Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
07/09/2022, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
20220906EUOrder.xlsx
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
20220906EUOrder.xlsx
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
20220906EUOrder.xlsx
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
decrypted.xlsx
Resource
win7-20220812-en
Behavioral task
behavioral5
Sample
decrypted.xlsx
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
decrypted.xlsx
Resource
win10v2004-20220901-en
General
-
Target
decrypted.xlsx
-
Size
44KB
-
MD5
87555a91dcf29533d97a5a15dcba0399
-
SHA1
38c779ae0852f52a0cd96f710172517a53cb230a
-
SHA256
da7ad3bdbc357f1579f83704c76a095a4614321606c95323bd518c8f1c21783a
-
SHA512
d1c154b796e5065d5d3eedb71084538148fc93a53101c0ddc549ecb94bfc835c4d0ee01b645858c46374f1e1612b8b3e515bab2f43313c4b18ad317bbad93563
-
SSDEEP
768:Ydi8TzBPCP4XwBkNWZ3cjvmWa+V7kX9On8YWihjZ01qMapVsiU/UFxh3+q/RNP:YM8TlZCkNWZ3c3ayEINZcHapVsXcFxhB
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2436 EXCEL.EXE 4212 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 4212 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2436 EXCEL.EXE 2436 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 4212 WINWORD.EXE 4212 WINWORD.EXE 4212 WINWORD.EXE 4212 WINWORD.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4212 wrote to memory of 4440 4212 WINWORD.EXE 70 PID 4212 wrote to memory of 4440 4212 WINWORD.EXE 70
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\decrypted.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2436
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4440
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5531a9fc493f62980cdb6b9361c0211dd
SHA138711a7d1b6595abf38d95c2fa0d33743da7bbdf
SHA256632e04c151ca3551c40394da4f61730a47ba2137984f65ff70727ccefd3017fa
SHA512d8566a7c7b5e463878cc5ee2eb04f0998a6472e7e656ffa7508ef6abd30076457df169f0acf0a60dde388ce522990180f5df523dec9223bdf2f05b61c52f5e4c