Resubmissions

07/09/2022, 08:56

220907-kv41hagfgr 7

07/09/2022, 08:50

220907-krq98sbdh9 1

Analysis

  • max time kernel
    149s
  • max time network
    131s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07/09/2022, 08:50

General

  • Target

    decrypted.xlsx

  • Size

    44KB

  • MD5

    87555a91dcf29533d97a5a15dcba0399

  • SHA1

    38c779ae0852f52a0cd96f710172517a53cb230a

  • SHA256

    da7ad3bdbc357f1579f83704c76a095a4614321606c95323bd518c8f1c21783a

  • SHA512

    d1c154b796e5065d5d3eedb71084538148fc93a53101c0ddc549ecb94bfc835c4d0ee01b645858c46374f1e1612b8b3e515bab2f43313c4b18ad317bbad93563

  • SSDEEP

    768:Ydi8TzBPCP4XwBkNWZ3cjvmWa+V7kX9On8YWihjZ01qMapVsiU/UFxh3+q/RNP:YM8TlZCkNWZ3c3ayEINZcHapVsXcFxhB

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\decrypted.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2436
  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:4440

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\C52EQBTK\138[1].doc

      Filesize

      21KB

      MD5

      531a9fc493f62980cdb6b9361c0211dd

      SHA1

      38711a7d1b6595abf38d95c2fa0d33743da7bbdf

      SHA256

      632e04c151ca3551c40394da4f61730a47ba2137984f65ff70727ccefd3017fa

      SHA512

      d8566a7c7b5e463878cc5ee2eb04f0998a6472e7e656ffa7508ef6abd30076457df169f0acf0a60dde388ce522990180f5df523dec9223bdf2f05b61c52f5e4c

    • memory/2436-118-0x00007FF7E7C00000-0x00007FF7E7C10000-memory.dmp

      Filesize

      64KB

    • memory/2436-119-0x00007FF7E7C00000-0x00007FF7E7C10000-memory.dmp

      Filesize

      64KB

    • memory/2436-120-0x00007FF7E7C00000-0x00007FF7E7C10000-memory.dmp

      Filesize

      64KB

    • memory/2436-121-0x00007FF7E7C00000-0x00007FF7E7C10000-memory.dmp

      Filesize

      64KB

    • memory/2436-130-0x00007FF7E4140000-0x00007FF7E4150000-memory.dmp

      Filesize

      64KB

    • memory/2436-131-0x00007FF7E4140000-0x00007FF7E4150000-memory.dmp

      Filesize

      64KB