Analysis
-
max time kernel
143s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 21:04
Behavioral task
behavioral1
Sample
4ӦƸԱҵɹһ.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4ӦƸԱҵɹһ.xls
Resource
win10v2004-20220812-en
General
-
Target
4ӦƸԱҵɹһ.xls
-
Size
56KB
-
MD5
5f5da55da2ad44b69a12e6279c9393de
-
SHA1
fa02688bafbd2a73de8951660f8f8c66e17462bc
-
SHA256
d90abe1e6539bf0479edd8f8c3f073dc6f3f39d5edceb43447f5abfce74b446d
-
SHA512
cd41a2882527aab2e69367ef15fad05088004f91226a556724a31068baa15b308c0daa110d7665fff712034f594ae0922daad79a51f648f0fc98be8345848e35
-
SSDEEP
1536:EUUUUYNsARl9gB2OwHyWMUNm0IZ95mKhlI7N7fa:khMBa
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEEXCEL.EXEWINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 9 IoCs
Processes:
WINWORD.EXEEXCEL.EXEEXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
EXCEL.EXEWINWORD.EXEpid process 5072 EXCEL.EXE 1216 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
EXCEL.EXEEXCEL.EXEWINWORD.EXEpid process 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 1216 WINWORD.EXE 1216 WINWORD.EXE 1216 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4ӦƸԱҵɹһ.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5072
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:4032
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8A7891822FCFF127E4EADADE9757112BFilesize
926B
MD54cba44f3f001d431f7e49270bd0f6db4
SHA1dc75ec40f389866eacf0140c44f53f3947e72541
SHA2560dfd9c9d1c4f7dea9adfe3ef6070c02d50cbf5f33f304ecc98a0ab89a346d7fe
SHA5122c227ff133ef2838a246161a2e53ee657d0af9512b71cdf7d27627faecfde23ea2a499e3a9f0350775f4f8eb5cdcda96a85020bfb818f48d78c6e5f2b73d7ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8A7891822FCFF127E4EADADE9757112BFilesize
246B
MD5c68d1cddc4a7962911d559631f32e2c9
SHA18eaf6978a86f691514c04e53a78a60174fbbf1c9
SHA256fae61353586ad9ed96ad6b8f5dde4dec652c31ade2616976d05456b9c2fa6209
SHA512c3287262fe65c6ff624c5fe8a1b860f4e463d018c3217956c6730a0500907a9a952b02fdf16e7489e17f723f8eff3aa81c57e2cca6fcdbcb125502cfe1ead627
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\C30A51E9-EE47-4F42-9724-87FC195ED1CAFilesize
147KB
MD5dc9e492e8f205e9c7cbc4597495e59bf
SHA1d570c98f04555df42f184ef91b1b5bdc652ad911
SHA256979f4f605ca2742164ccbe36cd9d983897912f3d67208099b1177dd8a4b2fc57
SHA51294d89a69646aa75f4bcdabd1af831d1b0878ae1f3ef44bb049200f2d6dde9f7a92a2dd8004b6789244df1d38e98028f5b55b4f34d36a89fb9060aec6f2bd0b73
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xmlFilesize
323KB
MD5c50827550db244f94f21d5378774f3fd
SHA17d135af0dc739123f5651bd4c8c97735a3847f68
SHA25621c60156d20d33751174f284e14ddf4c90c5df71d02ed432ae8e717e6ee44594
SHA512d48f5eec85027a3cfa12d20e4f989ec09b7edf37283ba9214852bfe38ae8587247e1a872e4a59f54e9528609080b28b21eb8ae05c4f1d7cafbeeb9ec5258c044
-
C:\Users\Admin\AppData\Local\Microsoft\Office\DLP\TenantInfo.xmlFilesize
76B
MD50f8eb2423d2bf6cb5b8bdb44cb170ca3
SHA1242755226012b4449a49b45491c0b1538ebf6410
SHA256385347c0cbacdd3c61d2635fbd390e0095a008fd75eeb23af2f14f975c083944
SHA512a9f23a42340b83a2f59df930d7563e8abd669b9f0955562cd3c2872e2e081f26d6d8b26357972b6d0423af05b2392bddbb46da769788e77fd169b3264ff53886
-
C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\excel.exe.dbFilesize
4KB
MD5f138a66469c10d5761c6cbb36f2163c3
SHA1eea136206474280549586923b7a4a3c6d5db1e25
SHA256c712d6c7a60f170a0c6c5ec768d962c58b1f59a2d417e98c7c528a037c427ab6
SHA5129d25f943b6137dd2981ee75d57baf3a9e0ee27eea2df19591d580f02ec8520d837b8e419a8b1eb7197614a3c6d8793c56ebc848c38295ada23c31273daa302d9
-
C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\excel.exe.db-walFilesize
48KB
MD521d3eb74b14169a9ab3cfefdec16c0ac
SHA13cba631b8983ded97e0b5be60474ec4a25d14d72
SHA2567cd74c78aa179d82704a216c8cbea9b58d4f2210f8afe7ecfe5bf747573009ac
SHA5123936cdaf8ecfd9a4da41a842453b4186a069b2ca45278c93d8cec3a83c7e60571cf733a771b6c9d3dfcc6c943cf8eaee515ad48b50b102570e321cf93230021d
-
C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\excel.exe.db-walFilesize
48KB
MD521d3eb74b14169a9ab3cfefdec16c0ac
SHA13cba631b8983ded97e0b5be60474ec4a25d14d72
SHA2567cd74c78aa179d82704a216c8cbea9b58d4f2210f8afe7ecfe5bf747573009ac
SHA5123936cdaf8ecfd9a4da41a842453b4186a069b2ca45278c93d8cec3a83c7e60571cf733a771b6c9d3dfcc6c943cf8eaee515ad48b50b102570e321cf93230021d
-
memory/1216-158-0x00007FFDBBF80000-0x00007FFDBBF90000-memory.dmpFilesize
64KB
-
memory/1216-166-0x00007FFDBE670000-0x00007FFDBE680000-memory.dmpFilesize
64KB
-
memory/1216-163-0x00007FFDBE670000-0x00007FFDBE680000-memory.dmpFilesize
64KB
-
memory/1216-165-0x00007FFDBE670000-0x00007FFDBE680000-memory.dmpFilesize
64KB
-
memory/1216-156-0x00007FFDBBF80000-0x00007FFDBBF90000-memory.dmpFilesize
64KB
-
memory/1216-162-0x00007FFDBE670000-0x00007FFDBE680000-memory.dmpFilesize
64KB
-
memory/4032-145-0x00007FFDBBF80000-0x00007FFDBBF90000-memory.dmpFilesize
64KB
-
memory/4032-146-0x00007FFDBBF80000-0x00007FFDBBF90000-memory.dmpFilesize
64KB
-
memory/5072-137-0x00007FFDBBF80000-0x00007FFDBBF90000-memory.dmpFilesize
64KB
-
memory/5072-134-0x00007FFDBE670000-0x00007FFDBE680000-memory.dmpFilesize
64KB
-
memory/5072-133-0x00007FFDBE670000-0x00007FFDBE680000-memory.dmpFilesize
64KB
-
memory/5072-135-0x00007FFDBE670000-0x00007FFDBE680000-memory.dmpFilesize
64KB
-
memory/5072-136-0x00007FFDBE670000-0x00007FFDBE680000-memory.dmpFilesize
64KB
-
memory/5072-132-0x00007FFDBE670000-0x00007FFDBE680000-memory.dmpFilesize
64KB
-
memory/5072-144-0x000002635EFF6000-0x000002635EFF8000-memory.dmpFilesize
8KB
-
memory/5072-138-0x00007FFDBBF80000-0x00007FFDBBF90000-memory.dmpFilesize
64KB