Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 01:38

General

  • Target

    3013582ef434303c220beb1e3719a59f7584f6c3b330e8ff68e96267f3a82418.xls

  • Size

    241KB

  • MD5

    954ed6353c177a0f1f1996b3572d2347

  • SHA1

    f49c327f4537fbc14dafd7534ec161aa5368a0dd

  • SHA256

    3013582ef434303c220beb1e3719a59f7584f6c3b330e8ff68e96267f3a82418

  • SHA512

    cdad7057962b842dd771a1f4f95ebf307a4fce563e17bd22a8c9bf19710333967ecba3ed1633a0a46a2e632df79d4254cd6918e4451512c0e5f63ef7519c4024

  • SSDEEP

    6144:Od4UcLe0JOqPQZR8MDdATCR3tSv0W8HnHu0JziXw:JUP/qPQZR8MxAm/S8W8uA2

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\3013582ef434303c220beb1e3719a59f7584f6c3b330e8ff68e96267f3a82418.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\SysWOW64\systeminfo.exe
      "C:\Windows\SysWOW64\systeminfo.exe"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Gathers system information
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1576
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1108
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:400
      • C:\Users\Admin\AppData\Roaming\hjc.exe
        "C:\Users\Admin\AppData\Roaming\hjc.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2364
        • C:\Users\Admin\AppData\Roaming\hjc.exe
          "C:\Users\Admin\AppData\Roaming\hjc.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:2892

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{9EA284F4-EFD2-4714-941B-08C18D62F415}.FSD

      Filesize

      128KB

      MD5

      b5c4c2c7e5146181c545a5c62f95bcd4

      SHA1

      7052d6f32755bf211e9bb1729def685d3c8e743f

      SHA256

      2202bc1909d64ab74c506803d599679a78f5fe7cd9ce6c0472c51e87e6028a6e

      SHA512

      e014e81432e262cf16a17c8baf08b15b81f67a63b9e997d47e085f449025cf12b06c127d536745c22b90297849368f2f38f52498e720e6b43c5cf2ed40a10e21

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      8f486866469eed9d1c06d289227cfb79

      SHA1

      f40c5ed1c5bf371d4d1463b2062d11aca5e46d9c

      SHA256

      c2478cfb02a9bebdb9b01c58d4bc8da82cbdd3f8709926cdbb1a3de48df8e93c

      SHA512

      d96880f52923b2413cf294b30efbbc964bb83398f44986b30a04d68f481437519e0f39f5affc7f972919a7cb76e12cb6f846b8d02cebb6e656490dd3b58d2736

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{F379E860-451D-485F-A72E-0B248546B60F}.FSD

      Filesize

      128KB

      MD5

      dc82b28f185dd0d3c5d5b729a82d7ed8

      SHA1

      1e414819f0facfd412b2b042e5c003199eaaf8ec

      SHA256

      96eefb82204840b19a7831caffb547a6c0cb9e44e152f224df69a3c545e21091

      SHA512

      bed08e52f119b751c566d72dd80f70c3bcde53ca5a399cdc5b239ee2bc911ed368e2d3c353c9fe111bb6e2411d0db7cc82a82938dcffc3fd595a97cf52a745ca

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\beautifulgirlkissingoverhisfacebecauseshelovedhimalotwhichevennobodyknowbecausesheisverycutegirl___sheismywifemyheart[1].doc

      Filesize

      81KB

      MD5

      a25700450ee1d572b7869ff446d59c2b

      SHA1

      3819f98c1184e1f96c15f23064a3777cdbdbcdda

      SHA256

      28b3e66edd344febf0b9a0ff24b776731da1b0536fef2cd49762d262300dec87

      SHA512

      e699ab35ff836bada5b5eb92d832a89762e8cdbf5f2ebc6d17f208495b60afd037fb5af679f8431bd73b609f561997a5f261b9655a9af1feaa0b3ca3784d38c2

    • C:\Users\Admin\AppData\Local\Temp\ap50hbg.zip

      Filesize

      484KB

      MD5

      3bcbd3b08e4a8843fda34512623960a2

      SHA1

      244d3df69bbc09a43d4af3de5165f50506b8d7af

      SHA256

      7db638aa6b205aadba193dc7803a7e73eb07bbeeacbacad3a65978093e78673c

      SHA512

      914f366aab61ed2c13a87ee07e6a4b7aeffe4689c28014fab786244127852a19b7c1ae58bd8dd11840415035290373922f39b628c2409f68569cbf0b8a57e639

    • C:\Users\Admin\AppData\Local\Temp\nsd376B.tmp

      Filesize

      13B

      MD5

      f6dd1b23c7a68545a2c2dbf678cf8683

      SHA1

      43eeed66236b1b5868671abdc138051daa64fd16

      SHA256

      38e0646749072dd0bfa54e9cc2884b454d7ea22b08d816599d86f7f162e1c7e8

      SHA512

      a23ad3fc2ca9259a0641bc445eb71848c5e824694f844dea4d35d985aa65fa6a882af3d4f873042df9da564e0ec4afd0ad2bc6911c00a70f9e82171d53fb76d2

    • C:\Users\Admin\AppData\Local\Temp\nsd376B.tmp

      Filesize

      30B

      MD5

      f15bfdebb2df02d02c8491bde1b4e9bd

      SHA1

      93bd46f57c3316c27cad2605ddf81d6c0bde9301

      SHA256

      c87f2ff45bb530577fb8856df1760edaf1060ae4ee2934b17fdd21b7d116f043

      SHA512

      1757ed4ae4d47d0c839511c18be5d75796224d4a3049e2d8853650ace2c5057c42040de6450bf90dd4969862e9ebb420cd8a34f8dd9c970779ed2e5459e8f2f1

    • C:\Users\Admin\AppData\Local\Temp\nsi373B.tmp

      Filesize

      2B

      MD5

      25bc6654798eb508fa0b6343212a74fe

      SHA1

      15d5e1d3b948fd5986aaff7d9419b5e52c75fc93

      SHA256

      8e5202705183bd3a20a29e224499b0f77a8273ee33cd93cca71043c57ad4bdfc

      SHA512

      5868c6241ed3cfcc5c34bfe42e4b9f5c69e74975e524771d8c9f35cafc13fd01cd943ec4d8caefee79a1f4a457e69d20b7a86f88db83a5bc3e6bd8a619972898

    • C:\Users\Admin\AppData\Local\Temp\nsi373B.tmp

      Filesize

      7B

      MD5

      67cfa7364c4cf265b047d87ff2e673ae

      SHA1

      56e27889277981a9b63fcf5b218744a125bbc2fa

      SHA256

      639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713

      SHA512

      17f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b

    • C:\Users\Admin\AppData\Local\Temp\nso370C.tmp

      Filesize

      1B

      MD5

      8ce4b16b22b58894aa86c421e8759df3

      SHA1

      13fbd79c3d390e5d6585a21e11ff5ec1970cff0c

      SHA256

      8254c329a92850f6d539dd376f4816ee2764517da5e0235514af433164480d7a

      SHA512

      2af8a9104b3f64ed640d8c7e298d2d480f03a3610cbc2b33474321ec59024a48592ea8545e41e09d5d1108759df48ede0054f225df39d4f0f312450e0aa9dd25

    • C:\Users\Admin\AppData\Local\Temp\nso370C.tmp

      Filesize

      3B

      MD5

      4e27f2226785e9abbe046fc592668860

      SHA1

      28b18a7f383131df509f7191f946a32c5a2e410c

      SHA256

      01a219245e1501fee01ce0baea8f6065ce5162cea12fa570689a07c9717be81d

      SHA512

      2a23585835bdb5db8175cab265566042282841efdcee8aaba8b9b5d466b0f165c0c5973033ce94bb9a8f07a956689247981ea07ac5a51408263e1653d9710adb

    • C:\Users\Admin\AppData\Local\Temp\nso370C.tmp

      Filesize

      6B

      MD5

      50484c19f1afdaf3841a0d821ed393d2

      SHA1

      c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b

      SHA256

      6923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c

      SHA512

      d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b

    • C:\Users\Admin\AppData\Local\Temp\nso370C.tmp

      Filesize

      8B

      MD5

      c3cb69218b85c3260387fb582cb518dd

      SHA1

      961c892ded09a4cbb5392097bb845ccba65902ad

      SHA256

      1c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101

      SHA512

      2402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422

    • C:\Users\Admin\AppData\Local\Temp\nso370C.tmp

      Filesize

      9B

      MD5

      2b3884fe02299c565e1c37ee7ef99293

      SHA1

      d8e2ef2a52083f6df210109fea53860ea227af9c

      SHA256

      ae789a65914ed002efb82dad89e5a4d4b9ec8e7faae30d0ed6e3c0d20f7d3858

      SHA512

      aeb9374a52d0ad99336bfd4ec7bb7c5437b827845b8784d9c21f7d96a931693604689f6adc3ca25fad132a0ad6123013211ff550f427fa86e4f26c122ac6a0fe

    • C:\Users\Admin\AppData\Local\Temp\nso370C.tmp

      Filesize

      10B

      MD5

      9a53fc1d7126c5e7c81bb5c15b15537b

      SHA1

      e2d13e0fa37de4c98f30c728210d6afafbb2b000

      SHA256

      a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92

      SHA512

      b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1

    • C:\Users\Admin\AppData\Local\Temp\nst368C.tmp

      Filesize

      4B

      MD5

      cde63b34c142af0a38cbe83791c964f8

      SHA1

      ece2b194b486118b40ad12c1f0e9425dd0672424

      SHA256

      65e2d70166c9a802b7ad2a87129b8945f083e5f268878790a9d1f1c03f47938d

      SHA512

      0559d3d34ad64ccc27e685431c24fc6ead0f645db14fa0e125a64fb67dbd158c15432c1fc5407811aac8a3486090dfbcfcbc3c6bf5aa0ec73f979ef62d14853c

    • C:\Users\Admin\AppData\Local\Temp\nst368C.tmp

      Filesize

      54B

      MD5

      8e69760955a717be873f8253ebc6905b

      SHA1

      c813b0cc54451465777460ef2f46bc98c273c739

      SHA256

      3159fb26988fd82c5a652bdf09e65bb021011a4f8953f009c0a7d893149a9c8e

      SHA512

      16de94f841400aeffd2b67ca45e807da10023229f667f746b8fc7b127c347d843ff51b822191e656a94b63d8c8187c928d40113914d34570136c878b64279600

    • C:\Users\Admin\AppData\Local\Temp\nst36DB.tmp\System.dll

      Filesize

      12KB

      MD5

      4add245d4ba34b04f213409bfe504c07

      SHA1

      ef756d6581d70e87d58cc4982e3f4d18e0ea5b09

      SHA256

      9111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706

      SHA512

      1bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d

    • C:\Users\Admin\AppData\Local\Temp\{B9C39005-6F74-4D44-ABFF-3BE34341C118}

      Filesize

      128KB

      MD5

      25dc96914bcb93a3cac1ea524bafdf01

      SHA1

      660c2da64c7f36ba374bc14d8b232bfe83000cac

      SHA256

      1370bc74e1d3cbb1d2dc75a4f02b95de6d5ad4c9ac284feb73d89f18836d7a02

      SHA512

      8ba9c75716fd771a895de111dfd5194fd1d8a3eb5300c980ad02b9b1f157d5eb4b5a6f58e7d6b736e96ee9e4a3055cbd106cff107988dd2defdf7c41065e6e57

    • C:\Users\Admin\AppData\Roaming\hjc.exe

      Filesize

      514KB

      MD5

      92135b53207ed338da3109eb28c4a137

      SHA1

      84bc0ea94497cde525cc089b7e20e673489d19bf

      SHA256

      33c32b7ea0d565f9dad38b2d31b28afa1d28a63bab459da14c3801f6e33b3a4e

      SHA512

      23e4f2b6673e78fe168cbe1af1e8398de845d61b3417ac7ec5bbcd9534968209e9fddb2944a928ad020a17c9a8e66c4daa27be2b9f1e3261d624390ebe272ba3

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      922KB

      MD5

      dda1b03a5cd2ca37c96b7daf5e3a8ed7

      SHA1

      c70e5f58e61980d39608f0795879bf012dbbbca2

      SHA256

      79f86c1edbbc69652a03a0f5667b3985bcf1e19f16fa3b8c7934e5b97ab8586d

      SHA512

      bf83648c9b5d6d65b2c8409d262a1b7421d2cb13d6c759ec5f352c2d1c5adff3ee2395250fbdfe3590f25fe96bf6b40c2d82a8e7eecaab03be2e6a398e83981f

    • memory/1196-7-0x0000000004530000-0x0000000004532000-memory.dmp

      Filesize

      8KB

    • memory/1196-5-0x000000007254D000-0x0000000072558000-memory.dmp

      Filesize

      44KB

    • memory/1196-3-0x000000002FE21000-0x000000002FE22000-memory.dmp

      Filesize

      4KB

    • memory/1196-667-0x000000007254D000-0x0000000072558000-memory.dmp

      Filesize

      44KB

    • memory/1576-673-0x0000000000080000-0x00000000000BF000-memory.dmp

      Filesize

      252KB

    • memory/1576-715-0x0000000061E00000-0x0000000061ED2000-memory.dmp

      Filesize

      840KB

    • memory/1576-714-0x0000000000080000-0x00000000000BF000-memory.dmp

      Filesize

      252KB

    • memory/1576-676-0x0000000000080000-0x00000000000BF000-memory.dmp

      Filesize

      252KB

    • memory/2340-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2340-677-0x0000000006CC0000-0x0000000006DFB000-memory.dmp

      Filesize

      1.2MB

    • memory/2340-1-0x000000007254D000-0x0000000072558000-memory.dmp

      Filesize

      44KB

    • memory/2340-664-0x000000007254D000-0x0000000072558000-memory.dmp

      Filesize

      44KB

    • memory/2340-8-0x0000000002FA0000-0x0000000002FA2000-memory.dmp

      Filesize

      8KB

    • memory/2892-671-0x0000000000400000-0x0000000001462000-memory.dmp

      Filesize

      16.4MB

    • memory/2892-670-0x0000000000400000-0x0000000001462000-memory.dmp

      Filesize

      16.4MB

    • memory/2892-675-0x0000000000400000-0x0000000001462000-memory.dmp

      Filesize

      16.4MB

    • memory/2892-668-0x0000000000400000-0x0000000001462000-memory.dmp

      Filesize

      16.4MB

    • memory/2892-666-0x0000000000400000-0x0000000001462000-memory.dmp

      Filesize

      16.4MB