Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/07/2023, 12:03

General

  • Target

    a40d6d685730134b481b53d7b84d0e53cd8c752b896c003ba578ed2736c0e47c.xlsx

  • Size

    169KB

  • MD5

    ec6335ee7b2616c999d18d95480dfc1c

  • SHA1

    4a9e314ff2316199d913cb1801ee0b4acb110acd

  • SHA256

    a40d6d685730134b481b53d7b84d0e53cd8c752b896c003ba578ed2736c0e47c

  • SHA512

    351ae053435b8215dc70ed6285f9d15dae5b9395ae01a316fa9d7b0aa0b3a8c68317bb694376d0a3e324a81d2cbd8fe8b85010acc62d8af57cbccaee3319e059

  • SSDEEP

    3072:IpTnYqXVeoqeeS/A1u3VUpYW8ELuSfO0VwcPNsktryu19ny6c/CGSG:uTnJFeleex03YYW8quS7XNZtryu3ny66

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a40d6d685730134b481b53d7b84d0e53cd8c752b896c003ba578ed2736c0e47c.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4208
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2088
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:2824

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4208-133-0x00007FFF2A290000-0x00007FFF2A2A0000-memory.dmp

        Filesize

        64KB

      • memory/4208-134-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB

      • memory/4208-135-0x00007FFF2A290000-0x00007FFF2A2A0000-memory.dmp

        Filesize

        64KB

      • memory/4208-137-0x00007FFF2A290000-0x00007FFF2A2A0000-memory.dmp

        Filesize

        64KB

      • memory/4208-136-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB

      • memory/4208-140-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB

      • memory/4208-142-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB

      • memory/4208-141-0x00007FFF2A290000-0x00007FFF2A2A0000-memory.dmp

        Filesize

        64KB

      • memory/4208-144-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB

      • memory/4208-145-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB

      • memory/4208-143-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB

      • memory/4208-146-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB

      • memory/4208-147-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB

      • memory/4208-139-0x00007FFF2A290000-0x00007FFF2A2A0000-memory.dmp

        Filesize

        64KB

      • memory/4208-149-0x00007FFF27930000-0x00007FFF27940000-memory.dmp

        Filesize

        64KB

      • memory/4208-150-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB

      • memory/4208-148-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB

      • memory/4208-138-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB

      • memory/4208-151-0x00007FFF27930000-0x00007FFF27940000-memory.dmp

        Filesize

        64KB

      • memory/4208-152-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB

      • memory/4208-153-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB

      • memory/4208-155-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB

      • memory/4208-156-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB

      • memory/4208-160-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB

      • memory/4208-178-0x00007FFF2A290000-0x00007FFF2A2A0000-memory.dmp

        Filesize

        64KB

      • memory/4208-179-0x00007FFF2A290000-0x00007FFF2A2A0000-memory.dmp

        Filesize

        64KB

      • memory/4208-180-0x00007FFF2A290000-0x00007FFF2A2A0000-memory.dmp

        Filesize

        64KB

      • memory/4208-181-0x00007FFF2A290000-0x00007FFF2A2A0000-memory.dmp

        Filesize

        64KB

      • memory/4208-182-0x00007FFF6A210000-0x00007FFF6A405000-memory.dmp

        Filesize

        2.0MB