Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2023 06:10
Static task
static1
Behavioral task
behavioral1
Sample
Part number 91875-11400 x 6.xls
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Part number 91875-11400 x 6.xls
Resource
win10v2004-20230915-en
General
-
Target
Part number 91875-11400 x 6.xls
-
Size
416KB
-
MD5
66bd2064e933a06c4af53c4347c8de9e
-
SHA1
f8d79bb57a9d26cc95c7401f6ca962cdf59a0034
-
SHA256
1eb2d10deb038b86eaaadece40a705184b6f8ed3a24cb1f0804a1e556923e45c
-
SHA512
021dd1fe5592efbfd3c8d772bbcc33be0535ca5e9425a86c575e39fa6f307da25c2ad6c30c413e3a604fef2592a3ef5ca37dd752c43f45f68ed78b9199654d27
-
SSDEEP
12288:JFesxot3VtvejSD/WtH3JYqFxM8Am+ROYJUK:JFes2XwWD/WhZYkrA1OYi
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1348 EXCEL.EXE 2412 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 2412 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 2412 WINWORD.EXE 2412 WINWORD.EXE 2412 WINWORD.EXE 2412 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2412 wrote to memory of 792 2412 WINWORD.EXE 92 PID 2412 wrote to memory of 792 2412 WINWORD.EXE 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Part number 91875-11400 x 6.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1348
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:792
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\1B6969F0-6BD4-4216-82DB-D086CF265C08
Filesize156KB
MD54ea52664813c6685b1424a01bff0f24a
SHA13bcf9bc67acf29b2a13db38f659cd82711c6ccf8
SHA2561e8080c573f59e0b4edd34b3c0bf9dd53b63a7f48e181c39142fdeda911eb0aa
SHA512cac48b7f8386cec2e7842df6f834337e9c9422e5bc635cb1aa5f241896569221aead9792ee61f54df52ff3ccd8a725f96722d81ad9a40ec65c9836f89e1eaa95
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Y9DO0VHG\ioi0ioi0ioioioo0IOIOI0IOoioi0ioii0IOIIOII0I0oioiioi0ioi0000##############00000000##############0000000[1].doc
Filesize33KB
MD5de3b51e37b7edd56b0ac9ccf49580ea5
SHA16daa943aa301b406e528584d42e4071e56c9fc7e
SHA25612ca6fd65bdfb318cbfa0090317052ec53d70f67a9802a721cd361e090e4e33f
SHA512090858e453de3032ce2143461a1ed6e9f307483a5dfaec0faa15328c577d87ba64a2a445de0e2030ea567a55e3a4093da03e86534896767ed9b34b82e305fa49