Analysis
-
max time kernel
138s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
COTIZACION.xls
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
COTIZACION.xls
Resource
win10v2004-20230703-en
General
-
Target
COTIZACION.xls
-
Size
1.4MB
-
MD5
74c8f8643c29d8d19becd545eee7a48c
-
SHA1
afaf8d9c8b504333a2824fcd18f1fbc87da6c48a
-
SHA256
89b872366486882d0add3f52b59a244ccb38c30becf7c7fc238b2aa9a674ad93
-
SHA512
c093add8ee59b709f05b71e5bd6cc3203c9d9748016c518e43783723294c93eb9ed1103696098e3ab2ab45bfeed5ad6563560a18d665193ac199b18923ae14c8
-
SSDEEP
24576:lLQqSXdQp/XX46rg1HiB+6bvdXXXXXXXXXXXXUXXXXXXXXXXXXXXXXFfPShbZb+B:l0XdOwBEE6LaxgHrmi/9itk7Xu
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1464 EXCEL.EXE 1528 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 1528 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1464 EXCEL.EXE 1464 EXCEL.EXE 1464 EXCEL.EXE 1464 EXCEL.EXE 1464 EXCEL.EXE 1464 EXCEL.EXE 1464 EXCEL.EXE 1464 EXCEL.EXE 1528 WINWORD.EXE 1528 WINWORD.EXE 1528 WINWORD.EXE 1528 WINWORD.EXE 1464 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1528 wrote to memory of 2116 1528 WINWORD.EXE 86 PID 1528 wrote to memory of 2116 1528 WINWORD.EXE 86
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\COTIZACION.xls"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1464
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2116
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2616
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize471B
MD58075817f7423bdbad2235bd811729c8c
SHA19016b4d287fe437086281da850ddf008e1759191
SHA2568ea8b9fd553d9ed609932332dc471cc67a4e493b6971a7b9d419fdb01c7034a1
SHA5127871db006ea071f9a9013d3e81a0bc1d85931aa8f93f865ebb42a5148647bda94ab788059b8fa15e641ced235aa8887302cf340228218946cb58bade8fd1e8b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize412B
MD55ac425dcaccea77da2bb21b4a1d1ba3f
SHA1007b8aca30ef541ed666d83a335ea8c90a722c4b
SHA25645020fbf38e43d8c9f3b5b1ca9b3c799c7b02c8a5438faab6d270895bf1d8923
SHA512fcd779435b93286a5cdbd4f39d7169a68990af57694bee3668fb9d14aa0b3a496da48ed7993b548d20ced6bd2e38c9be62e267ef81054061865fe2a45ce883f7
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\5221A023-DB71-4272-B1FC-3E22E5297398
Filesize156KB
MD5f13f35e6db8b4904c209f9ddc6d786ba
SHA1c5175f37f867b35ec4a70a08a0bced8e29df6b64
SHA2566fb9ad84c7bdb646f8c951a2c5bed55d73ac18a69c097f841200a7dc515cdc80
SHA51270b86f65c9354afc658045244de37a700708d97b42b18b6a779c5d47b96b4fe069330f42eaf7ad3ab2e2da4f0204c78a6d0fc3215318daf8ed71e46deb0396e4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\HW3GGUK8\0000Oo0oOOOO0o0ooO0Oo0o0o000000000##############000000000000000000##############00000000000[1].doc
Filesize28KB
MD5d12d35567b65ba4cd1ff066e8a16d473
SHA183f375869fd5b28fa10c3eb4ab39b57c4688d7d9
SHA25621878810dc75afe148d8e4fa167478bf33c0076fc2b029c8169848947142a4b9
SHA512eeff6e93b8d679d125e44632dc799f942ca8f885d53c8ef349254bb0682f9e541901b5ba27145af8c0fe8be21eb9bbd3bfa98dff1cac8e9462fe65fafa83d3e6