Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 06:41

General

  • Target

    RFQ 27-09-2023.xlam

  • Size

    635KB

  • MD5

    91a1baf49ff333b4bf26a160be2aefe7

  • SHA1

    7b12c0943a0f7a9e32155b4c4a92ce81d698e53a

  • SHA256

    42ffd6fe0c78d3fc0723196da87ea5e0b1e32b1f2141eaba58c6fa772d706750

  • SHA512

    eedfbfb0070cecf67e8f5f624665d917273fe0a8c17d27f8ecd3f1518ef7314f17e35b6af544c62b3380e6c6c35be85d0a7da3bb623d54dd3e3eeb8e580ac870

  • SSDEEP

    12288:WtK3E8PWKofUzCnJqdY+kPiBykptUVed8xdG/uvJPQSJFQNbD2:H34KqwW+kKPptzmx5vJYoQI

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\RFQ 27-09-2023.xlam"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:900
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Launches Equation Editor
    PID:2796

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/900-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/900-1-0x000000007285D000-0x0000000072868000-memory.dmp

          Filesize

          44KB

        • memory/900-2-0x000000007285D000-0x0000000072868000-memory.dmp

          Filesize

          44KB

        • memory/900-4-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/900-5-0x000000007285D000-0x0000000072868000-memory.dmp

          Filesize

          44KB