Resubmissions
17-08-2023 05:42
230817-gd99eafd82 10Analysis
-
max time kernel
101s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2023 05:42
Static task
static1
Behavioral task
behavioral1
Sample
2023-03-31.zip
Resource
win10v2004-20230703-en
General
-
Target
2023-03-31.zip
-
Size
195.7MB
-
MD5
79d6e199a0633af6b40ddc3beb286d42
-
SHA1
78478d850bb087d417d2e4e59f36f0041f5f4ffa
-
SHA256
dd54a92b38dfab67e6832962c6aef8a4272bf7989c97a554f438dd0e92f34b1f
-
SHA512
63adb14045d5f4c527c687662252ba535fe76fdbdb567ddec96ba85d0b48ea771c8cc1cce7cfea62f6f72d49c6da8747e14de21faba07bb715ef7cf37dfa0fda
-
SSDEEP
6291456:kITrRt5tiZLXrBTe1QTzYLtvB2t4fQfLK49:tfRn0lXBe1KgtvB2tAUuE
Malware Config
Signatures
-
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE is not expected to spawn this process 1172 4760 DW20.EXE 112 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3108 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2416 msedge.exe 2416 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3336 identity_helper.exe 3336 identity_helper.exe 4760 ONENOTE.EXE 4760 ONENOTE.EXE 4760 ONENOTE.EXE 4760 ONENOTE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 456 7zG.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 456 7zG.exe Token: 35 456 7zG.exe Token: SeSecurityPrivilege 456 7zG.exe Token: SeSecurityPrivilege 456 7zG.exe Token: SeShutdownPrivilege 3132 msiexec.exe Token: SeIncreaseQuotaPrivilege 3132 msiexec.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 456 7zG.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3132 msiexec.exe 3132 msiexec.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 4760 ONENOTE.EXE 4760 ONENOTE.EXE 4760 ONENOTE.EXE 4760 ONENOTE.EXE 4760 ONENOTE.EXE 4760 ONENOTE.EXE 4760 ONENOTE.EXE 4760 ONENOTE.EXE 4760 ONENOTE.EXE 4760 ONENOTE.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3240 wrote to memory of 3764 3240 msedge.exe 102 PID 3240 wrote to memory of 3764 3240 msedge.exe 102 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 3708 3240 msedge.exe 103 PID 3240 wrote to memory of 2416 3240 msedge.exe 104 PID 3240 wrote to memory of 2416 3240 msedge.exe 104 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105 PID 3240 wrote to memory of 2772 3240 msedge.exe 105
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\2023-03-31.zip1⤵PID:4636
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2208
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\2023-03-31\" -spe -an -ai#7zMap10061:78:7zEvent164991⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:456
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\2023-03-31\67b74348a0f1857759d19207ab619916f77ef42d39de443907f840e5b46bfd8c.js"1⤵PID:2572
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\2023-03-31\67b74348a0f1857759d19207ab619916f77ef42d39de443907f840e5b46bfd8c.js"1⤵PID:4452
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\2023-03-31\b31b98ed88d14365f43a9fad862c556b108df501b1fed8b4ca5d56b881fd963f.html1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffbd05846f8,0x7ffbd0584708,0x7ffbd05847182⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,14885710799349168153,12406452863504723038,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,14885710799349168153,12406452863504723038,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,14885710799349168153,12406452863504723038,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14885710799349168153,12406452863504723038,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2200 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14885710799349168153,12406452863504723038,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,14885710799349168153,12406452863504723038,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,14885710799349168153,12406452863504723038,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1120
-
C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE"C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE" "C:\Users\Admin\Desktop\2023-03-31\d23a3348b7e5102bc1ef38c5de2236444a7479ca33ab1023334f1e924e8520c8.one"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4760 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 35522⤵
- Process spawned suspicious child process
PID:1172 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 35523⤵PID:3364
-
-
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Desktop\2023-03-31\d25b37df4b35fdab3730b4f587842dd4cfd2c68d334a910228d690b0fdbc9257.msi"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3132
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\2023-03-31\d56bb81d0f8e4de24dc12a7d963ed95eec36291c71a29d6b434e72f098cc1131.xlsx"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3108
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53423d7e71b832850019e032730997f69
SHA1bbc91ba3960fb8f7f2d5a190e6585010675d9061
SHA25653770e40359b9738d8898520d7e4a57c28498edddbadf76ec4a599837aa0c649
SHA51203d5fee4152300d6c5e9f72c059955c944c7e6d207e433e9fdd693639e63ea699a01696d7bbf56d2033fd52ad260c9ae36a2c5c888112d81bf7e04a3f273e65d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5d15dda0fd52ce6bcf75a26ecaaa13b14
SHA13034ab455705f81cb2669559adb15a1571ae24a8
SHA256fe1408e5ef778624eecbe7c969532ac06f64b88d580aa2c0a83377f2763711d0
SHA5123e719b399d5756206b37d20d59135474de4adf10d941d1a4a4211dea716f8cfbaad3f0213dce45c3f6821af123ddeb8a8d04520d8b2b97dcc2fa0f5d6eda6d48
-
Filesize
6KB
MD5ec3e156fdc2101bac2cdbf7b293d3c9e
SHA1a623a1f570dbe7a18269fb8c62dbe85ec805956e
SHA2566b37568ec8e945f82fe3e7ea5f7844c5c6de35f5338c237334aace720b7eec6a
SHA51250a1e79adaff0cef2c9dd3fcc00886953442390dabbba4f9e814df511dcb74edd6d205eb773e638ec4005dc47da89b2f06a41a4bc8b38bd248b3a78a93c67434
-
Filesize
5KB
MD5c45a22b8cf37d3be52aa18327faeef8b
SHA1d511e71e13360a755bd448285915837ecceff005
SHA256ad917bc0ac2d29c15b5e7c8d9003bf9c3dbb365088fcf7ccd65c807764f28ec0
SHA5125436943493d923dc9c2ed4bb22db4fdaae25d12a18a310d7aa812c2f80308eaa99d7e7ebd714824f141ba3a8626d21c48fcdbcd14551458f845a9638ccafda24
-
Filesize
24KB
MD50e78f9a3ece93ae9434c64ea2bff51dc
SHA1a0e4c75fe32417fe2df705987df5817326e1b3b9
SHA2565c8ce4455f2a3e5f36f30e7100f85bdd5e44336a8312278769f89f68b8d60e68
SHA5129d1686f0b38e3326ad036c8b218b61428204910f586dccf8b62ecbed09190f7664a719a89a6fbc0ecb429aecf5dd0ec06de44be3a1510369e427bde0626fd51d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5d41d4ed8243df2707bb39694a0a36399
SHA1281db0b478cb72b22be55166f8a0aec194526f3a
SHA256c7e20d7acbec950f65a4349fecb8c663def41fe16303928f8d250fe407cf740c
SHA5123be606f9f27b6c3e5548640f24ff9e91dcef13c86124ec08d9a03f1564cc7bcebe9c0625b994744b5b5b0198bf2cc498c6d1f9a345da75f5d157387b91869abb
-
Filesize
264KB
MD56423965e04e9757f352246587c8d9fb9
SHA1de11b9a7056b2a76a83bf822a9b1b536b45d406d
SHA2562818398072ed4eea10755d68c01cb6ebf408bd4ab037bd40f5b225d98a31a918
SHA5121f7fb2d2192f1247ddcfe734e2957c2ef68108a58d7accf2adafb4431c0431a4f4380b14b9ca100d632cbf4dfc4e3d7f65690e1fb6236a95c3b20b3c4f66ec2c
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\B1953A4F-9FF6-4E28-B33F-23A2D2D9768F
Filesize156KB
MD502f855f258f05a05fc613b7d28ad53fd
SHA11018f568327d341c9d9fb02c633a88f1f6c51506
SHA256531400f436b329a00253fa6544af6f2e7613cb5d294093002b0f30dc888e0283
SHA512295fc997e54e3334fb628731c0dbb9331d5d9506696bbd4fb4bcd5f6df2780bbe437c0540b2f4764cd17be0c398269faf79f6e46523e11f20a534ef43d40cf9b