Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
Orden de Compra##.xla.xls
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Orden de Compra##.xla.xls
Resource
win10v2004-20231023-en
General
-
Target
Orden de Compra##.xla.xls
-
Size
101KB
-
MD5
1024a690a0cdbf2505121b0d14b70125
-
SHA1
a048b94a8ae9251b61e3348438ff0f3f2c89b33a
-
SHA256
0a7523a33dbf8a15afdcef5a7efbaf4a2ed53706c8b0daad1ad8c69962180566
-
SHA512
7ec14256710b048c69bbd0ccb80a5ea9333ad5fe6e106509dcd62885fb15cae3217102633d0006325d7aadd2ba1b974d24e6599ee74f804b9c6805c51e3d1a5a
-
SSDEEP
1536:lpQDZbuylO9AKt9+CASVnmLIMPXHI8d+xpgFlIoOcbF6KUHJHuJPMIdTd:8Vyy1Kt0GdmBP3I8MgnIPwFtWHIP
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3712 EXCEL.EXE 3320 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 3320 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3712 EXCEL.EXE 3712 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3712 EXCEL.EXE 3712 EXCEL.EXE 3712 EXCEL.EXE 3712 EXCEL.EXE 3712 EXCEL.EXE 3712 EXCEL.EXE 3712 EXCEL.EXE 3712 EXCEL.EXE 3320 WINWORD.EXE 3320 WINWORD.EXE 3320 WINWORD.EXE 3320 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3320 wrote to memory of 2340 3320 WINWORD.EXE 99 PID 3320 wrote to memory of 2340 3320 WINWORD.EXE 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Orden de Compra##.xla.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3712
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2340
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\598D13CB-8093-4100-BC2E-9B84EE7951A5
Filesize156KB
MD541a0ced25408d951f0dc61622d85319c
SHA1edb9e85d994c561885c3e49effe31141fd499e58
SHA256ea8e759a8668566fd5a6f4037c0e055f793bb290968e16aba20b8df77ebf070e
SHA51260d2f80d6bbb4cd0a51c16d8d5cde8b814e2203b17de827a8a468597246dc30c2e529d7e548fb49dc117d8bcb2174816a0d1af649e25af5d2608d478923223fe
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD5217b87b772320d8d599433294a0b65f1
SHA17b5534dd10154647065259cee06182848ae851e4
SHA256e2554dd0273ea70e6b114b827ba7fdd166d0518825712d6c886594436db556ba
SHA51227a16f05f2d2aa93ac7c9bd50adcf3954fa65e4c0b3776ce97a0d585dcf959773c60f28f59534e156f19f5cf9d2bac22e212bc96b15a53cd13265c15ad61553a
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD5e8d541692666118fa361489dd8b883a0
SHA1341fffde46b67486590acf2d82046d665875ed71
SHA25647a0b30723d69674e43cec5401f412f08beb5e696e6d043b3b9d36750502be18
SHA5126b138331c8678745f4101b269661d58e563f22d37e453580ea9ebbeff99fbdf9ca450e0cf83bc60f806159a17136922001da47b746810188dd8040be31a093b3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FG4P7PGK\HTMLbrowserHistoryCleanerhta[1].doc
Filesize25KB
MD5a5e653641362ac4e0fae2c211a6fd38d
SHA1cf8925381f865c63092bc5a059816f1f0c453ab4
SHA2567089650e6c0f2dcead55e58ff0c229d4a9eba2d611c69b78b9d80986e0017ce0
SHA512815558d48edccafe7b45d144a9d970604621931bfc11f7fe0b8ab05266053e245eb43f2cf5b64ca76aec16fcaed7c5742f3d800258b1aa069268f0ec914aab06