Analysis

  • max time kernel
    61s
  • max time network
    39s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:41

General

  • Target

    eab869eef3b586266919e8d303d196beeb0f22d3f3cbc7b1f521a7e67acd4cf5.xlam

  • Size

    690KB

  • MD5

    404eec23afb533475c11493f7d367ec0

  • SHA1

    844ba233d3ba4ecc44596bc78f90eecffd0286de

  • SHA256

    eab869eef3b586266919e8d303d196beeb0f22d3f3cbc7b1f521a7e67acd4cf5

  • SHA512

    a44c6f824fee4dde24a37d9671bea3f621e734d05e3617cd29d7de7a350642868a03d054c9f30c989b73369b28cda661bc239d91356c054f34ab2fbdf998af4e

  • SSDEEP

    12288:FyeyA+762GP2WtqK6PkE9AbE6zFNmeS1DZ5RRvb55dwdlnu3vAb9oFTEYhQ/mqG:FyRr702PVQEaFNmeYDZ5RRvEkAb9ITAQ

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\eab869eef3b586266919e8d303d196beeb0f22d3f3cbc7b1f521a7e67acd4cf5.xlam
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1976
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Launches Equation Editor
    PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\coolz.exe

    Filesize

    4KB

    MD5

    59f1148ca134af5155565b81f3ebd17f

    SHA1

    bae69faa072020da4960f4465a08544ae05059cd

    SHA256

    fdbf442446b269cc7efb4201b6bc3fea7c17c335a32b0ccac1e59df67cd06556

    SHA512

    641459e9c6ef7a2e8f606286fde64e702990f17aab6d9268338d4b0e0d2570dff730cc684ddc3436f50a271d9b777d2edeec5d94084085faf2a82f9b6c9a23cf

  • memory/1976-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1976-1-0x0000000072A3D000-0x0000000072A48000-memory.dmp

    Filesize

    44KB

  • memory/1976-22-0x0000000072A3D000-0x0000000072A48000-memory.dmp

    Filesize

    44KB