Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2022 07:23
Static task
static1
Behavioral task
behavioral1
Sample
Order Sheet.xlsx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Order Sheet.xlsx
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
decrypted.xlsx
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
decrypted.xlsx
Resource
win10v2004-20220812-en
General
-
Target
decrypted.xlsx
-
Size
167KB
-
MD5
806b91518351d8180818609ec402c0c9
-
SHA1
49438e4aa5b49f52f0122eb9566406ac9e332ae4
-
SHA256
a7d02fbc343281d43f06a7cf646ff45428b0c6801150c9b37be6f842514cf1d7
-
SHA512
9c012a9ad8d83ea9e62c71387e01955e4fb5cf13d52ee320eec416b91ed99faa215e31372bf4530c66e317381b713bff312008cfe36bd6be789c4f9d469911dd
-
SSDEEP
3072:YM8TgsQh12ZOhivfWh05bQReF8a5YQZFlBApeknaJSGUqiszMKp41Jpyawj:YM8TWlh0ceFXRBBknad/+3ghj
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4756 EXCEL.EXE 4088 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 4088 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4756 EXCEL.EXE 4756 EXCEL.EXE 4756 EXCEL.EXE 4756 EXCEL.EXE 4756 EXCEL.EXE 4756 EXCEL.EXE 4756 EXCEL.EXE 4756 EXCEL.EXE 4756 EXCEL.EXE 4088 WINWORD.EXE 4088 WINWORD.EXE 4756 EXCEL.EXE 4756 EXCEL.EXE 4088 WINWORD.EXE 4756 EXCEL.EXE 4088 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4088 wrote to memory of 1300 4088 WINWORD.EXE 86 PID 4088 wrote to memory of 1300 4088 WINWORD.EXE 86
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\decrypted.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4756
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1300
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\BFCA2AAD-A7A0-432E-ACEE-41B1E3E51AD3
Filesize145KB
MD553225805ffa6e07454e415f68e4a350a
SHA17655c15381fc754d9443bb84e887ea9f4f8ad3d6
SHA25689492b5fd04103c7772ad26a0c8e8d9dcfea39fd8d11d7dbfc496a287a5bfc44
SHA512979486591490d2a8b82b2d39540ddcf8d6a5e59cd44422ad910420d14a4fb42b9406d3a3fb068fbb202d3689c915c59515c2ede0006d6b6563a44e302971e156
-
Filesize
19KB
MD50803cf8e590e7bffd491dac49bf839b7
SHA1f22d4b30d788de97b201206737db8fe90c8dcbf4
SHA2563161ee5ba8ccdfc7b74a6b0cd4bb267fc01cb7594ff532b1db7866201dc0371c
SHA512bcc6781d779f5cf6bf9ff5e5d3f583b1e474a52de228a92cf12ccc52c8ddfe0226091d9dd14ed0abf5913ec4d18f08391a87e57d8bf0f9ca60dbbacf6a491005