Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 02:04

General

  • Target

    cfa70bdd4f97f10fdb4067b7683edc6aefcd90ac65e83e783efc3e8ffbfedc03.xls

  • Size

    308KB

  • MD5

    fd1a4445eb0ac43a444303dfbcd14bff

  • SHA1

    cdd327c448729d39584282a461d10c37b3f00a4f

  • SHA256

    cfa70bdd4f97f10fdb4067b7683edc6aefcd90ac65e83e783efc3e8ffbfedc03

  • SHA512

    2243b86581a8bfa0315367d5c914a2a72f4137585b9ce4e86bacd6ecf42ef570e591ec39dff5262769307590fbb138417149a9f8dedb442bd42eddc59eaa78fa

  • SSDEEP

    6144:lKW5fnuSrQBkay4KX4mEmHSCn0rhia5WQ2P2TFHsEvT9KLtXqO:vvuSrgkayFX4/ULTPasEvYLtq

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Abuses OpenXML format to download file from external location
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\cfa70bdd4f97f10fdb4067b7683edc6aefcd90ac65e83e783efc3e8ffbfedc03.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2912
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1812
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1824
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\importedlionsbluelinkimagesvie.vbs"
        2⤵
        • Blocklisted process makes network request
        PID:1296

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Exploitation for Client Execution

    1
    T1203

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      1KB

      MD5

      64c143e9f2a438ddf74501d3b3cc54bf

      SHA1

      66b41aabcaa5c364d405c858b85fa7a995f53c72

      SHA256

      02802fa86c2539668fb375ddf8b3ffa5a6c7ad8ae0050c3471dc9fca1275c0ca

      SHA512

      9decfe443630833dfc6c4e2b728c0395d0cbd59a5d868639f300244c4c61df6540b21d33497a8dd4e1947aaef02e4cbc815f53acc21d70ba1653d9492f438e96

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
      Filesize

      724B

      MD5

      8202a1cd02e7d69597995cabbe881a12

      SHA1

      8858d9d934b7aa9330ee73de6c476acf19929ff6

      SHA256

      58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

      SHA512

      97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      410B

      MD5

      ea4fecfc6db938da716dbef1cfd1c428

      SHA1

      87227e8e9f38a9eeb1144e340ac29cb9792af74d

      SHA256

      25672d54280fdcc6df086bdd543dab3dd1ac11c815bae3de2d24042e7c844ef0

      SHA512

      428752d38d3931e46c2c398ff9453fe85201a4093f65b5031196b3ab82b07a094ceb24e59ed7fc4c2920bb3e7bb1e6e031ef63f9b03a50fa9328e7a81c112994

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      983f88364a6a34d2c00d19a930a2a8c7

      SHA1

      babee912678531b1ff06fbe8175f546e657aec73

      SHA256

      526ff65ece9a4327bed60468f772f3f0d4544f1d18141406c02460765cec1c01

      SHA512

      300674b87493e6aa132920e52903c103c54c5e98e8c4ca724ebd05189a4c47d61516e94f38fef5b40989a4d75a9fc246f96a13d85c1e85b5d95dd902f1a5a68c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
      Filesize

      392B

      MD5

      828e0e1c04a37722d1ab1f30d249385a

      SHA1

      4454c28e3a6bd649b7564a2b93d03a2a13a2ec51

      SHA256

      9b88f3333c75c99658bbab920709d2b36289440ccde0b500dde08faab0060511

      SHA512

      2713eb1964cd97ee42f98e64655229d7f4b8103656b0922c4e8ab0cd355659ca68b4d5e7e17cb5c5229bf90a1d5c54a7978f25ea2e64dbb97b7f3e6eb8be7473

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{E2F3603F-0E5E-470B-8C2C-16368D8F80D2}.FSD
      Filesize

      128KB

      MD5

      aba468f1efc86662fce006517817e2aa

      SHA1

      4701f240bebc79d5e0bf44c3bc77994dcc61c9c2

      SHA256

      969bee635560d32dbe0f3c4ff40aad0f76e5ab28956c1f5dc58bfb5a3d8dc0d5

      SHA512

      57e10898069964dde14ee1c4eed2ce12115326fab98498ec0d7ae5eb6fb49888dc8eb44413be97b4463220facaa88e5adbf26daacddef35672c9728f4512af3f

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      08bcc40a575dfae47f469a062627cd42

      SHA1

      9c9bb0147bcbbfa590978cad3083ce4690137910

      SHA256

      16c45a91018e9a7879e1f8e016383e6d5d75a58cf1e0378ec3315820fb714012

      SHA512

      7d3fe60f9c320bbb31900969b7ecc3bb4b4ed7ab8cec64b63a52e6ea8b1ea791720d7082e0717d9fb97d3e6eeb6fb893451c10efd47d168af6a7d151ee643631

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{D6F47B2F-9151-453D-8037-57138797E9C8}.FSD
      Filesize

      128KB

      MD5

      bba2f5142cd867571b8a451b5d516ed0

      SHA1

      243209204bc959005cd0353363602aab0b5b295b

      SHA256

      2c7bcd0e9a3e5ec59736b76ef8be435cc0bffa74b622bb297a3b920f6ab40222

      SHA512

      8aeace549084cea3370cbab517d21e448b22b13baf77395784121cf5cbfcae951813c33258a7c6a5d5352456d47891686e7a329cb9fb6a2c5878d259ad90fcd2

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PH7CXNA3\bluelinkimagesgreatwithlionpicturewhichlooklikeverybeautifultoseetheadvantageoflionisbehavingattitudeallgreaterthe__anothergirltosee[1].doc
      Filesize

      37KB

      MD5

      579ae7684b44059c6df7f843af04fd72

      SHA1

      dd8a17517b4b1d0216bfe6c38e9e61745f4d221a

      SHA256

      1a3b16582a25d3970441c462299bf550c85c7f4f5887392b1248dc3198584961

      SHA512

      bcb3551e003988d111a0ca0626e89ea236be5f3c748496642b8c35df81e4d24ac983289f7698d0a1945ad628b2ef7e2809b792b6cd3ca04efd763b235efc4e7f

    • C:\Users\Admin\AppData\Local\Temp\Cab35D1.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar3BE9.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\{7F577A25-6EA3-4C32-995E-E4C74F7946AD}
      Filesize

      128KB

      MD5

      4520622db56e0bc56e974bee0eb5fa9b

      SHA1

      debec8a71b9c3f517a119b21e28f95ecf66ab2ed

      SHA256

      c28f23391c75c41edf324cc62975130ec6ea1a886baadd54e58bf05d3887ebad

      SHA512

      6e364eeb4dae8a482db76f1fdf577b367045bb8165c070f466d63ef6e1f128c2e78817ff02371c748c12db63496c6beb3856ed547c36b3ee6f7478a82543175f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      384b993a01f51ecfe940012cefc5dfdc

      SHA1

      501ff3a0c086e46f355d0255605a482136710851

      SHA256

      271699f237196ef82885ec468a64696d9cd9f07db589011a7c348c3801ab7abf

      SHA512

      1197cb6f52af015cdcea4ce5363a5896bd9b3595314d77e2a60cb2ab21eaa04a8ac86ab94675373d58e96662643a660249127c76e45f217ea11c9cc81aa1628c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5ZT2ARQI.txt
      Filesize

      70B

      MD5

      6a8c9f7f72a2b142fc81f2f9d2b23c62

      SHA1

      b44824960eef8e396700abf184fd8c3964151b2b

      SHA256

      e484328dcf9e992b92f4806761751cf7e6e11c677177dbe53d2965f2c1639329

      SHA512

      e59196f4b1db06670f56c4c49e43908ec4dc345e164ab5ae10f1348ae1832054084c98d088d4044daadb3448daf56cbd43d43834f6319d6908d46b5423c54dcb

    • C:\Users\Admin\AppData\Roaming\importedlionsbluelinkimagesvie.vbs
      Filesize

      155KB

      MD5

      f340507bbe86fcff3722dacadda47d9b

      SHA1

      ec8d9a33843fec429242ae8be9892af430abd8cf

      SHA256

      ec3b9d9887354ad33cf8c2d84a3e20d3a63bec9e7d6cc6414c81915887da2ecb

      SHA512

      a4fd8b6cb55beb322617fbdd3a824b5a7238812b75f1150ebc24f86f1cc245425b303fffa3af02c1894987681fa692d7bf0e4861901ba55e54290b8a644dbc9e

    • memory/2752-24-0x00000000045D0000-0x00000000045D2000-memory.dmp
      Filesize

      8KB

    • memory/2752-22-0x000000007230D000-0x0000000072318000-memory.dmp
      Filesize

      44KB

    • memory/2752-20-0x000000002FCF1000-0x000000002FCF2000-memory.dmp
      Filesize

      4KB

    • memory/2752-132-0x000000007230D000-0x0000000072318000-memory.dmp
      Filesize

      44KB

    • memory/2752-154-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2752-155-0x000000007230D000-0x0000000072318000-memory.dmp
      Filesize

      44KB

    • memory/2912-0-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2912-25-0x0000000001DE0000-0x0000000001DE2000-memory.dmp
      Filesize

      8KB

    • memory/2912-131-0x000000007230D000-0x0000000072318000-memory.dmp
      Filesize

      44KB

    • memory/2912-1-0x000000007230D000-0x0000000072318000-memory.dmp
      Filesize

      44KB