Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2023 11:35
Static task
static1
Behavioral task
behavioral1
Sample
MV T SYMPHONY.xlsx
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
MV T SYMPHONY.xlsx
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
decrypted.xlsx
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
decrypted.xlsx
Resource
win10v2004-20230220-en
General
-
Target
MV T SYMPHONY.xlsx
-
Size
282KB
-
MD5
1c49263fddb5f345067a8daf75e587fa
-
SHA1
fd1c55d9b6a4fa0718395548788097b9cafd6799
-
SHA256
fae3d2cb5534a8614ceb2c9101939ef6146e94bf204bafc4f8cda572664a5f05
-
SHA512
be97f4f2a335c8eb258f457e9dfbc608bbd6067830a8ee1b0277dd060455a61071957f7b0e86bea63c074ce3e52567db28a25f0528505b0d8e0a276b8ee5b765
-
SSDEEP
6144:ZJEIzKW6L0lYEokLp5TDMWxcmdUxM8dx/Xtg9dhfmjyX7ACrbl:7EIzZ+iSAp5vzYXPS9dh+xCvl
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2028 EXCEL.EXE 4792 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 4792 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2028 EXCEL.EXE 2028 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2028 EXCEL.EXE 2028 EXCEL.EXE 2028 EXCEL.EXE 2028 EXCEL.EXE 2028 EXCEL.EXE 2028 EXCEL.EXE 4792 WINWORD.EXE 4792 WINWORD.EXE 4792 WINWORD.EXE 4792 WINWORD.EXE 2028 EXCEL.EXE 2028 EXCEL.EXE 2028 EXCEL.EXE 2028 EXCEL.EXE 2028 EXCEL.EXE 2028 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4792 wrote to memory of 4608 4792 WINWORD.EXE 83 PID 4792 wrote to memory of 4608 4792 WINWORD.EXE 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\MV T SYMPHONY.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2028
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4608
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1656
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868
Filesize471B
MD5aaf21867a7f0dc07edc4035c1a4b5aee
SHA103141ac96ce1155483596a0cae73d5cb3e41fa1a
SHA25651ab191bff0d79632fc20199f7eac3a75ba3d39ba24a14940b2c743d0b90c260
SHA51287d0bba91f42e146db6fde1a16697e855aea62460d8dd827434d85d77a7307b8c9a749c7fd893cb936ba770658bfcc83f1444e8c8a72e4c895e40972bf09e01a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868
Filesize412B
MD5aa05a5436c5beb4873a471c3172d89b7
SHA1de6e74211bf19385d3e9e90ae559700795d21e00
SHA2563f1fedd308a36866ae8208f8dd94c8cb5abe6069414c4af82072adbdb2a2a05a
SHA5121a0d4eddc81f426f50bc0429b23740813f6a31a279a8ed3ce44bafcd7c70b8a479331ae4612808c0956cdd6c25d3ac01b548384f4ef002b703d50a366c820e26
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\JXO1ZP0L\qiiiiiiqiiii##################################qiqiqiqi[1].doc
Filesize28KB
MD51dcdb9e238b956e5768b2367fc310a70
SHA16e96e094f6098f3224b1aa0707b94b4863240072
SHA2569f017be23619d836a704478a2b1a31cfb60e4b6fc40e8e94ffde205bc195e963
SHA512ceb0c59fa2423a5b959315657ce3fc476d3581e997409694269a838c61b0586227e5e8cc06b10a388a51e29dda156bea86e157c731bc0e0aaccb0f6dd0a3715f