07b566fffa13168a11d65f38bb4b1f544c690fe7ddce043f0f57ebade64f80fc57d898e7e6af7b44ff5563cccaf4c3131096d09b4351360
-
C:\Users\Public\vbc.exeFilesize
929KB
MD5a2b6815c9698017685973d659c6fa3ba
SHA1711825fd9865c9b1ca177df8301058a96bf7968d
SHA256bcb2ba08e3ef1e2650c2276989c6d12e2277015deee0e4731f7099be07e63788
SHA5123f943ead12ce94547e336ae9ac16b74f37a2f37c1b44180a606c0155faae0b664ec8bfca1a622309ffa3bf202a7bfd81abfd3b06babc6d02efa10f449837d79c
-
C:\Users\Public\vbc.exeFilesize
929KB
MD5a2b6815c9698017685973d659c6fa3ba
SHA1711825fd9865c9b1ca177df8301058a96bf7968d
SHA256bcb2ba08e3ef1e2650c2276989c6d12e2277015deee0e4731f7099be07e63788
SHA5123f943ead12ce94547e336ae9ac16b74f37a2f37c1b44180a606c0155faae0b664ec8bfca1a622309ffa3bf202a7bfd81abfd3b06babc6d02efa10f449837d79c
-
C:\Users\Public\vbc.exeFilesize
929KB
MD5a2b6815c9698017685973d659c6fa3ba
SHA1711825fd9865c9b1ca177df8301058a96bf7968d
SHA256bcb2ba08e3ef1e2650c2276989c6d12e2277015deee0e4731f7099be07e63788
SHA5123f943ead12ce94547e336ae9ac16b74f37a2f37c1b44180a606c0155faae0b664ec8bfca1a622309ffa3bf202a7bfd81abfd3b06babc6d02efa10f449837d79c
-
C:\Users\Public\vbc.exeFilesize
929KB
MD5a2b6815c9698017685973d659c6fa3ba
SHA1711825fd9865c9b1ca177df8301058a96bf7968d
SHA256bcb2ba08e3ef1e2650c2276989c6d12e2277015deee0e4731f7099be07e63788
SHA5123f943ead12ce94547e336ae9ac16b74f37a2f37c1b44180a606c0155faae0b664ec8bfca1a622309ffa3bf202a7bfd81abfd3b06babc6d02efa10f449837d79c
-
\Users\Public\vbc.exeFilesize
929KB
MD5a2b6815c9698017685973d659c6fa3ba
SHA1711825fd9865c9b1ca177df8301058a96bf7968d
SHA256bcb2ba08e3ef1e2650c2276989c6d12e2277015deee0e4731f7099be07e63788
SHA5123f943ead12ce94547e336ae9ac16b74f37a2f37c1b44180a606c0155faae0b664ec8bfca1a622309ffa3bf202a7bfd81abfd3b06babc6d02efa10f449837d79c
-
\Users\Public\vbc.exeFilesize
929KB
MD5a2b6815c9698017685973d659c6fa3ba
SHA1711825fd9865c9b1ca177df8301058a96bf7968d
SHA256bcb2ba08e3ef1e2650c2276989c6d12e2277015deee0e4731f7099be07e63788
SHA5123f943ead12ce94547e336ae9ac16b74f37a2f37c1b44180a606c0155faae0b664ec8bfca1a622309ffa3bf202a7bfd81abfd3b06babc6d02efa10f449837d79c
-
memory/296-121-0x0000000002E20000-0x0000000002E22000-memory.dmpFilesize
8KB
-
memory/748-120-0x0000000004B20000-0x0000000004B22000-memory.dmpFilesize
8KB
-
memory/748-56-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/912-139-0x0000000000820000-0x0000000000B23000-memory.dmpFilesize
3.0MB
-
memory/912-141-0x0000000000310000-0x0000000000325000-memory.dmpFilesize
84KB
-
memory/912-140-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/912-132-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/912-133-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/912-134-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/912-135-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1220-142-0x00000000061D0000-0x00000000062F9000-memory.dmpFilesize
1.2MB
-
memory/1220-151-0x0000000002DA0000-0x0000000002EA0000-memory.dmpFilesize
1024KB
-
memory/1220-138-0x00000000001D0000-0x00000000002D0000-memory.dmpFilesize
1024KB
-
memory/1344-82-0x0000000004910000-0x0000000004950000-memory.dmpFilesize
256KB
-
memory/1344-131-0x0000000000C40000-0x0000000000C78000-memory.dmpFilesize
224KB
-
memory/1344-130-0x00000000060F0000-0x000000000619E000-memory.dmpFilesize
696KB
-
memory/1344-129-0x0000000000360000-0x000000000036C000-memory.dmpFilesize
48KB
-
memory/1344-128-0x0000000004910000-0x0000000004950000-memory.dmpFilesize
256KB
-
memory/1344-83-0x0000000000300000-0x0000000000312000-memory.dmpFilesize
72KB
-
memory/1344-81-0x0000000001080000-0x000000000116E000-memory.dmpFilesize
952KB
-
memory/1740-144-0x00000000005D0000-0x00000000005E4000-memory.dmpFilesize
80KB
-
memory/1740-146-0x00000000005D0000-0x00000000005E4000-memory.dmpFilesize
80KB
-
memory/1740-147-0x0000000000090000-0x00000000000BF000-memory.dmpFilesize
188KB
-
memory/1740-148-0x0000000002170000-0x0000000002473000-memory.dmpFilesize
3.0MB
-
memory/1740-149-0x0000000000090000-0x00000000000BF000-memory.dmpFilesize
188KB
-
memory/1740-143-0x00000000005D0000-0x00000000005E4000-memory.dmpFilesize
80KB
-
memory/1740-152-0x0000000002030000-0x00000000020C4000-memory.dmpFilesize
592KB