Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 15:27

General

  • Target

    Revise Invoice FWD58830983.rtf

  • Size

    137KB

  • MD5

    b8095d37a9246921c8242980e5802440

  • SHA1

    b7b00ce8ba2f28c1b1d0d99c313a8c7288914bcb

  • SHA256

    8093bbfe75262f5ec89b1e88228284b330f79a0079b698ac5c2bdcf007779ea4

  • SHA512

    c6cc9536897548ae29e51d930ae00455336665d13cdd4d6bdfd4c9619bc63dd4180d8690ed0f410508e6d86cde9c44c15ad47f6df764de0e297305aa496d5f5e

  • SSDEEP

    3072:twAlawAlawAlawAlrncvPGtxVydeWCQTmL:twAYwAYwAYwAVcvPGtbydOQg

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Revise Invoice FWD58830983.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1536
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Launches Equation Editor
      PID:2628

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      9fd4737ea4337eedac4d68a1f75c941e

      SHA1

      1239082d26cb580fde86b3e7223649894cf5fc6a

      SHA256

      266c6e099d9bc5459fdfe686621bde7de04d57d86048d02790b7d389abb2083b

      SHA512

      10da3d58e8d149df966e8e72404e5f7b0c2b3607244ec00e8abcf497106f0035264b48a4b38c279208c9473a0e9cf13793bad5d1304751a5cf1587b02818275c

    • memory/2372-0-0x000000002F0C1000-0x000000002F0C2000-memory.dmp

      Filesize

      4KB

    • memory/2372-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2372-2-0x00000000717FD000-0x0000000071808000-memory.dmp

      Filesize

      44KB

    • memory/2372-44-0x00000000717FD000-0x0000000071808000-memory.dmp

      Filesize

      44KB

    • memory/2372-65-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB