General

  • Target

    RFQ Halliburton.xls

  • Size

    391KB

  • Sample

    231207-pjxt9sae44

  • MD5

    d2205c671d5221146e23d8038a4fc425

  • SHA1

    6c722d7ffc2e84ce49f4caca61536da6ea7e1bf5

  • SHA256

    16fb406b1f9e83a5d28e652c89545538b3ba6cc4b09ccc851d13c233ee95a02b

  • SHA512

    ebc4d1e2adae221972838b5d4a95ca3b0db700058783e366cffe3427555a3b04159bf5f4f23f854086db15e0e32034332e6d0f4aff72833e31c9726ea14b4752

  • SSDEEP

    6144:nn1m9kdbwIZetJs0hdMJUXwVwOJi4NJhbhg9+LjQTUwQP1dAOxJAb9:nOeOtqSdLwVYgJtU8DtbACJi

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://uploaddeimagens.com.br/images/004/683/196/original/dll_js.jpg?1701821835

exe.dropper

https://uploaddeimagens.com.br/images/004/683/196/original/dll_js.jpg?1701821835

Targets

    • Target

      RFQ Halliburton.xls

    • Size

      391KB

    • MD5

      d2205c671d5221146e23d8038a4fc425

    • SHA1

      6c722d7ffc2e84ce49f4caca61536da6ea7e1bf5

    • SHA256

      16fb406b1f9e83a5d28e652c89545538b3ba6cc4b09ccc851d13c233ee95a02b

    • SHA512

      ebc4d1e2adae221972838b5d4a95ca3b0db700058783e366cffe3427555a3b04159bf5f4f23f854086db15e0e32034332e6d0f4aff72833e31c9726ea14b4752

    • SSDEEP

      6144:nn1m9kdbwIZetJs0hdMJUXwVwOJi4NJhbhg9+LjQTUwQP1dAOxJAb9:nOeOtqSdLwVYgJtU8DtbACJi

    Score
    10/10
    • Blocklisted process makes network request

    • Abuses OpenXML format to download file from external location

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

3
T1012

Tasks