Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
02-12-2023 16:35
Static task
static1
Behavioral task
behavioral1
Sample
Orden T7405.xla.xls
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
Orden T7405.xla.xls
Resource
win10v2004-20231127-en
General
-
Target
Orden T7405.xla.xls
-
Size
391KB
-
MD5
c198b379975c143eefceef1d79a20e17
-
SHA1
779ec72a2e929c5ba0f1b6db8922453c76177e38
-
SHA256
14b2a0a27bc9c98e606495cf2d612db931d125983262b780e30d6f48e4d59b50
-
SHA512
20224151e72415d17e47507a417fb8898d9b5e70a6749ce7e5fbe72e3f6b5cea6caee0eb1125ad327c8028fea7cf8722306171c376c53ca4bdd23f6fbab14ef8
-
SSDEEP
6144:Fn1m9kdbzPpeZl8b++UXKefrBCPP9UeybHvwsJxHMMj2GGuNla20kUVLR/:FOevhS5KSoPmeyTIsJxHlbCV
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 1 IoCs
Processes:
EQNEDT32.EXEflow pid process 11 1864 EQNEDT32.EXE -
Downloads MZ/PE file
-
Abuses OpenXML format to download file from external location
-
Executes dropped EXE 3 IoCs
Processes:
wlanext.exedoubbdi.exedoubbdi.exepid process 1236 wlanext.exe 336 doubbdi.exe 1908 doubbdi.exe -
Loads dropped DLL 4 IoCs
Processes:
EQNEDT32.EXEwlanext.exedoubbdi.exepid process 1864 EQNEDT32.EXE 1236 wlanext.exe 1236 wlanext.exe 336 doubbdi.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
doubbdi.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 doubbdi.exe Key opened \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 doubbdi.exe Key opened \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 doubbdi.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
doubbdi.exedescription pid process target process PID 336 set thread context of 1908 336 doubbdi.exe doubbdi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 8 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\wlanext.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\wlanext.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\wlanext.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\wlanext.exe nsis_installer_2 \Users\Admin\AppData\Roaming\wlanext.exe nsis_installer_1 \Users\Admin\AppData\Roaming\wlanext.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\wlanext.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\wlanext.exe nsis_installer_2 -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
-
Processes:
EXCEL.EXEWINWORD.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2940 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
doubbdi.exepid process 1908 doubbdi.exe 1908 doubbdi.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
doubbdi.exepid process 336 doubbdi.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
doubbdi.exeWINWORD.EXEdescription pid process Token: SeDebugPrivilege 1908 doubbdi.exe Token: SeShutdownPrivilege 2676 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
EXCEL.EXEWINWORD.EXEpid process 2940 EXCEL.EXE 2940 EXCEL.EXE 2940 EXCEL.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
EQNEDT32.EXEwlanext.exedoubbdi.exeWINWORD.EXEdescription pid process target process PID 1864 wrote to memory of 1236 1864 EQNEDT32.EXE wlanext.exe PID 1864 wrote to memory of 1236 1864 EQNEDT32.EXE wlanext.exe PID 1864 wrote to memory of 1236 1864 EQNEDT32.EXE wlanext.exe PID 1864 wrote to memory of 1236 1864 EQNEDT32.EXE wlanext.exe PID 1236 wrote to memory of 336 1236 wlanext.exe doubbdi.exe PID 1236 wrote to memory of 336 1236 wlanext.exe doubbdi.exe PID 1236 wrote to memory of 336 1236 wlanext.exe doubbdi.exe PID 1236 wrote to memory of 336 1236 wlanext.exe doubbdi.exe PID 336 wrote to memory of 1908 336 doubbdi.exe doubbdi.exe PID 336 wrote to memory of 1908 336 doubbdi.exe doubbdi.exe PID 336 wrote to memory of 1908 336 doubbdi.exe doubbdi.exe PID 336 wrote to memory of 1908 336 doubbdi.exe doubbdi.exe PID 336 wrote to memory of 1908 336 doubbdi.exe doubbdi.exe PID 2676 wrote to memory of 1120 2676 WINWORD.EXE splwow64.exe PID 2676 wrote to memory of 1120 2676 WINWORD.EXE splwow64.exe PID 2676 wrote to memory of 1120 2676 WINWORD.EXE splwow64.exe PID 2676 wrote to memory of 1120 2676 WINWORD.EXE splwow64.exe -
outlook_office_path 1 IoCs
Processes:
doubbdi.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 doubbdi.exe -
outlook_win_path 1 IoCs
Processes:
doubbdi.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 doubbdi.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Orden T7405.xla.xls"1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2940
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1120
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Roaming\wlanext.exe"C:\Users\Admin\AppData\Roaming\wlanext.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\doubbdi.exe"C:\Users\Admin\AppData\Local\Temp\doubbdi.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\doubbdi.exe"C:\Users\Admin\AppData\Local\Temp\doubbdi.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Filesize128KB
MD53ddf7bf41d884e0efa9937e07a0ba850
SHA1aded2180c25d76c979cfb604bdf38186d7b32eea
SHA25608bb56c9873a4997fa2c5f1d79928e94f3eb3154fb3601ee82c158f6115d8f91
SHA51277523399e5b743ed571f8285439398d9a2261d394bdcb2c3fde7aebf730bb6201624cdec9830ed9530c7b5e18d63f750eb282ec8a3d5fb2e1b72f1760afe9c46
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{D8157E08-30E9-4793-9A30-56AF2B27AE7D}.FSD
Filesize128KB
MD51b60309091010ac7ac73690021119b8a
SHA1415583e241eb93914ed82834656b347a90516634
SHA2568ee0bdba19cadb6a975a63e2284a5ff0687648b0a10b96ff475a0b75d6221fac
SHA51259b684d52863327e6eef3cce14ba68c6c481df0acbe16f87a3e71c9ed16cb8519da03a2a8395fc6b2472238bfcc44bedb567ac2fc05234843be814ed6d944d8d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9G8QJ0N4\Microsoftdeletedentirehistoryfromthepcalsocookiecachetoo[1].doc
Filesize58KB
MD56ee6e6e58e88fbb222f7b1c8e37973d7
SHA1fad289b5872a39a24d151ba59102c8d7c2e73e35
SHA256f7925b0edcb383f181bbb45b29acaad0b837f0ea742a755e47aed688bcd170cf
SHA512439dd171e5fcb4d30928b2fa19f17f709ca5056ae097a03decd7b9df6da5726eaf3b93499958660cecf75eef0d25d575216e5b6009f3ff68756c949ff272abc8
-
Filesize
58KB
MD56ee6e6e58e88fbb222f7b1c8e37973d7
SHA1fad289b5872a39a24d151ba59102c8d7c2e73e35
SHA256f7925b0edcb383f181bbb45b29acaad0b837f0ea742a755e47aed688bcd170cf
SHA512439dd171e5fcb4d30928b2fa19f17f709ca5056ae097a03decd7b9df6da5726eaf3b93499958660cecf75eef0d25d575216e5b6009f3ff68756c949ff272abc8
-
Filesize
191KB
MD55a1232108d4d199c99de71a08c45f068
SHA1817bb4b675853d2b36c99f0d6d9bf4d162c6000e
SHA2561eaf29f23168f7506f681545f3355eafefa715d574d7f5e68a5523b6b4d92f55
SHA512572facb4bf5e8415b37cb73992e843fffd9188b6929da139433f4ccc5a950a61dfbd8031f73667f1a4d976dbe06da7e0e747e168d5f23ac261608f72f8f62b5b
-
Filesize
191KB
MD55a1232108d4d199c99de71a08c45f068
SHA1817bb4b675853d2b36c99f0d6d9bf4d162c6000e
SHA2561eaf29f23168f7506f681545f3355eafefa715d574d7f5e68a5523b6b4d92f55
SHA512572facb4bf5e8415b37cb73992e843fffd9188b6929da139433f4ccc5a950a61dfbd8031f73667f1a4d976dbe06da7e0e747e168d5f23ac261608f72f8f62b5b
-
Filesize
191KB
MD55a1232108d4d199c99de71a08c45f068
SHA1817bb4b675853d2b36c99f0d6d9bf4d162c6000e
SHA2561eaf29f23168f7506f681545f3355eafefa715d574d7f5e68a5523b6b4d92f55
SHA512572facb4bf5e8415b37cb73992e843fffd9188b6929da139433f4ccc5a950a61dfbd8031f73667f1a4d976dbe06da7e0e747e168d5f23ac261608f72f8f62b5b
-
Filesize
191KB
MD55a1232108d4d199c99de71a08c45f068
SHA1817bb4b675853d2b36c99f0d6d9bf4d162c6000e
SHA2561eaf29f23168f7506f681545f3355eafefa715d574d7f5e68a5523b6b4d92f55
SHA512572facb4bf5e8415b37cb73992e843fffd9188b6929da139433f4ccc5a950a61dfbd8031f73667f1a4d976dbe06da7e0e747e168d5f23ac261608f72f8f62b5b
-
Filesize
334KB
MD5043bdf6ecd9749b3947423bc584f7af9
SHA17705ddeb913cb220c29a79859d6a76d64f3f7c46
SHA256e53e05f266ca0f1e7e5f7c5fc91df1c9801cc708be3ae080f994aef1c2ef011c
SHA5123e47886d7704bdcaa50e1484650e9ec01bc9c86ce3ee3d58bb74d09326e3d94ab83fe90009c75a4acdaa0a1fa7cd5e377f8f059040ef019737218b3f14fce065
-
Filesize
128KB
MD5e586cb91a91e2a346b135c7f36be8f34
SHA1fbb63215daf8ea6b3531b567cabced4215833e27
SHA2562d636572679c9f77ec1f32d7f3ac5f167065ca0d874311dc4b6361fd12eb134d
SHA512b83f9acdeccc61a15bef1823c2689993569a9dc8ebabdbb3940fd2a48f344fc6ca5b7c5640d37e9ade33cad38ddee2d823cb3f5aa1d35108ffb30aa12b1b33ee
-
Filesize
20KB
MD5ab936e990341d2f26046dbe4673970d1
SHA11796101eaa7f2e779444ce604357b7d75b35a256
SHA2563afa8919dbfd9d42f4fbe75681ade790e9ca693dda809aa4f4720878e0e90f80
SHA512017a8567660b659c3c22e8b7c2df62d35e36effc06cec87bb2c0c7cac2270842c5ffb17a99a23723c6321d1376490c490eb80f9799bbe672fce13c59342ebddf
-
Filesize
405KB
MD58bfd7886121330aca3002b5b1e768740
SHA11dae238a6f5c6fb2074f8f7e9dccdaa625ccc71e
SHA25603b950d316f2e66e637a9cfdd2f769d5a53296b0459df9cb6ed0fc0d25282958
SHA51248354e5f6af35bce559d1476752cea9ebc4637e7792f8531b452b076c9949dca2892948c85e5b42ceebdc45cc3c21d03ce039c22983451c7c38b939a08528ee1
-
Filesize
405KB
MD58bfd7886121330aca3002b5b1e768740
SHA11dae238a6f5c6fb2074f8f7e9dccdaa625ccc71e
SHA25603b950d316f2e66e637a9cfdd2f769d5a53296b0459df9cb6ed0fc0d25282958
SHA51248354e5f6af35bce559d1476752cea9ebc4637e7792f8531b452b076c9949dca2892948c85e5b42ceebdc45cc3c21d03ce039c22983451c7c38b939a08528ee1
-
Filesize
405KB
MD58bfd7886121330aca3002b5b1e768740
SHA11dae238a6f5c6fb2074f8f7e9dccdaa625ccc71e
SHA25603b950d316f2e66e637a9cfdd2f769d5a53296b0459df9cb6ed0fc0d25282958
SHA51248354e5f6af35bce559d1476752cea9ebc4637e7792f8531b452b076c9949dca2892948c85e5b42ceebdc45cc3c21d03ce039c22983451c7c38b939a08528ee1
-
Filesize
191KB
MD55a1232108d4d199c99de71a08c45f068
SHA1817bb4b675853d2b36c99f0d6d9bf4d162c6000e
SHA2561eaf29f23168f7506f681545f3355eafefa715d574d7f5e68a5523b6b4d92f55
SHA512572facb4bf5e8415b37cb73992e843fffd9188b6929da139433f4ccc5a950a61dfbd8031f73667f1a4d976dbe06da7e0e747e168d5f23ac261608f72f8f62b5b
-
Filesize
191KB
MD55a1232108d4d199c99de71a08c45f068
SHA1817bb4b675853d2b36c99f0d6d9bf4d162c6000e
SHA2561eaf29f23168f7506f681545f3355eafefa715d574d7f5e68a5523b6b4d92f55
SHA512572facb4bf5e8415b37cb73992e843fffd9188b6929da139433f4ccc5a950a61dfbd8031f73667f1a4d976dbe06da7e0e747e168d5f23ac261608f72f8f62b5b
-
Filesize
191KB
MD55a1232108d4d199c99de71a08c45f068
SHA1817bb4b675853d2b36c99f0d6d9bf4d162c6000e
SHA2561eaf29f23168f7506f681545f3355eafefa715d574d7f5e68a5523b6b4d92f55
SHA512572facb4bf5e8415b37cb73992e843fffd9188b6929da139433f4ccc5a950a61dfbd8031f73667f1a4d976dbe06da7e0e747e168d5f23ac261608f72f8f62b5b
-
Filesize
405KB
MD58bfd7886121330aca3002b5b1e768740
SHA11dae238a6f5c6fb2074f8f7e9dccdaa625ccc71e
SHA25603b950d316f2e66e637a9cfdd2f769d5a53296b0459df9cb6ed0fc0d25282958
SHA51248354e5f6af35bce559d1476752cea9ebc4637e7792f8531b452b076c9949dca2892948c85e5b42ceebdc45cc3c21d03ce039c22983451c7c38b939a08528ee1