Analysis

  • max time kernel
    1155s
  • max time network
    1159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 11:57

General

  • Target

    ManagerOfficeTool-main/Files/ODT_ConfigXML/OfficeConfig2013.xml

  • Size

    628B

  • MD5

    1dd35ae53b86eb9928af102f1b8dfb4a

  • SHA1

    0702a5893e7475deaeea1df429f67ce4aea7f9c6

  • SHA256

    4f44b88f3e8b5e98051165a7ff415528f7c88d051c9d192405f013ca05c29cae

  • SHA512

    a8a46a4e72abc21c1fbad5a568cb2533efd479c5780fea654c84f7b9560205ff3b58c933f88d1ad8817928886c212df3681d3da73028e2844ad054ffcd2111c7

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\ManagerOfficeTool-main\Files\ODT_ConfigXML\OfficeConfig2013.xml"
    1⤵
      PID:4768
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4592
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ManagerOfficeTool-main\RunInstallOffice.bat" "
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:2420
        • C:\Windows\system32\openfiles.exe
          openfiles
          2⤵
            PID:1648
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -ExecutionPolicy RemoteSigned -File "Install.ps1"
            2⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4500

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\ManagerOfficeTool-main\Files\Uninstall\Get-OfficeVersion.ps1

          Filesize

          12KB

          MD5

          95d4899fddd68691a88a6fba4bb435fa

          SHA1

          73a2c45df273b9d950f0ac65a0c110dd9bf6c3dd

          SHA256

          b262189025e54340a0cb54875ebea2bea9a95b0218f18aa1e8f5a908002330e5

          SHA512

          66f585d89994aaf41f0d2f3cd563516ed19764219f12fddbf0bced9994a343231d977853975edb8397eecc3fd90e9f8f3afe8f666564390030220d531c04d9fe

        • C:\Users\Admin\AppData\Local\Temp\ManagerOfficeTool-main\Files\Uninstall\Remove-PreviousOfficeInstalls.ps1

          Filesize

          66KB

          MD5

          27a07d948b099980d5be012368a5868f

          SHA1

          257841fc7b7ee4cd15d1eb591bcdbe57183ca364

          SHA256

          9ae43691b7a70486caa3c7cf36fe5b195ba09006bf39d0fdcdbef28a23ed19a4

          SHA512

          80d1c55ae6a576f5e2a4553cfdc02df3d0901706cded7259724eca638544df674e90cc47903d9129aefaff96a2606b915a69522d03e1fc002b186974d3bf5731

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pnizmpkf.3ow.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/4500-5-0x00007FFEE42F0000-0x00007FFEE44E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4500-18-0x000001E3F8270000-0x000001E3F8798000-memory.dmp

          Filesize

          5.2MB

        • memory/4500-4-0x00007FFEE42F0000-0x00007FFEE44E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4500-6-0x00007FFEE42F0000-0x00007FFEE44E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4500-7-0x000001E3F52D0000-0x000001E3F52F2000-memory.dmp

          Filesize

          136KB

        • memory/4500-51-0x00007FFEE42F0000-0x00007FFEE44E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4500-17-0x000001E3F7B70000-0x000001E3F7D32000-memory.dmp

          Filesize

          1.8MB

        • memory/4500-30-0x00007FFEE42F0000-0x00007FFEE44E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4500-28-0x00007FFEE42F0000-0x00007FFEE44E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4500-27-0x00007FFEE42F0000-0x00007FFEE44E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4768-2-0x00007FFEE42F0000-0x00007FFEE44E5000-memory.dmp

          Filesize

          2.0MB

        • memory/4768-0-0x00007FFEA4370000-0x00007FFEA4380000-memory.dmp

          Filesize

          64KB

        • memory/4768-1-0x00007FFEE438D000-0x00007FFEE438E000-memory.dmp

          Filesize

          4KB

        • memory/4768-3-0x00007FFEE42F0000-0x00007FFEE44E5000-memory.dmp

          Filesize

          2.0MB