Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 15:42

General

  • Target

    RFQ230163R01.xls

  • Size

    1.1MB

  • MD5

    941f74a926b1cdf782549e02f1aea9c5

  • SHA1

    c12b76ef6afb7d8ab70cf7ea573c411aff9f9021

  • SHA256

    dfa91027ec1477cf162e6a856177147be4ef459b8d462c657c6bb589fd823f5e

  • SHA512

    e5314028e581b35d65e8123471971e68ba73d2670dadd61a5f66a40a9e3a01226b2ee4b874e990160ba3e8b9681a32e91192c073a22aa90c017d3b1faa778f1b

  • SSDEEP

    24576:GWQmmav30xSZy6w6Vc6NagZyew6VK6NF7o54VQcTAZi6vjh3KwK0:7QmmQ306+6Vd3K6VvNVrTn6vjh6x

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\RFQ230163R01.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1964
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Launches Equation Editor
    PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\32E1C0CA.emf

    Filesize

    12.7MB

    MD5

    39f5413978ac3979d52ed36c18a44f97

    SHA1

    edf6d3c3407e8a6b6e714bddebb1db96510d186d

    SHA256

    efb8332983a69b59af97e53011ac0c54d7e6bfc41056ce0ef424537aa33dbae1

    SHA512

    2b2f6460496fac23d6a428c1734f14ff69cf7c963de9f7f32489fd48c2431dacacacd7942d85b8fc314db9ce9bf8176084d5befba6ebe6543df70c81985af855

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A9A4368.emf

    Filesize

    1.4MB

    MD5

    a01b9617553432807b9b58025b338d97

    SHA1

    439bdcc450408b9735b2428c2d53d2e6977fa58c

    SHA256

    7a0426ed2e2349916969ff7087c0f76089fb8ce7f4627f3d11ccbc1aaefcedce

    SHA512

    312cc2563fa865d6a939fea85a520627c73ed9a95bafc98c89495f21d535dc658825be74b64f0f5c5815d1d234fc6e77a71779247e4973e39ba8dccec2f09bee

  • memory/1964-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1964-1-0x000000007208D000-0x0000000072098000-memory.dmp

    Filesize

    44KB

  • memory/1964-8-0x000000007208D000-0x0000000072098000-memory.dmp

    Filesize

    44KB

  • memory/1964-14-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1964-27-0x000000007208D000-0x0000000072098000-memory.dmp

    Filesize

    44KB