Resubmissions

07/09/2022, 08:56

220907-kv41hagfgr 7

07/09/2022, 08:50

220907-krq98sbdh9 1

Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07/09/2022, 08:56

General

  • Target

    20220906EUOrder.xlsx

  • Size

    48KB

  • MD5

    e740f922b24a201d2d8deb4be08525d5

  • SHA1

    fe8d9dcd67344dc6ddf6c6767279461d5754911c

  • SHA256

    f62e16331ff6b8514bf7285df5f829f40c5eafb6c07180afc38bb670ff77a7d6

  • SHA512

    9c94949f82c8748da1d0e1eed5b2c50641bc40d5d77faee6bb8b6cf2ebbf69be48548f06ab2a45cba310f292264d057f49c6b03098a0296fae6db5ce4daba242

  • SSDEEP

    1536:1rPUVuh3RzNUEK+hM5AFlbCcCqB23Ix1FKe32ut:1rPUwfzKEThNbCqB2sYEVt

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\20220906EUOrder.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4940
  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3728
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:336

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\70W02UF3\138[1].doc

      Filesize

      21KB

      MD5

      531a9fc493f62980cdb6b9361c0211dd

      SHA1

      38711a7d1b6595abf38d95c2fa0d33743da7bbdf

      SHA256

      632e04c151ca3551c40394da4f61730a47ba2137984f65ff70727ccefd3017fa

      SHA512

      d8566a7c7b5e463878cc5ee2eb04f0998a6472e7e656ffa7508ef6abd30076457df169f0acf0a60dde388ce522990180f5df523dec9223bdf2f05b61c52f5e4c

    • memory/4940-120-0x00007FF9D0A10000-0x00007FF9D0A20000-memory.dmp

      Filesize

      64KB

    • memory/4940-121-0x00007FF9D0A10000-0x00007FF9D0A20000-memory.dmp

      Filesize

      64KB

    • memory/4940-122-0x00007FF9D0A10000-0x00007FF9D0A20000-memory.dmp

      Filesize

      64KB

    • memory/4940-123-0x00007FF9D0A10000-0x00007FF9D0A20000-memory.dmp

      Filesize

      64KB

    • memory/4940-132-0x00007FF9CDEC0000-0x00007FF9CDED0000-memory.dmp

      Filesize

      64KB

    • memory/4940-133-0x00007FF9CDEC0000-0x00007FF9CDED0000-memory.dmp

      Filesize

      64KB