Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2022 07:23

General

  • Target

    decrypted.xlsx

  • Size

    167KB

  • MD5

    806b91518351d8180818609ec402c0c9

  • SHA1

    49438e4aa5b49f52f0122eb9566406ac9e332ae4

  • SHA256

    a7d02fbc343281d43f06a7cf646ff45428b0c6801150c9b37be6f842514cf1d7

  • SHA512

    9c012a9ad8d83ea9e62c71387e01955e4fb5cf13d52ee320eec416b91ed99faa215e31372bf4530c66e317381b713bff312008cfe36bd6be789c4f9d469911dd

  • SSDEEP

    3072:YM8TgsQh12ZOhivfWh05bQReF8a5YQZFlBApeknaJSGUqiszMKp41Jpyawj:YM8TWlh0ceFXRBBknad/+3ghj

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\decrypted.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4756
  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4088
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1300
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:1476

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\BFCA2AAD-A7A0-432E-ACEE-41B1E3E51AD3

        Filesize

        145KB

        MD5

        53225805ffa6e07454e415f68e4a350a

        SHA1

        7655c15381fc754d9443bb84e887ea9f4f8ad3d6

        SHA256

        89492b5fd04103c7772ad26a0c8e8d9dcfea39fd8d11d7dbfc496a287a5bfc44

        SHA512

        979486591490d2a8b82b2d39540ddcf8d6a5e59cd44422ad910420d14a4fb42b9406d3a3fb068fbb202d3689c915c59515c2ede0006d6b6563a44e302971e156

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DUHIRKGY\.............44[1].doc

        Filesize

        19KB

        MD5

        0803cf8e590e7bffd491dac49bf839b7

        SHA1

        f22d4b30d788de97b201206737db8fe90c8dcbf4

        SHA256

        3161ee5ba8ccdfc7b74a6b0cd4bb267fc01cb7594ff532b1db7866201dc0371c

        SHA512

        bcc6781d779f5cf6bf9ff5e5d3f583b1e474a52de228a92cf12ccc52c8ddfe0226091d9dd14ed0abf5913ec4d18f08391a87e57d8bf0f9ca60dbbacf6a491005

      • memory/1300-148-0x0000000000000000-mapping.dmp

      • memory/4756-132-0x00007FFB70CF0000-0x00007FFB70D00000-memory.dmp

        Filesize

        64KB

      • memory/4756-133-0x00007FFB70CF0000-0x00007FFB70D00000-memory.dmp

        Filesize

        64KB

      • memory/4756-134-0x00007FFB70CF0000-0x00007FFB70D00000-memory.dmp

        Filesize

        64KB

      • memory/4756-135-0x00007FFB70CF0000-0x00007FFB70D00000-memory.dmp

        Filesize

        64KB

      • memory/4756-136-0x00007FFB70CF0000-0x00007FFB70D00000-memory.dmp

        Filesize

        64KB

      • memory/4756-137-0x00007FFB6E6B0000-0x00007FFB6E6C0000-memory.dmp

        Filesize

        64KB

      • memory/4756-138-0x00007FFB6E6B0000-0x00007FFB6E6C0000-memory.dmp

        Filesize

        64KB