Analysis

  • max time kernel
    144s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2023, 06:10

General

  • Target

    Part number 91875-11400 x 6.xls

  • Size

    416KB

  • MD5

    66bd2064e933a06c4af53c4347c8de9e

  • SHA1

    f8d79bb57a9d26cc95c7401f6ca962cdf59a0034

  • SHA256

    1eb2d10deb038b86eaaadece40a705184b6f8ed3a24cb1f0804a1e556923e45c

  • SHA512

    021dd1fe5592efbfd3c8d772bbcc33be0535ca5e9425a86c575e39fa6f307da25c2ad6c30c413e3a604fef2592a3ef5ca37dd752c43f45f68ed78b9199654d27

  • SSDEEP

    12288:JFesxot3VtvejSD/WtH3JYqFxM8Am+ROYJUK:JFes2XwWD/WhZYkrA1OYi

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Abuses OpenXML format to download file from external location
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Part number 91875-11400 x 6.xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1248
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1772
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\processer.vbs"
        2⤵
          PID:1520

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{1DB590E1-3906-4BAF-B533-E70052D44D75}.FSD

              Filesize

              128KB

              MD5

              852318b62115cfb0a93efa8c70442c22

              SHA1

              5787f65757b312a356f229268437a74965efae12

              SHA256

              024a8690889461cb0f31a686ed65135fb03b2858048e688ffaa6ca2a591a3fb9

              SHA512

              827f4fb512a20e00266e4bcd9c17e1bdc4d389bdd8e1292a9c11f4e03853e80b8ff946d320fae65eae39921717cc1db966532ac209afb0ed2cec8c2a500d72f1

            • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

              Filesize

              128KB

              MD5

              a93bde90b656ef9767876cbf086cbfc3

              SHA1

              235bb9029b465948f3edab3359ea93df5dcd3e13

              SHA256

              bd2e5ea1feddec485cabab316dd4031d568378f46bf6d1bd3f8f32f0fcb8073c

              SHA512

              7341c1c732f687041520b179f5d28bacd567ffebcfb5601c89675225e040d750e57bab8a2b05eb1bf9084b8159982618688a8f8721355a4a5e422e9b94e17717

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NO1NR40C\ioi0ioi0ioioioo0IOIOI0IOoioi0ioii0IOIIOII0I0oioiioi0ioi0000##############00000000##############0000000[1].doc

              Filesize

              33KB

              MD5

              de3b51e37b7edd56b0ac9ccf49580ea5

              SHA1

              6daa943aa301b406e528584d42e4071e56c9fc7e

              SHA256

              12ca6fd65bdfb318cbfa0090317052ec53d70f67a9802a721cd361e090e4e33f

              SHA512

              090858e453de3032ce2143461a1ed6e9f307483a5dfaec0faa15328c577d87ba64a2a445de0e2030ea567a55e3a4093da03e86534896767ed9b34b82e305fa49

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\49826173.doc

              Filesize

              33KB

              MD5

              de3b51e37b7edd56b0ac9ccf49580ea5

              SHA1

              6daa943aa301b406e528584d42e4071e56c9fc7e

              SHA256

              12ca6fd65bdfb318cbfa0090317052ec53d70f67a9802a721cd361e090e4e33f

              SHA512

              090858e453de3032ce2143461a1ed6e9f307483a5dfaec0faa15328c577d87ba64a2a445de0e2030ea567a55e3a4093da03e86534896767ed9b34b82e305fa49

            • C:\Users\Admin\AppData\Local\Temp\{B84E35CB-125A-4992-8E9B-8A1D79610C5C}

              Filesize

              128KB

              MD5

              08caeb5243dee8b84f5a02081c5ebed6

              SHA1

              e2642e64832f4a9438ab788bcff1db1efaea6875

              SHA256

              5604b0c3f35ba30e78acfec5e928d5ba5671d077380553c837b88ea23050c1cd

              SHA512

              5d8f3ab14163e79076b712a71c85b65116372a0c7331bd05b17fc610ba0a54754ebebfd31ddd023c560650b4fb2784ecc7df52b184030380858dac2c04ca6705

            • C:\Users\Admin\AppData\Roaming\processer.vbs

              Filesize

              3KB

              MD5

              ccfc898a9a58be3f3a5d75c30841de07

              SHA1

              52ab9ae5d1f4a8a0796beb4c2bf055589c7a9cfc

              SHA256

              e867f8b902faf8bb06cb401701fd0a4b26fe5fc39324866d82b9b98a7877a7b8

              SHA512

              6c8c4fbbbc0e38f42be845557a43c5e3dfc5e7536f8c470f20ac79157dd53775362268402cd94114dcd373285ab815dd80463d915143cb45c89d082d37fae9aa

            • C:\Users\Admin\AppData\Roaming\processer.vbs

              Filesize

              3KB

              MD5

              ccfc898a9a58be3f3a5d75c30841de07

              SHA1

              52ab9ae5d1f4a8a0796beb4c2bf055589c7a9cfc

              SHA256

              e867f8b902faf8bb06cb401701fd0a4b26fe5fc39324866d82b9b98a7877a7b8

              SHA512

              6c8c4fbbbc0e38f42be845557a43c5e3dfc5e7536f8c470f20ac79157dd53775362268402cd94114dcd373285ab815dd80463d915143cb45c89d082d37fae9aa

            • memory/1248-9-0x00000000024C0000-0x00000000024C2000-memory.dmp

              Filesize

              8KB

            • memory/1248-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB

            • memory/1248-1-0x000000007292D000-0x0000000072938000-memory.dmp

              Filesize

              44KB

            • memory/1248-110-0x000000007292D000-0x0000000072938000-memory.dmp

              Filesize

              44KB

            • memory/2660-8-0x00000000036F0000-0x00000000036F2000-memory.dmp

              Filesize

              8KB

            • memory/2660-6-0x000000007292D000-0x0000000072938000-memory.dmp

              Filesize

              44KB

            • memory/2660-4-0x000000002F5E1000-0x000000002F5E2000-memory.dmp

              Filesize

              4KB

            • memory/2660-111-0x000000007292D000-0x0000000072938000-memory.dmp

              Filesize

              44KB