Analysis

  • max time kernel
    1141s
  • max time network
    1148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 11:57

General

  • Target

    ManagerOfficeTool-main/RunInstallOffice.bat

  • Size

    1KB

  • MD5

    67220c6f2714056236b22f6c0050a1a0

  • SHA1

    c54e1e079fb9a8e85500283a739675a2c09f8358

  • SHA256

    c9fa95a5b741fc6e9355702f7925c8c0c629b6d7da914d4159c66ed7bee05fe6

  • SHA512

    9fbd25d7ae9f6340e7b49a584a191e5f4afe542809d74f4612cbddbbf4ff899633cda9dcc696d58662e5f9f0ed6c251f1cb9fda93513682d06badb7b6d3d4899

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ManagerOfficeTool-main\RunInstallOffice.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Windows\system32\openfiles.exe
      openfiles
      2⤵
        PID:1752
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy RemoteSigned -File "Install.ps1"
        2⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3688
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\LockSearch.xlsx"
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:2784
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -nohome
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:17410 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3260
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -nohome
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3168
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3168 CREDAT:17410 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1788

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BDFFCF12-BBA7-11EF-9361-C67090DD1599}.dat

      Filesize

      5KB

      MD5

      7b5be38092d5b2dd29b3c20425ffb0a5

      SHA1

      9eab65a405704bf1fc1ed3d03d4428d1794f584d

      SHA256

      ff9d69680bf13e872d8d803d55921fd892e57e00d36d8e557846407cf68f0808

      SHA512

      bcd8033e9d252019c6999820a09034f7b67533a1dbda3fe223e5ff111d0978ef9a58eaccb3c6c96b0a7259cd7270eda0e7a8da9d97d0a51571c835731c5d6a53

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{B050C8B9-848C-11EF-9359-46B98598D6FF}.dat

      Filesize

      5KB

      MD5

      2650a895056abd20ff8cb7b5f9006fe4

      SHA1

      7962710be38e55423269827ab165b9af19d4fa59

      SHA256

      8025115f857ba1227a12babca10895f2405f366c08ca64fc44cfeb55fe460df0

      SHA512

      aaa5b419c351516b7898beb92f1924e011fc0945eab5a98b6eb5d251bc29c8a411285e488978acccc677e2f4c0bf74d6d0c085a378d2cd2eacd9f0af03d8a09c

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{BDFFCF15-BBA7-11EF-9361-C67090DD1599}.dat

      Filesize

      4KB

      MD5

      a35038c1ad1d02a3eb7e1e55ba76d863

      SHA1

      366f6161631c86d3b11fbbadd8164404dfec2979

      SHA256

      7d25e47bca73a38cbc98e506f65abaf5890f5db866d09249e3792b72b1645fe6

      SHA512

      0502b0e19e56ce3f93cdf96a1e0023bc62199e8796f8fe8059826b87e789a61dcd336f926196fff8d82f275893d54f59f5d4dccd2388f6e01cb3270f027f00a1

    • C:\Users\Admin\AppData\Local\Temp\ManagerOfficeTool-main\Files\Uninstall\Get-OfficeVersion.ps1

      Filesize

      12KB

      MD5

      95d4899fddd68691a88a6fba4bb435fa

      SHA1

      73a2c45df273b9d950f0ac65a0c110dd9bf6c3dd

      SHA256

      b262189025e54340a0cb54875ebea2bea9a95b0218f18aa1e8f5a908002330e5

      SHA512

      66f585d89994aaf41f0d2f3cd563516ed19764219f12fddbf0bced9994a343231d977853975edb8397eecc3fd90e9f8f3afe8f666564390030220d531c04d9fe

    • C:\Users\Admin\AppData\Local\Temp\ManagerOfficeTool-main\Files\Uninstall\Remove-PreviousOfficeInstalls.ps1

      Filesize

      66KB

      MD5

      27a07d948b099980d5be012368a5868f

      SHA1

      257841fc7b7ee4cd15d1eb591bcdbe57183ca364

      SHA256

      9ae43691b7a70486caa3c7cf36fe5b195ba09006bf39d0fdcdbef28a23ed19a4

      SHA512

      80d1c55ae6a576f5e2a4553cfdc02df3d0901706cded7259724eca638544df674e90cc47903d9129aefaff96a2606b915a69522d03e1fc002b186974d3bf5731

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gwc4slbl.ibj.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\~DFAF86BDAB6DC3C4F8.TMP

      Filesize

      16KB

      MD5

      c6eea4ae5e2fc6cfb10175ca4d0c9d6c

      SHA1

      80f20730d8ae3314653f5f43529a947e08ff29be

      SHA256

      4c3a527b3d9cb92a9d63b989e8f1e49da258ffe740b5ee1adc761df17b55bf05

      SHA512

      595a531a24732395e1c458a3fcdbdd713ee54365b06307cf06f5c4bbae9e204a64cae9196f045ed30950086ac0f58b4e9350537b98a335dbff1f0718a6168011

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      368B

      MD5

      f19a9fcccdf19a0a42caf34478911b14

      SHA1

      b4f1ee9ccb811cc69072fbe907c9a6ed57df4e1d

      SHA256

      2f3db98ff2602ce9b65eab1860cf8d44fe1bf6f71ba874036df2f9daa3c5053a

      SHA512

      a651cfceff49e9fae4b26d45ece1b6c5df9acc7296cb8350a37290e63f1ac8f3a145f8168da9efa4d35824593a1ec40bad9cb9bb4c9a8fc8f637606c59521c8c

    • memory/2784-68-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-67-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-128-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-126-0x00007FF843590000-0x00007FF8435A0000-memory.dmp

      Filesize

      64KB

    • memory/2784-127-0x00007FF843590000-0x00007FF8435A0000-memory.dmp

      Filesize

      64KB

    • memory/2784-125-0x00007FF843590000-0x00007FF8435A0000-memory.dmp

      Filesize

      64KB

    • memory/2784-124-0x00007FF843590000-0x00007FF8435A0000-memory.dmp

      Filesize

      64KB

    • memory/2784-109-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-105-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-104-0x00007FF8835AD000-0x00007FF8835AE000-memory.dmp

      Filesize

      4KB

    • memory/2784-54-0x00007FF843590000-0x00007FF8435A0000-memory.dmp

      Filesize

      64KB

    • memory/2784-55-0x00007FF8835AD000-0x00007FF8835AE000-memory.dmp

      Filesize

      4KB

    • memory/2784-56-0x00007FF843590000-0x00007FF8435A0000-memory.dmp

      Filesize

      64KB

    • memory/2784-57-0x00007FF843590000-0x00007FF8435A0000-memory.dmp

      Filesize

      64KB

    • memory/2784-58-0x00007FF843590000-0x00007FF8435A0000-memory.dmp

      Filesize

      64KB

    • memory/2784-59-0x00007FF843590000-0x00007FF8435A0000-memory.dmp

      Filesize

      64KB

    • memory/2784-64-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-63-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-62-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-61-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-65-0x00007FF841130000-0x00007FF841140000-memory.dmp

      Filesize

      64KB

    • memory/2784-60-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-66-0x00007FF841130000-0x00007FF841140000-memory.dmp

      Filesize

      64KB

    • memory/2784-101-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-76-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-77-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-75-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-74-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-73-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-72-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-71-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-70-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/2784-69-0x00007FF883510000-0x00007FF883705000-memory.dmp

      Filesize

      2.0MB

    • memory/3688-37-0x00007FF865410000-0x00007FF865ED1000-memory.dmp

      Filesize

      10.8MB

    • memory/3688-28-0x00007FF865410000-0x00007FF865ED1000-memory.dmp

      Filesize

      10.8MB

    • memory/3688-18-0x000001D87A320000-0x000001D87A848000-memory.dmp

      Filesize

      5.2MB

    • memory/3688-53-0x00007FF865410000-0x00007FF865ED1000-memory.dmp

      Filesize

      10.8MB

    • memory/3688-50-0x00007FF865410000-0x00007FF865ED1000-memory.dmp

      Filesize

      10.8MB

    • memory/3688-15-0x000001D8794C0000-0x000001D8796DC000-memory.dmp

      Filesize

      2.1MB

    • memory/3688-14-0x00007FF865410000-0x00007FF865ED1000-memory.dmp

      Filesize

      10.8MB

    • memory/3688-35-0x00007FF865410000-0x00007FF865ED1000-memory.dmp

      Filesize

      10.8MB

    • memory/3688-0-0x00007FF865413000-0x00007FF865415000-memory.dmp

      Filesize

      8KB

    • memory/3688-27-0x00007FF865410000-0x00007FF865ED1000-memory.dmp

      Filesize

      10.8MB

    • memory/3688-17-0x000001D879C20000-0x000001D879DE2000-memory.dmp

      Filesize

      1.8MB

    • memory/3688-13-0x00007FF865413000-0x00007FF865415000-memory.dmp

      Filesize

      8KB

    • memory/3688-12-0x00007FF865410000-0x00007FF865ED1000-memory.dmp

      Filesize

      10.8MB

    • memory/3688-11-0x00007FF865410000-0x00007FF865ED1000-memory.dmp

      Filesize

      10.8MB

    • memory/3688-10-0x000001D861130000-0x000001D861152000-memory.dmp

      Filesize

      136KB