Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230824-en
  • resource tags

    arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system
  • submitted
    30-08-2023 07:19

General

  • Target

    MT103.rtf

  • Size

    2.7MB

  • MD5

    0e94677f6640d3cda39138601e7dd82b

  • SHA1

    ee39f7527ce696a2998b6312cf8807fc4a3f6ea3

  • SHA256

    4fa32c417f3c773dac915a446b84d135130f548fd1c36626bea1d83dfa710523

  • SHA512

    f6b2db33927975a7db3ef341b6abe7bd7053d1b950f0f3c3ab846bc40b39d26229d78503b7a6759511876ffc8753cb09b0b6e201e86eda7c70d88182878db85d

  • SSDEEP

    24576:0csbD+4ybRtDAVrA5cYJKAK2hyin32lMO:S

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches Equation Editor 1 TTPs 2 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\MT103.rtf"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2588
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:2500
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c %tmp%\A.X
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2836
        • C:\Users\Admin\AppData\Local\Temp\A.X
          C:\Users\Admin\AppData\Local\Temp\A.X
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2396
          • C:\Users\Admin\AppData\Local\Temp\A.X
            :\Users\Admin\AppData\Local\Temp\A.X
            4⤵
            • Executes dropped EXE
            PID:268
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Launches Equation Editor
      PID:1528
    • C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe
      "C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe" -Embedding
      1⤵
        PID:2864

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A01BC36E.emf

        Filesize

        25KB

        MD5

        e36b6261e06d7383b8e5599ef5173f34

        SHA1

        faae09ffc95a8276a09a16f1dcaaa4db9b4edd91

        SHA256

        08666166b6f367e2832fa367749c0ee722aca082166650814e93c07cd624c574

        SHA512

        24a77c12050af79026b2187c0ba7348ed927a437abfd72e7405051332491d72a992f7fce7de5990067f9bbb450392caf331e79889127584d1202fa315b947c12

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A86F46ED.emf

        Filesize

        1KB

        MD5

        1e90722a40bf5ef1e724906c4937d36c

        SHA1

        2634a7ef4ef481cd8e53dfe8ea8d2de4f4096fc1

        SHA256

        802da35963ba77e71c69cb5c668ed02430d8cb8a048cee34f307dfd096005c5f

        SHA512

        0e008f340030d3ecb17ab52d015471cda742dfee3338eca7146cef3b6c046d965e675ad38888acc5c230310897960e78f7fb24887d102110c7d0a1b5ed5a9225

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D10E080A.emf

        Filesize

        1KB

        MD5

        472f8b56bf1beca321e01daf0b815f26

        SHA1

        ef78df0487b046c700d6f1b7a8a586c90684ebaa

        SHA256

        1dfb9e124862c25f5c77111f715a1381f9f278375a1365486ac4ebf0c0c55f48

        SHA512

        0776711cf335f4c80eaa3cda0f7919e068777fe126b98359bf3d2cf0213edb74c5b34c8ffed68533d8fcb0edd960e64f19c74800126e50c11efcd7153914d250

      • C:\Users\Admin\AppData\Local\Temp\A.X

        Filesize

        1.2MB

        MD5

        c814855148dcf1c6d780378dea621099

        SHA1

        a59b62ae1280e25f48d1e576bdd63e6397f5d76c

        SHA256

        f822a8f545d2d49584374fe2a28c2ff73806841005b6ac53d3763ff736e4ed7c

        SHA512

        c249197ebd60427d25093e743074878b42f8bad3f3fc05e102fa3180300cf2739383bbcfcf98c6479dd49dd90096910b354264ba331b8c0f4cd9f6e3a73d3ccf

      • C:\Users\Admin\AppData\Local\Temp\A.X

        Filesize

        1.2MB

        MD5

        c814855148dcf1c6d780378dea621099

        SHA1

        a59b62ae1280e25f48d1e576bdd63e6397f5d76c

        SHA256

        f822a8f545d2d49584374fe2a28c2ff73806841005b6ac53d3763ff736e4ed7c

        SHA512

        c249197ebd60427d25093e743074878b42f8bad3f3fc05e102fa3180300cf2739383bbcfcf98c6479dd49dd90096910b354264ba331b8c0f4cd9f6e3a73d3ccf

      • C:\Users\Admin\AppData\Local\Temp\A.X

        Filesize

        1.2MB

        MD5

        c814855148dcf1c6d780378dea621099

        SHA1

        a59b62ae1280e25f48d1e576bdd63e6397f5d76c

        SHA256

        f822a8f545d2d49584374fe2a28c2ff73806841005b6ac53d3763ff736e4ed7c

        SHA512

        c249197ebd60427d25093e743074878b42f8bad3f3fc05e102fa3180300cf2739383bbcfcf98c6479dd49dd90096910b354264ba331b8c0f4cd9f6e3a73d3ccf

      • \Users\Admin\AppData\Local\Temp\A.X

        Filesize

        1.2MB

        MD5

        c814855148dcf1c6d780378dea621099

        SHA1

        a59b62ae1280e25f48d1e576bdd63e6397f5d76c

        SHA256

        f822a8f545d2d49584374fe2a28c2ff73806841005b6ac53d3763ff736e4ed7c

        SHA512

        c249197ebd60427d25093e743074878b42f8bad3f3fc05e102fa3180300cf2739383bbcfcf98c6479dd49dd90096910b354264ba331b8c0f4cd9f6e3a73d3ccf

      • \Users\Admin\AppData\Local\Temp\A.X

        Filesize

        1.2MB

        MD5

        c814855148dcf1c6d780378dea621099

        SHA1

        a59b62ae1280e25f48d1e576bdd63e6397f5d76c

        SHA256

        f822a8f545d2d49584374fe2a28c2ff73806841005b6ac53d3763ff736e4ed7c

        SHA512

        c249197ebd60427d25093e743074878b42f8bad3f3fc05e102fa3180300cf2739383bbcfcf98c6479dd49dd90096910b354264ba331b8c0f4cd9f6e3a73d3ccf

      • \Users\Admin\AppData\Local\Temp\A.X

        Filesize

        1.2MB

        MD5

        c814855148dcf1c6d780378dea621099

        SHA1

        a59b62ae1280e25f48d1e576bdd63e6397f5d76c

        SHA256

        f822a8f545d2d49584374fe2a28c2ff73806841005b6ac53d3763ff736e4ed7c

        SHA512

        c249197ebd60427d25093e743074878b42f8bad3f3fc05e102fa3180300cf2739383bbcfcf98c6479dd49dd90096910b354264ba331b8c0f4cd9f6e3a73d3ccf

      • memory/2164-39-0x000000002F370000-0x000000002F4CD000-memory.dmp

        Filesize

        1.4MB

      • memory/2164-0-0x000000002F370000-0x000000002F4CD000-memory.dmp

        Filesize

        1.4MB

      • memory/2164-44-0x0000000070E7D000-0x0000000070E88000-memory.dmp

        Filesize

        44KB

      • memory/2164-2-0x0000000070E7D000-0x0000000070E88000-memory.dmp

        Filesize

        44KB

      • memory/2164-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2396-52-0x0000000000290000-0x0000000000297000-memory.dmp

        Filesize

        28KB

      • memory/2396-53-0x0000000077290000-0x0000000077366000-memory.dmp

        Filesize

        856KB

      • memory/2500-29-0x0000000070E7D000-0x0000000070E88000-memory.dmp

        Filesize

        44KB

      • memory/2500-22-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2500-11-0x0000000070E7D000-0x0000000070E88000-memory.dmp

        Filesize

        44KB