Resubmissions

02/08/2023, 20:07

230802-ywfwyshf77 8

02/08/2023, 20:04

230802-ytmxgshf65 8

Analysis

  • max time kernel
    61s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2023, 20:04

General

  • Target

    cm9292000000000000000###########rr000000000000000000###448900000.rtf

  • Size

    21KB

  • MD5

    e26f05916ee04b50b7e98416f0905b8c

  • SHA1

    052de0ebe2859f981c00dd74de5737f284a8298e

  • SHA256

    2c99d1da11bf3b9a534dbddbb27fc8128911cdcfb13cd8014cb84573819bd05c

  • SHA512

    36150370365f32e0f1cc07be1ca426ad0283375239c0909f7ae1bdf27daeac44dedc2224d408e62c7dc1e14668a4c8aabcd63e1feb5cc73a94bb64c930df89a9

  • SSDEEP

    384:tNP4e6T0IV352UbSTTFQSlIYidbvx+JKLvFFI+PK:T6THV3YmSTTFQSa5JvxfLvFFxK

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\cm9292000000000000000###########rr000000000000000000###448900000.rtf"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1632
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Launches Equation Editor
    PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1632-53-0x000000002F740000-0x000000002F89D000-memory.dmp

    Filesize

    1.4MB

  • memory/1632-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1632-55-0x0000000070ADD000-0x0000000070AE8000-memory.dmp

    Filesize

    44KB

  • memory/1632-58-0x000000002F740000-0x000000002F89D000-memory.dmp

    Filesize

    1.4MB

  • memory/1632-59-0x0000000070ADD000-0x0000000070AE8000-memory.dmp

    Filesize

    44KB