Analysis

  • max time kernel
    150s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2023, 15:45

General

  • Target

    CM3543535353_PONUDHA.xls

  • Size

    1.3MB

  • MD5

    e8ea376280027eb1cb39c825eaef7e27

  • SHA1

    c3a819f1591fb1baf5472e2cc47d99ed3b3e630e

  • SHA256

    f9ac66119b188c4a714a40e48d57a6216d62659085cded47d3ba6ec6f700453f

  • SHA512

    498f646f40963b42cb8690328fd652f13c1e090a24da09f2094cb5789b878f14f66b6d15ad56521b071d822fdaed5b32c09dc4c98057edf7e6e784677ca29ad7

  • SSDEEP

    24576:eLK8OPDLwBkN/DLwBkoiutrIT217czefpNA6QG6uqWCtrvDEeCCKCCOCC:eLKqDT1t8aCQNALG65WCtrvDEeCCKCCY

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:1228
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\CM3543535353_PONUDHA.xls
      2⤵
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\SysWOW64\cmstp.exe
        "C:\Windows\SysWOW64\cmstp.exe"
        3⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1728
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          4⤵
            PID:1896
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:652
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:820
        • C:\Users\Admin\AppData\Local\Temp\qhnat.exe
          "C:\Users\Admin\AppData\Local\Temp\qhnat.exe" C:\Users\Admin\AppData\Local\Temp\obkckozezc.g
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:616
          • C:\Users\Admin\AppData\Local\Temp\qhnat.exe
            "C:\Users\Admin\AppData\Local\Temp\qhnat.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:1904

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\eouezmycx.cf

      Filesize

      206KB

      MD5

      e5c364d5f3da9f02b2661facf7060f9d

      SHA1

      aaaa7ca39ee09ea0dca3d97cf5930fc56887bf4b

      SHA256

      21ac4ca30543a936b969f9f6ca3e505bac2d5418e9ec009e627d60de6cabbc71

      SHA512

      16b32ff6549149f3fa2ef033a32fc83934f4ccbb9b398a3897e480a36d9844054596255a9b5989a462c578eabeb7389c14624b54f0d89dd3f6fb8755f1861e22

    • C:\Users\Admin\AppData\Local\Temp\obkckozezc.g

      Filesize

      5KB

      MD5

      f808d0392bc9e54e258144c5eadc3358

      SHA1

      91fe30981a4234b0d2493442b8fcde8fecded6d8

      SHA256

      d1461868530ad9fd61cb440ddeb1c813082b5c1178076d414893d637ea2a718f

      SHA512

      d3ad630846cba2d593c7a040dc8e5979a488ede991bcb276fba478c62b0fa8be7583b6743a20a7ef0f5035d713e34036d433a5dc76d432a0b9e33c2b74926bd1

    • C:\Users\Admin\AppData\Local\Temp\qhnat.exe

      Filesize

      46KB

      MD5

      9c13c6b71953401ded4999f558cb54ba

      SHA1

      bdf15982849116e0c2bfdae67a62df4eb5441796

      SHA256

      3ff82975227bf78a5225077cd753e04d5ee8a2766903ce07bdf5e4ff40732a43

      SHA512

      35c28a60c54c861885320f9a1773bb95e0bdddd2c57ae30a41bf8b95211ace0c5fc577ea6a79dfc378d2cf562f29e5e51ddf73ec79353c5a564ff32c03ca937a

    • C:\Users\Admin\AppData\Local\Temp\qhnat.exe

      Filesize

      46KB

      MD5

      9c13c6b71953401ded4999f558cb54ba

      SHA1

      bdf15982849116e0c2bfdae67a62df4eb5441796

      SHA256

      3ff82975227bf78a5225077cd753e04d5ee8a2766903ce07bdf5e4ff40732a43

      SHA512

      35c28a60c54c861885320f9a1773bb95e0bdddd2c57ae30a41bf8b95211ace0c5fc577ea6a79dfc378d2cf562f29e5e51ddf73ec79353c5a564ff32c03ca937a

    • C:\Users\Admin\AppData\Local\Temp\qhnat.exe

      Filesize

      46KB

      MD5

      9c13c6b71953401ded4999f558cb54ba

      SHA1

      bdf15982849116e0c2bfdae67a62df4eb5441796

      SHA256

      3ff82975227bf78a5225077cd753e04d5ee8a2766903ce07bdf5e4ff40732a43

      SHA512

      35c28a60c54c861885320f9a1773bb95e0bdddd2c57ae30a41bf8b95211ace0c5fc577ea6a79dfc378d2cf562f29e5e51ddf73ec79353c5a564ff32c03ca937a

    • C:\Users\Admin\AppData\Local\Temp\znuhe.zip

      Filesize

      420KB

      MD5

      e52817a24225cd74cf2572296e89e97a

      SHA1

      b8df50b6fa53542824387439298c3abde19b60aa

      SHA256

      3eba4df40a820b1b646b312554974a764c513a8318ec9fa414937220cdf6d343

      SHA512

      52918142caba7e160973787cf4da1e0550face70396c55c4de3771ad2d60bdbb6d71e10f0a4cb5e38ae77fb39effbe945b8bd9c2c3185aff16ce1173f375572b

    • C:\Users\Public\vbc.exe

      Filesize

      267KB

      MD5

      eb2b322f8bb4827c2d4649dd81ad7fb2

      SHA1

      d0a30fccff23810120ea5cae33f7bd8f37b6cc7c

      SHA256

      a5de092cf0470e6194275e392a955b89bc00535d9180996da2a55b82f8215121

      SHA512

      c58f6af8f66ec9ceea3dc18f263e1d0ad869e32ecaa9d7a1a472d418a61ccb6cf13469a2a048ae22b765d76bd624df4479eeea981ddd224dcbf7972d45008c5d

    • C:\Users\Public\vbc.exe

      Filesize

      267KB

      MD5

      eb2b322f8bb4827c2d4649dd81ad7fb2

      SHA1

      d0a30fccff23810120ea5cae33f7bd8f37b6cc7c

      SHA256

      a5de092cf0470e6194275e392a955b89bc00535d9180996da2a55b82f8215121

      SHA512

      c58f6af8f66ec9ceea3dc18f263e1d0ad869e32ecaa9d7a1a472d418a61ccb6cf13469a2a048ae22b765d76bd624df4479eeea981ddd224dcbf7972d45008c5d

    • C:\Users\Public\vbc.exe

      Filesize

      267KB

      MD5

      eb2b322f8bb4827c2d4649dd81ad7fb2

      SHA1

      d0a30fccff23810120ea5cae33f7bd8f37b6cc7c

      SHA256

      a5de092cf0470e6194275e392a955b89bc00535d9180996da2a55b82f8215121

      SHA512

      c58f6af8f66ec9ceea3dc18f263e1d0ad869e32ecaa9d7a1a472d418a61ccb6cf13469a2a048ae22b765d76bd624df4479eeea981ddd224dcbf7972d45008c5d

    • \Users\Admin\AppData\Local\Temp\qhnat.exe

      Filesize

      46KB

      MD5

      9c13c6b71953401ded4999f558cb54ba

      SHA1

      bdf15982849116e0c2bfdae67a62df4eb5441796

      SHA256

      3ff82975227bf78a5225077cd753e04d5ee8a2766903ce07bdf5e4ff40732a43

      SHA512

      35c28a60c54c861885320f9a1773bb95e0bdddd2c57ae30a41bf8b95211ace0c5fc577ea6a79dfc378d2cf562f29e5e51ddf73ec79353c5a564ff32c03ca937a

    • \Users\Admin\AppData\Local\Temp\qhnat.exe

      Filesize

      46KB

      MD5

      9c13c6b71953401ded4999f558cb54ba

      SHA1

      bdf15982849116e0c2bfdae67a62df4eb5441796

      SHA256

      3ff82975227bf78a5225077cd753e04d5ee8a2766903ce07bdf5e4ff40732a43

      SHA512

      35c28a60c54c861885320f9a1773bb95e0bdddd2c57ae30a41bf8b95211ace0c5fc577ea6a79dfc378d2cf562f29e5e51ddf73ec79353c5a564ff32c03ca937a

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      804KB

      MD5

      b09588d000ef4bf2a3dddd85bd701423

      SHA1

      44a810ff8920a340a30b66d932253555143dc28b

      SHA256

      ce4ffc1a12150b8523378553f2a97dd3fc44d5210ae6c296ab31e2c78f0d03c3

      SHA512

      1d807d92da34ccba4628f2a55c3ac1c03ff63925d79e266b4e52d71002228cbde76206ec696c3e25143fc2e0cab56589155666ff6f8ea0ebfd5ebcd362168e2a

    • \Users\Public\vbc.exe

      Filesize

      267KB

      MD5

      eb2b322f8bb4827c2d4649dd81ad7fb2

      SHA1

      d0a30fccff23810120ea5cae33f7bd8f37b6cc7c

      SHA256

      a5de092cf0470e6194275e392a955b89bc00535d9180996da2a55b82f8215121

      SHA512

      c58f6af8f66ec9ceea3dc18f263e1d0ad869e32ecaa9d7a1a472d418a61ccb6cf13469a2a048ae22b765d76bd624df4479eeea981ddd224dcbf7972d45008c5d

    • \Users\Public\vbc.exe

      Filesize

      267KB

      MD5

      eb2b322f8bb4827c2d4649dd81ad7fb2

      SHA1

      d0a30fccff23810120ea5cae33f7bd8f37b6cc7c

      SHA256

      a5de092cf0470e6194275e392a955b89bc00535d9180996da2a55b82f8215121

      SHA512

      c58f6af8f66ec9ceea3dc18f263e1d0ad869e32ecaa9d7a1a472d418a61ccb6cf13469a2a048ae22b765d76bd624df4479eeea981ddd224dcbf7972d45008c5d

    • \Users\Public\vbc.exe

      Filesize

      267KB

      MD5

      eb2b322f8bb4827c2d4649dd81ad7fb2

      SHA1

      d0a30fccff23810120ea5cae33f7bd8f37b6cc7c

      SHA256

      a5de092cf0470e6194275e392a955b89bc00535d9180996da2a55b82f8215121

      SHA512

      c58f6af8f66ec9ceea3dc18f263e1d0ad869e32ecaa9d7a1a472d418a61ccb6cf13469a2a048ae22b765d76bd624df4479eeea981ddd224dcbf7972d45008c5d

    • \Users\Public\vbc.exe

      Filesize

      267KB

      MD5

      eb2b322f8bb4827c2d4649dd81ad7fb2

      SHA1

      d0a30fccff23810120ea5cae33f7bd8f37b6cc7c

      SHA256

      a5de092cf0470e6194275e392a955b89bc00535d9180996da2a55b82f8215121

      SHA512

      c58f6af8f66ec9ceea3dc18f263e1d0ad869e32ecaa9d7a1a472d418a61ccb6cf13469a2a048ae22b765d76bd624df4479eeea981ddd224dcbf7972d45008c5d

    • memory/1228-100-0x00000000038D0000-0x00000000039D0000-memory.dmp

      Filesize

      1024KB

    • memory/1228-146-0x0000000004360000-0x00000000043F6000-memory.dmp

      Filesize

      600KB

    • memory/1228-104-0x0000000004360000-0x00000000043F6000-memory.dmp

      Filesize

      600KB

    • memory/1684-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1684-93-0x0000000006E30000-0x0000000006F3B000-memory.dmp

      Filesize

      1.0MB

    • memory/1684-161-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1728-99-0x0000000001FD0000-0x00000000022D3000-memory.dmp

      Filesize

      3.0MB

    • memory/1728-98-0x0000000000090000-0x00000000000BD000-memory.dmp

      Filesize

      180KB

    • memory/1728-102-0x0000000001D00000-0x0000000001D8F000-memory.dmp

      Filesize

      572KB

    • memory/1728-97-0x00000000008E0000-0x00000000008F8000-memory.dmp

      Filesize

      96KB

    • memory/1728-148-0x0000000061E00000-0x0000000061EB6000-memory.dmp

      Filesize

      728KB

    • memory/1728-95-0x00000000008E0000-0x00000000008F8000-memory.dmp

      Filesize

      96KB

    • memory/1904-92-0x0000000000830000-0x0000000000B33000-memory.dmp

      Filesize

      3.0MB

    • memory/1904-91-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1904-88-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1904-94-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB