Analysis

  • max time kernel
    100s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2023, 10:23

General

  • Target

    NEW PO#10123.xls

  • Size

    1.2MB

  • MD5

    29e47e965aac7474d30b61f1c0889eb3

  • SHA1

    fb752bc267f366a95afe4ef6df9cfa335113983e

  • SHA256

    1008f41fbb9f5f59b36e40fe285c18f0ead78d68ef4bfa630123ee9cd2629729

  • SHA512

    da3169dd3c6626033d17c19c59b0af547dd2c02b16abf4dc385908dd90eb07c780c8dfffac93e37d621349cc1d401ed1027b0c9b1128f5716243ad1b7dfa4b37

  • SSDEEP

    24576:WLKgBUWQmmav30xVBLWQmmav30xfyWQmmav30xkB7oWQmmav30xV6EE15irKuypT:WLKgBpQmmQ30rUQmmQ30N3QmmQ306l9d

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\NEW PO#10123.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2044

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\EB2FBF7C.emf

          Filesize

          577KB

          MD5

          7c9bf039ac5d88302d99c6ca3811cdab

          SHA1

          2a0037ccf645e92103874e7ecc1ea4b2c5163000

          SHA256

          12d80fdc858b2ab624341ad4c5d83269e9f0927811fafd58ff2f94c83dafad3d

          SHA512

          53b2b3251fbd6cf93c5ec677f75e8502385002e1b37acd5d85902731bd41cba4457e896560a977f61aec00f72088f66e3d8ef171855e234f923b300d2f12a47c

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\FB30A1A7.emf

          Filesize

          34KB

          MD5

          f73a3efe342adfa0702f96aa3701620a

          SHA1

          470a70e344798253fe37d5dd2c6d5b36de645867

          SHA256

          d3a45bc30791fb3eace3667f5a42281ba030145dd744dce24e4856486ebe53ac

          SHA512

          372e98abe72bc80ce5013c154713e98de1bc6db954d27945e1bc0bfdd5f394846b84c19ab50f71d1626749790972d9ae7907541fd8bffff93bb85375d9cff9cb

        • memory/2044-139-0x00007FFCF9860000-0x00007FFCF9870000-memory.dmp

          Filesize

          64KB

        • memory/2044-136-0x00007FFCFC030000-0x00007FFCFC040000-memory.dmp

          Filesize

          64KB

        • memory/2044-137-0x00007FFCFC030000-0x00007FFCFC040000-memory.dmp

          Filesize

          64KB

        • memory/2044-138-0x00007FFCF9860000-0x00007FFCF9870000-memory.dmp

          Filesize

          64KB

        • memory/2044-133-0x00007FFCFC030000-0x00007FFCFC040000-memory.dmp

          Filesize

          64KB

        • memory/2044-134-0x00007FFCFC030000-0x00007FFCFC040000-memory.dmp

          Filesize

          64KB

        • memory/2044-135-0x00007FFCFC030000-0x00007FFCFC040000-memory.dmp

          Filesize

          64KB

        • memory/2044-188-0x00007FFCFC030000-0x00007FFCFC040000-memory.dmp

          Filesize

          64KB

        • memory/2044-189-0x00007FFCFC030000-0x00007FFCFC040000-memory.dmp

          Filesize

          64KB

        • memory/2044-190-0x00007FFCFC030000-0x00007FFCFC040000-memory.dmp

          Filesize

          64KB

        • memory/2044-191-0x00007FFCFC030000-0x00007FFCFC040000-memory.dmp

          Filesize

          64KB