Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2023 08:47

General

  • Target

    Purchase Order 4502726800.xls

  • Size

    1.3MB

  • MD5

    11183eb7b983bfb2186430f24434d772

  • SHA1

    bcbe97b20a3c8cd38f92c86c299e5f8ae8717f91

  • SHA256

    7913fa8f88bcf743352767b91881a163ac31b56a30c09fe87a3547690e481430

  • SHA512

    85fff7017fac0c77c7cb8e0e5f162a430e3f20bc13c90061106cc349c12d54a473298be21a184bd20d0b0859be1edc884dab73b907eb4f3859e8cd969af4f4bf

  • SSDEEP

    24576:KWQmmav30xuToZyow6VbAXZSCWZyXw6VoAXZSGmwVJzfJbW0YfEhVivUziH/wrxU:vQmmQ30ps6VIEp76V3EqVW7f6ZzifE

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Purchase Order 4502726800.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\26B4F608.emf

    Filesize

    1.4MB

    MD5

    a01b9617553432807b9b58025b338d97

    SHA1

    439bdcc450408b9735b2428c2d53d2e6977fa58c

    SHA256

    7a0426ed2e2349916969ff7087c0f76089fb8ce7f4627f3d11ccbc1aaefcedce

    SHA512

    312cc2563fa865d6a939fea85a520627c73ed9a95bafc98c89495f21d535dc658825be74b64f0f5c5815d1d234fc6e77a71779247e4973e39ba8dccec2f09bee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\7EB8E26A.emf

    Filesize

    526KB

    MD5

    b1276fb00ff154303ae1184c774799b4

    SHA1

    38dae5f6f42d12e6b4103d89876a08ff339630b7

    SHA256

    9db01b64ecbffc09592278d4c0961eb5c30fcaa2f59d9ff04d494f8363247e81

    SHA512

    6697d66e93f8a53a990672cfc047a0a3e50b12fe2009b4e7b5ae09e99146ca015d084ad0ca91cffb8124fbabec832086bd5874fe3f0d87890a36d024a11e0065

  • memory/4540-7-0x00007FFD30C30000-0x00007FFD30E25000-memory.dmp

    Filesize

    2.0MB

  • memory/4540-0-0x00007FFCF0CB0000-0x00007FFCF0CC0000-memory.dmp

    Filesize

    64KB

  • memory/4540-14-0x00007FFD30C30000-0x00007FFD30E25000-memory.dmp

    Filesize

    2.0MB

  • memory/4540-5-0x00007FFD30C30000-0x00007FFD30E25000-memory.dmp

    Filesize

    2.0MB

  • memory/4540-15-0x00007FFCEEA90000-0x00007FFCEEAA0000-memory.dmp

    Filesize

    64KB

  • memory/4540-6-0x00007FFCF0CB0000-0x00007FFCF0CC0000-memory.dmp

    Filesize

    64KB

  • memory/4540-8-0x00007FFD30C30000-0x00007FFD30E25000-memory.dmp

    Filesize

    2.0MB

  • memory/4540-27-0x00007FFD30C30000-0x00007FFD30E25000-memory.dmp

    Filesize

    2.0MB

  • memory/4540-10-0x00007FFD30C30000-0x00007FFD30E25000-memory.dmp

    Filesize

    2.0MB

  • memory/4540-11-0x00007FFD30C30000-0x00007FFD30E25000-memory.dmp

    Filesize

    2.0MB

  • memory/4540-12-0x00007FFD30C30000-0x00007FFD30E25000-memory.dmp

    Filesize

    2.0MB

  • memory/4540-13-0x00007FFCEEA90000-0x00007FFCEEAA0000-memory.dmp

    Filesize

    64KB

  • memory/4540-4-0x00007FFD30C30000-0x00007FFD30E25000-memory.dmp

    Filesize

    2.0MB

  • memory/4540-3-0x00007FFCF0CB0000-0x00007FFCF0CC0000-memory.dmp

    Filesize

    64KB

  • memory/4540-9-0x00007FFCF0CB0000-0x00007FFCF0CC0000-memory.dmp

    Filesize

    64KB

  • memory/4540-28-0x00007FFD30C30000-0x00007FFD30E25000-memory.dmp

    Filesize

    2.0MB

  • memory/4540-2-0x00007FFCF0CB0000-0x00007FFCF0CC0000-memory.dmp

    Filesize

    64KB

  • memory/4540-1-0x00007FFD30C30000-0x00007FFD30E25000-memory.dmp

    Filesize

    2.0MB

  • memory/4540-65-0x00007FFCF0CB0000-0x00007FFCF0CC0000-memory.dmp

    Filesize

    64KB

  • memory/4540-66-0x00007FFCF0CB0000-0x00007FFCF0CC0000-memory.dmp

    Filesize

    64KB

  • memory/4540-67-0x00007FFCF0CB0000-0x00007FFCF0CC0000-memory.dmp

    Filesize

    64KB

  • memory/4540-68-0x00007FFD30C30000-0x00007FFD30E25000-memory.dmp

    Filesize

    2.0MB

  • memory/4540-69-0x00007FFCF0CB0000-0x00007FFCF0CC0000-memory.dmp

    Filesize

    64KB

  • memory/4540-70-0x00007FFD30C30000-0x00007FFD30E25000-memory.dmp

    Filesize

    2.0MB

  • memory/4540-71-0x00007FFD30C30000-0x00007FFD30E25000-memory.dmp

    Filesize

    2.0MB