Analysis

  • max time kernel
    117s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 21:04

General

  • Target

    BankPaymAdviceVend.Report.docx

  • Size

    438KB

  • MD5

    22eede72746e7a9a26f3f6d311a12a7e

  • SHA1

    6738d1a969194359c7c7579956269d77fed8d26f

  • SHA256

    2e1408013503cbc13466e2041bd3e045833ce65f5c91b7226e28e27d43d6eaf9

  • SHA512

    1412ac7e90d4c10ad601b501af8cc3cecf64c1cdffab38203a99215d6a6b1f72eb8961a378a481dc7111fce173d2347bcc9f6ab543dbdcf41e8bf4c3833bc7cb

  • SSDEEP

    12288:yI34h1dPefmdFscXUk+MiCgcXWbLg6DPjWHOOkxogMp:z34h7PtdFdXUWh0bjWHOOkdMp

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Abuses OpenXML format to download file from external location
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\BankPaymAdviceVend.Report.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2904
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Launches Equation Editor
      PID:1884

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            65KB

            MD5

            ac05d27423a85adc1622c714f2cb6184

            SHA1

            b0fe2b1abddb97837ea0195be70ab2ff14d43198

            SHA256

            c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

            SHA512

            6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{F561C73B-7B83-452F-8CC5-CD816ECE0DA3}.FSD

            Filesize

            128KB

            MD5

            748a29fdec275928659ce13f83774bea

            SHA1

            bd866f6ae5da932e1674f3e4074ebe26adbaff81

            SHA256

            8ffd18d3787d600d8c68f976d8d8696d0ef7a5ab7898ce5db9cab1fccbb83bfb

            SHA512

            4fb45660b6f23a59041cb0d526df133b88dbf1a91211b6a236bccf731fdbd24f1a1e2d600ac248dad208e8e25e990d5ce1386a0b5403e7af3e7d3423a15dced5

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

            Filesize

            128KB

            MD5

            a99116b74669434a91cdcd424befa772

            SHA1

            9f442f457804bbdee8ad65de663274b2e1340fa9

            SHA256

            c0c40bcd7f19acb2ca9700960315beb9e2b0a0dc7185cb7728b5bb4159df9ebb

            SHA512

            839e144329f188bfa530b4ba9473b615b6a160549e467d6ace9058e9ef06b457cb33ce1c7a6d947ddef3ff2d109d9747e83160061ef6c485c5c4156dbb760473

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{889CD6C2-8DB5-45C3-B52B-BF81B62AD297}.FSD

            Filesize

            128KB

            MD5

            51a0955acf34e6c99ed7130f17d9fdd9

            SHA1

            34b3bc5cc741164cb6608a796c09e9a5e0888e06

            SHA256

            50e7ad4bb0395ec1cc60977444e2d8af97a287ca0a5ec7e422d39ac05f2f171e

            SHA512

            6d6a44d9263b6a7da14f30479920cbde95e244c87798c6ccc430e15ddae881b236c892ab6365ff74e320c1c2607af81ff10a2a5e08bde403f30e2b1e80b02a65

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JBYY9WU3\microsoftballondesignedbyentireprocesstoconfirmtheupdationtodevelopnewballonupdationrpcesstopcupdatepc[1].doc

            Filesize

            76KB

            MD5

            3ca11c6811c4431309ddcb308667e6db

            SHA1

            c5ee2f7bec3c0ccc15ad02bcfe17beeacc6804b0

            SHA256

            c7f50c18635230d88e26412f637a0091347fe86e526df57f39ce4d0dccf64187

            SHA512

            255abf3bee9d9746b79492cc867ec360c07e2643a1bc7323d725d33d9552b19fd3bda7933e0aac4c13f2c6cfa38a6646d26e03ee4174bdfdbcde654893443775

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3CEBBBFE.emf

            Filesize

            1.4MB

            MD5

            4d59a7e93170340b5ec4009f7fa3ad31

            SHA1

            e07421156dd87789f93f10904118343ca452bbb5

            SHA256

            83473215e5c2160333aa92ea7f9b1276d8ed7dd66afc472dc92c88055d189d7d

            SHA512

            415102ad30df62a63ec47d7b432ab397c2cfc8b6f7fe1e8a7057877379b65d344499089780e089ad2f5c08e3050f4dc2205e7c3c4ffe484c39d067027783ab55

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E0D7C8BC.emf

            Filesize

            1.4MB

            MD5

            476c7c2f309c957f6428d04e94c4f64a

            SHA1

            f1b0fa252babfb7002dc87069a436ad71bda532f

            SHA256

            c0da66b866cc999aee20456c2eee3eefc05046b8f5df3755f95fecb85f9f8be5

            SHA512

            c941fbacc6c98b556ea742538b2f2c61a66be677aa5f97457dfe07ea9652e17fe545ac05740f8ed20b1449fdcf38e97c49fe73ff8d53220a4e8d3e6e3615854e

          • C:\Users\Admin\AppData\Local\Temp\{7D8B382D-A592-43AD-BEC9-1C3420B2AA40}

            Filesize

            128KB

            MD5

            9f1cadcf5f81f8439d7862b1b5ec1982

            SHA1

            b986e68865dffb1bce6e92491c94d985301766ba

            SHA256

            b147204f057b82abf94ebdc519fc78b11bede1af1da158651b4480b5f199b93d

            SHA512

            d16b8aaa228f198d1858da18be67270a17321c2d8e7e9a9c83fe8af61a92fbc23eeb85271964e79dc14f04e408ef05d1ff0fd9a099eb2a3e91d2662cf00c1247

          • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

            Filesize

            52B

            MD5

            126d65d6db1a65da225177840e5645bd

            SHA1

            83a4b00d5de05b56bc337b838a6b68e41f1b6679

            SHA256

            3de50e625d4a39e7de785b0f164f1b22176c65f0dcaf85f91b16d36a4f4b39fb

            SHA512

            0fafd18a5d01edfb31b07155dbd9d4083074ad54481c689012b8e65399fc6e657fd27dc268029499b9909861b59eb8401ab258ccb16eef9d7302525cbd86eaef

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            f1e2288d36bc4d6514264926bdfb43ae

            SHA1

            b5e1f842698eaebd897771fb58386654b38dfcf6

            SHA256

            9653c872bf308393d15c4a79d9a94b608b7f3d3267c52231ef4c93fa8b249b5d

            SHA512

            711c62c0b101f55379f656dcb7bdb24dfc8233a07fe8a66951e964ff7dce56bc87f411d3a74de40a8c2bcfe75ffb63e958f49d0f379024b3bb86361d9c09f917

          • memory/2196-2-0x00000000715CD000-0x00000000715D8000-memory.dmp

            Filesize

            44KB

          • memory/2196-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2196-0-0x000000002FEE1000-0x000000002FEE2000-memory.dmp

            Filesize

            4KB

          • memory/2196-187-0x00000000715CD000-0x00000000715D8000-memory.dmp

            Filesize

            44KB

          • memory/2196-211-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2196-220-0x00000000715CD000-0x00000000715D8000-memory.dmp

            Filesize

            44KB