Skip to main content

LD-Malicious Attachment Detected

Table of Contents

TL;DR
#

A phishing email impersonating an invoice notification was delivered to richard@letsdefend.io from the spoofed address accounting@cmail.carleton.ca. The password-protected attachment contained a malicious Office file exploiting CVE-2017-11882 (Microsoft Equation Editor RCE). Upon opening, EQNEDT32.EXE was spawned by excel.exe and performed an outbound GET request to http://andaluciabeach.net/image/network.exe, successfully downloading a payload (network.exe) from 5.135.143.133. The attacker subsequently dropped and executed JuicyPotato.exe from C:/User/Public/ under NT Authority/System, achieving full local privilege escalation on the compromised host. The alert is classified as a True Positive with confirmed endpoint compromise.

Alert Overview
#

FieldValue
EventID45
Event TimeJan 31, 2021, 03:48 PM
RuleSOC114 - Malicious Attachment Detected - Phishing Alert
LevelSecurity Analyst
SMTP Address49.234.43.39
Source Addressaccounting@cmail.carleton.ca
Destination Addressrichard@letsdefend.io
E-mail SubjectInvoice
Device ActionAllowed

Investigation
#

An inbound email arrived at richard@letsdefend.io from accounting@cmail.carleton.ca with the subject “Invoice” and a generic body — “Dear customer, Your invoice for the shopping you have done is attached. Regards.” The email originated from SMTP address 49.234.43.39 and was delivered without being blocked by the mail gateway.

Email details

The email carried a password-protected attachment (password: infected) with the filename hash c9ad9506bcccfaa987ff9fc11b91698d. The extracted file was identified as:

Attachment filename

1Filename   44e65a641fb970031c5efed324676b5018803e0a768608d3e186152102615795.xlsx
2MD5        c9ad9506bcccfaa987ff9fc11b91698d
3SHA-1      e788183a2a021f74a21f609e514bb63c4ef2fe49
4SHA-256    44e65a641fb970031c5efed324676b5018803e0a768608d3e186152102615795
5File type  MS PowerPoint Presentation (OLE2 Encrypted Structured Storage)
6File size  2.12 MB (2218496 bytes)
7Magika     PPT
8TrID       Microsoft Encrypted Structured Storage Object (96.9%), Generic OLE2 / Multistream Compound (3%)
9TLSH       T145A5334026D14F16D93F52B080DF983653AFCD38FE941E9962063F69B47AA7A33C624D

VirusTotal analysis returned 36/62 detections. The file was tagged with cve-2017-11882, exploit, and executes-dropped-file. Multiple vendors classified it as a trojan downloader exploiting the Microsoft Office Equation Editor vulnerability CVE-2017-11882.

VirusTotal detection

VirusTotal vendor detections

VirusTotal behavior analysis revealed two contacted URLs associated with the sample, both resolving to andaluciabeach.net, with http://andaluciabeach.net/image/network.exe flagged by 12/95 vendors.

Contacted URLs

The endpoint was contained. Review of Richard’s proxy logs confirmed that the host 172.16.17.45 successfully performed a GET request to http://andaluciabeach.net/image/network.exe (resolving to 5.135.143.133) at 16:15 on Jan 31, 2021. The request was initiated by EQNEDT32.EXE — the Microsoft Equation Editor process — spawned under excel.exe, confirming successful exploitation of CVE-2017-11882. The device action was recorded as Allowed, meaning the payload was downloaded.

Proxy raw log

Following the payload download, process logs revealed that JuicyPotato.EXE was executed at 16:20 from C:/User/Public/JuicyPotato.exe under the NT Authority/System context, indicating successful local privilege escalation after the initial compromise.

JuicyPotato execution

1MD5    808502752ca0492aca995e9b620d507b
2Path   C:/User/Public/JuicyPotato.exe
3Size   340 KB
4User   NT Authority/System
5Time   2021-01-31 16:20

IOCs
#

TypeValue
MD5c9ad9506bcccfaa987ff9fc11b91698d
SHA-25644e65a641fb970031c5efed324676b5018803e0a768608d3e186152102615795
SMTP IP49.234.43.39
Senderaccounting@cmail.carleton.ca
Payload URLhttp://andaluciabeach.net/image/network.exe
C2 IP5.135.143.133
Domainandaluciabeach.net
MD5 (tool)808502752ca0492aca995e9b620d507b (JuicyPotato.exe)
Host IP172.16.17.45

MITRE ATT&CK
#

TacticTechniqueID
Initial AccessPhishing: Spearphishing AttachmentT1566.001
ExecutionExploitation for Client Execution (CVE-2017-11882)T1203
ExecutionUser Execution: Malicious FileT1204.002
Command and ControlIngress Tool TransferT1105
Privilege EscalationExploitation for Privilege Escalation (JuicyPotato)T1068
Defense EvasionObfuscated Files or Information (password-protected archive)T1027