Analysis

  • max time kernel
    147s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    11/11/2023, 07:32

General

  • Target

    Quotation.xls

  • Size

    1.2MB

  • MD5

    67f3dd84a66fb5c912f54a9a7c240e42

  • SHA1

    27a3097783b97f207af31832f38706915a9b1ed5

  • SHA256

    84329c07da6678fd70b963db307487890874ec611c6a360227d2c0f8d3121344

  • SHA512

    4ed201151311674f42d493da44c5ca4cb4b7f00bff82aaa56adf991a95b7d27ef85c969f52ce94dc96bbed4aed0b493e4b5ee6feeabbd8f0aa3cb2bff069f221

  • SSDEEP

    24576:EuBSw6/uZye3bVHw6/WZyX3bVskoTQxI/RQJv+at0yP0NLpOdCwOx:f6/4D3bVQ6/A+3bVsLT5Ziv+a/cNF71

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Quotation.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2012
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Users\Admin\AppData\Roaming\NahimicSvc32.exe
      "C:\Users\Admin\AppData\Roaming\NahimicSvc32.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:764
      • C:\Users\Admin\AppData\Local\Temp\is-DPO3C.tmp\NahimicSvc32.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-DPO3C.tmp\NahimicSvc32.tmp" /SL5="$60186,402740,84480,C:\Users\Admin\AppData\Roaming\NahimicSvc32.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8AF73E11.emf

    Filesize

    1.4MB

    MD5

    a01b9617553432807b9b58025b338d97

    SHA1

    439bdcc450408b9735b2428c2d53d2e6977fa58c

    SHA256

    7a0426ed2e2349916969ff7087c0f76089fb8ce7f4627f3d11ccbc1aaefcedce

    SHA512

    312cc2563fa865d6a939fea85a520627c73ed9a95bafc98c89495f21d535dc658825be74b64f0f5c5815d1d234fc6e77a71779247e4973e39ba8dccec2f09bee

  • C:\Users\Admin\AppData\Local\Temp\is-DPO3C.tmp\NahimicSvc32.tmp

    Filesize

    719KB

    MD5

    8ff731d01f86d5ff9a326e82823cc30c

    SHA1

    9062aa438887b1f2e22e42b1adf56971b5a7e6e8

    SHA256

    3228932ba90230ec52dac304fb9f155ba2df33dd6775093fb7f3d0ae83546a28

    SHA512

    c4a67479069757dabfec6c8c97850f07a1ad9ca33287a06c0075289d2259e12958df36716074c61492b0a0a11924e40bf1825751974c117a151112f85d560ecc

  • C:\Users\Admin\AppData\Roaming\NahimicSvc32.exe

    Filesize

    638KB

    MD5

    12c26ab43202d2ef17553eeb17376c2a

    SHA1

    0b6226071ab1711bbbfaca2cdad6783d2658d797

    SHA256

    cb56bffb224d9bcff0753d58995c25f6f944bcb075560019cd87283e3b443aa3

    SHA512

    215e497f9ead486e618b940109553a703042cc0dcd7802cd7c36aac296ddfe27a5ce693891ed50e64dd68a03ba029928ab2c302a38de04e02e5ce3b3c0661f79

  • C:\Users\Admin\AppData\Roaming\NahimicSvc32.exe

    Filesize

    638KB

    MD5

    12c26ab43202d2ef17553eeb17376c2a

    SHA1

    0b6226071ab1711bbbfaca2cdad6783d2658d797

    SHA256

    cb56bffb224d9bcff0753d58995c25f6f944bcb075560019cd87283e3b443aa3

    SHA512

    215e497f9ead486e618b940109553a703042cc0dcd7802cd7c36aac296ddfe27a5ce693891ed50e64dd68a03ba029928ab2c302a38de04e02e5ce3b3c0661f79

  • C:\Users\Admin\AppData\Roaming\NahimicSvc32.exe

    Filesize

    638KB

    MD5

    12c26ab43202d2ef17553eeb17376c2a

    SHA1

    0b6226071ab1711bbbfaca2cdad6783d2658d797

    SHA256

    cb56bffb224d9bcff0753d58995c25f6f944bcb075560019cd87283e3b443aa3

    SHA512

    215e497f9ead486e618b940109553a703042cc0dcd7802cd7c36aac296ddfe27a5ce693891ed50e64dd68a03ba029928ab2c302a38de04e02e5ce3b3c0661f79

  • \Users\Admin\AppData\Local\Temp\is-DPO3C.tmp\NahimicSvc32.tmp

    Filesize

    719KB

    MD5

    8ff731d01f86d5ff9a326e82823cc30c

    SHA1

    9062aa438887b1f2e22e42b1adf56971b5a7e6e8

    SHA256

    3228932ba90230ec52dac304fb9f155ba2df33dd6775093fb7f3d0ae83546a28

    SHA512

    c4a67479069757dabfec6c8c97850f07a1ad9ca33287a06c0075289d2259e12958df36716074c61492b0a0a11924e40bf1825751974c117a151112f85d560ecc

  • \Users\Admin\AppData\Local\Temp\is-PKOEC.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-PKOEC.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Roaming\NahimicSvc32.exe

    Filesize

    638KB

    MD5

    12c26ab43202d2ef17553eeb17376c2a

    SHA1

    0b6226071ab1711bbbfaca2cdad6783d2658d797

    SHA256

    cb56bffb224d9bcff0753d58995c25f6f944bcb075560019cd87283e3b443aa3

    SHA512

    215e497f9ead486e618b940109553a703042cc0dcd7802cd7c36aac296ddfe27a5ce693891ed50e64dd68a03ba029928ab2c302a38de04e02e5ce3b3c0661f79

  • memory/764-22-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/764-19-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/764-35-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2012-9-0x000000007254D000-0x0000000072558000-memory.dmp

    Filesize

    44KB

  • memory/2012-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2012-1-0x000000007254D000-0x0000000072558000-memory.dmp

    Filesize

    44KB

  • memory/2012-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2012-61-0x000000007254D000-0x0000000072558000-memory.dmp

    Filesize

    44KB

  • memory/2944-28-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2944-36-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2944-39-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB