Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21/04/2023, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
CM3543535353_PONUDHA.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
CM3543535353_PONUDHA.xls
Resource
win10v2004-20230220-en
General
-
Target
CM3543535353_PONUDHA.xls
-
Size
1.3MB
-
MD5
e8ea376280027eb1cb39c825eaef7e27
-
SHA1
c3a819f1591fb1baf5472e2cc47d99ed3b3e630e
-
SHA256
f9ac66119b188c4a714a40e48d57a6216d62659085cded47d3ba6ec6f700453f
-
SHA512
498f646f40963b42cb8690328fd652f13c1e090a24da09f2094cb5789b878f14f66b6d15ad56521b071d822fdaed5b32c09dc4c98057edf7e6e784677ca29ad7
-
SSDEEP
24576:eLK8OPDLwBkN/DLwBkoiutrIT217czefpNA6QG6uqWCtrvDEeCCKCCOCC:eLKqDT1t8aCQNALG65WCtrvDEeCCKCCY
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1728 1684 cmstp.exe 27 -
Blocklisted process makes network request 2 IoCs
flow pid Process 3 652 EQNEDT32.EXE 9 1728 cmstp.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Control Panel\International\Geo\Nation qhnat.exe -
Executes dropped EXE 3 IoCs
pid Process 820 vbc.exe 616 qhnat.exe 1904 qhnat.exe -
Loads dropped DLL 7 IoCs
pid Process 652 EQNEDT32.EXE 652 EQNEDT32.EXE 652 EQNEDT32.EXE 652 EQNEDT32.EXE 820 vbc.exe 616 qhnat.exe 1728 cmstp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 616 set thread context of 1904 616 qhnat.exe 33 PID 1904 set thread context of 1684 1904 qhnat.exe 27 PID 1728 set thread context of 1228 1728 cmstp.exe 12 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
pid Process 652 EQNEDT32.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Key created \Registry\User\S-1-5-21-3430344531-3702557399-3004411149-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmstp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1684 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1904 qhnat.exe 1904 qhnat.exe 1904 qhnat.exe 1904 qhnat.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1228 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 616 qhnat.exe 1904 qhnat.exe 1904 qhnat.exe 1904 qhnat.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe 1728 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1904 qhnat.exe Token: SeDebugPrivilege 1728 cmstp.exe Token: SeShutdownPrivilege 1228 Explorer.EXE Token: SeShutdownPrivilege 1228 Explorer.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1684 EXCEL.EXE 1684 EXCEL.EXE 1684 EXCEL.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 652 wrote to memory of 820 652 EQNEDT32.EXE 31 PID 652 wrote to memory of 820 652 EQNEDT32.EXE 31 PID 652 wrote to memory of 820 652 EQNEDT32.EXE 31 PID 652 wrote to memory of 820 652 EQNEDT32.EXE 31 PID 820 wrote to memory of 616 820 vbc.exe 32 PID 820 wrote to memory of 616 820 vbc.exe 32 PID 820 wrote to memory of 616 820 vbc.exe 32 PID 820 wrote to memory of 616 820 vbc.exe 32 PID 616 wrote to memory of 1904 616 qhnat.exe 33 PID 616 wrote to memory of 1904 616 qhnat.exe 33 PID 616 wrote to memory of 1904 616 qhnat.exe 33 PID 616 wrote to memory of 1904 616 qhnat.exe 33 PID 616 wrote to memory of 1904 616 qhnat.exe 33 PID 1684 wrote to memory of 1728 1684 EXCEL.EXE 34 PID 1684 wrote to memory of 1728 1684 EXCEL.EXE 34 PID 1684 wrote to memory of 1728 1684 EXCEL.EXE 34 PID 1684 wrote to memory of 1728 1684 EXCEL.EXE 34 PID 1684 wrote to memory of 1728 1684 EXCEL.EXE 34 PID 1684 wrote to memory of 1728 1684 EXCEL.EXE 34 PID 1684 wrote to memory of 1728 1684 EXCEL.EXE 34 PID 1728 wrote to memory of 1896 1728 cmstp.exe 36 PID 1728 wrote to memory of 1896 1728 cmstp.exe 36 PID 1728 wrote to memory of 1896 1728 cmstp.exe 36 PID 1728 wrote to memory of 1896 1728 cmstp.exe 36 PID 1728 wrote to memory of 1896 1728 cmstp.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1228 -
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\CM3543535353_PONUDHA.xls2⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"3⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"4⤵PID:1896
-
-
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Public\vbc.exe"C:\Users\Public\vbc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\qhnat.exe"C:\Users\Admin\AppData\Local\Temp\qhnat.exe" C:\Users\Admin\AppData\Local\Temp\obkckozezc.g3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\qhnat.exe"C:\Users\Admin\AppData\Local\Temp\qhnat.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5e5c364d5f3da9f02b2661facf7060f9d
SHA1aaaa7ca39ee09ea0dca3d97cf5930fc56887bf4b
SHA25621ac4ca30543a936b969f9f6ca3e505bac2d5418e9ec009e627d60de6cabbc71
SHA51216b32ff6549149f3fa2ef033a32fc83934f4ccbb9b398a3897e480a36d9844054596255a9b5989a462c578eabeb7389c14624b54f0d89dd3f6fb8755f1861e22
-
Filesize
5KB
MD5f808d0392bc9e54e258144c5eadc3358
SHA191fe30981a4234b0d2493442b8fcde8fecded6d8
SHA256d1461868530ad9fd61cb440ddeb1c813082b5c1178076d414893d637ea2a718f
SHA512d3ad630846cba2d593c7a040dc8e5979a488ede991bcb276fba478c62b0fa8be7583b6743a20a7ef0f5035d713e34036d433a5dc76d432a0b9e33c2b74926bd1
-
Filesize
46KB
MD59c13c6b71953401ded4999f558cb54ba
SHA1bdf15982849116e0c2bfdae67a62df4eb5441796
SHA2563ff82975227bf78a5225077cd753e04d5ee8a2766903ce07bdf5e4ff40732a43
SHA51235c28a60c54c861885320f9a1773bb95e0bdddd2c57ae30a41bf8b95211ace0c5fc577ea6a79dfc378d2cf562f29e5e51ddf73ec79353c5a564ff32c03ca937a
-
Filesize
46KB
MD59c13c6b71953401ded4999f558cb54ba
SHA1bdf15982849116e0c2bfdae67a62df4eb5441796
SHA2563ff82975227bf78a5225077cd753e04d5ee8a2766903ce07bdf5e4ff40732a43
SHA51235c28a60c54c861885320f9a1773bb95e0bdddd2c57ae30a41bf8b95211ace0c5fc577ea6a79dfc378d2cf562f29e5e51ddf73ec79353c5a564ff32c03ca937a
-
Filesize
46KB
MD59c13c6b71953401ded4999f558cb54ba
SHA1bdf15982849116e0c2bfdae67a62df4eb5441796
SHA2563ff82975227bf78a5225077cd753e04d5ee8a2766903ce07bdf5e4ff40732a43
SHA51235c28a60c54c861885320f9a1773bb95e0bdddd2c57ae30a41bf8b95211ace0c5fc577ea6a79dfc378d2cf562f29e5e51ddf73ec79353c5a564ff32c03ca937a
-
Filesize
420KB
MD5e52817a24225cd74cf2572296e89e97a
SHA1b8df50b6fa53542824387439298c3abde19b60aa
SHA2563eba4df40a820b1b646b312554974a764c513a8318ec9fa414937220cdf6d343
SHA51252918142caba7e160973787cf4da1e0550face70396c55c4de3771ad2d60bdbb6d71e10f0a4cb5e38ae77fb39effbe945b8bd9c2c3185aff16ce1173f375572b
-
Filesize
267KB
MD5eb2b322f8bb4827c2d4649dd81ad7fb2
SHA1d0a30fccff23810120ea5cae33f7bd8f37b6cc7c
SHA256a5de092cf0470e6194275e392a955b89bc00535d9180996da2a55b82f8215121
SHA512c58f6af8f66ec9ceea3dc18f263e1d0ad869e32ecaa9d7a1a472d418a61ccb6cf13469a2a048ae22b765d76bd624df4479eeea981ddd224dcbf7972d45008c5d
-
Filesize
267KB
MD5eb2b322f8bb4827c2d4649dd81ad7fb2
SHA1d0a30fccff23810120ea5cae33f7bd8f37b6cc7c
SHA256a5de092cf0470e6194275e392a955b89bc00535d9180996da2a55b82f8215121
SHA512c58f6af8f66ec9ceea3dc18f263e1d0ad869e32ecaa9d7a1a472d418a61ccb6cf13469a2a048ae22b765d76bd624df4479eeea981ddd224dcbf7972d45008c5d
-
Filesize
267KB
MD5eb2b322f8bb4827c2d4649dd81ad7fb2
SHA1d0a30fccff23810120ea5cae33f7bd8f37b6cc7c
SHA256a5de092cf0470e6194275e392a955b89bc00535d9180996da2a55b82f8215121
SHA512c58f6af8f66ec9ceea3dc18f263e1d0ad869e32ecaa9d7a1a472d418a61ccb6cf13469a2a048ae22b765d76bd624df4479eeea981ddd224dcbf7972d45008c5d
-
Filesize
46KB
MD59c13c6b71953401ded4999f558cb54ba
SHA1bdf15982849116e0c2bfdae67a62df4eb5441796
SHA2563ff82975227bf78a5225077cd753e04d5ee8a2766903ce07bdf5e4ff40732a43
SHA51235c28a60c54c861885320f9a1773bb95e0bdddd2c57ae30a41bf8b95211ace0c5fc577ea6a79dfc378d2cf562f29e5e51ddf73ec79353c5a564ff32c03ca937a
-
Filesize
46KB
MD59c13c6b71953401ded4999f558cb54ba
SHA1bdf15982849116e0c2bfdae67a62df4eb5441796
SHA2563ff82975227bf78a5225077cd753e04d5ee8a2766903ce07bdf5e4ff40732a43
SHA51235c28a60c54c861885320f9a1773bb95e0bdddd2c57ae30a41bf8b95211ace0c5fc577ea6a79dfc378d2cf562f29e5e51ddf73ec79353c5a564ff32c03ca937a
-
Filesize
804KB
MD5b09588d000ef4bf2a3dddd85bd701423
SHA144a810ff8920a340a30b66d932253555143dc28b
SHA256ce4ffc1a12150b8523378553f2a97dd3fc44d5210ae6c296ab31e2c78f0d03c3
SHA5121d807d92da34ccba4628f2a55c3ac1c03ff63925d79e266b4e52d71002228cbde76206ec696c3e25143fc2e0cab56589155666ff6f8ea0ebfd5ebcd362168e2a
-
Filesize
267KB
MD5eb2b322f8bb4827c2d4649dd81ad7fb2
SHA1d0a30fccff23810120ea5cae33f7bd8f37b6cc7c
SHA256a5de092cf0470e6194275e392a955b89bc00535d9180996da2a55b82f8215121
SHA512c58f6af8f66ec9ceea3dc18f263e1d0ad869e32ecaa9d7a1a472d418a61ccb6cf13469a2a048ae22b765d76bd624df4479eeea981ddd224dcbf7972d45008c5d
-
Filesize
267KB
MD5eb2b322f8bb4827c2d4649dd81ad7fb2
SHA1d0a30fccff23810120ea5cae33f7bd8f37b6cc7c
SHA256a5de092cf0470e6194275e392a955b89bc00535d9180996da2a55b82f8215121
SHA512c58f6af8f66ec9ceea3dc18f263e1d0ad869e32ecaa9d7a1a472d418a61ccb6cf13469a2a048ae22b765d76bd624df4479eeea981ddd224dcbf7972d45008c5d
-
Filesize
267KB
MD5eb2b322f8bb4827c2d4649dd81ad7fb2
SHA1d0a30fccff23810120ea5cae33f7bd8f37b6cc7c
SHA256a5de092cf0470e6194275e392a955b89bc00535d9180996da2a55b82f8215121
SHA512c58f6af8f66ec9ceea3dc18f263e1d0ad869e32ecaa9d7a1a472d418a61ccb6cf13469a2a048ae22b765d76bd624df4479eeea981ddd224dcbf7972d45008c5d
-
Filesize
267KB
MD5eb2b322f8bb4827c2d4649dd81ad7fb2
SHA1d0a30fccff23810120ea5cae33f7bd8f37b6cc7c
SHA256a5de092cf0470e6194275e392a955b89bc00535d9180996da2a55b82f8215121
SHA512c58f6af8f66ec9ceea3dc18f263e1d0ad869e32ecaa9d7a1a472d418a61ccb6cf13469a2a048ae22b765d76bd624df4479eeea981ddd224dcbf7972d45008c5d