Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 16:15
Static task
static1
Behavioral task
behavioral1
Sample
Swift 01-Nov-2023.xla.xls
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Swift 01-Nov-2023.xla.xls
Resource
win10v2004-20231023-en
General
-
Target
Swift 01-Nov-2023.xla.xls
-
Size
101KB
-
MD5
59914c978891a061e2870c3f14b2a108
-
SHA1
a4811c1437da8a14081002802f20ee7c1c9760b7
-
SHA256
199e6a04393765cb8c52797906db84536abf7ef4b25406ccbe008bcc649a4a45
-
SHA512
201c2c248c38314431300985ed9b2af473d65fb3f9421c9506bed95779239189835ca464666ee313f0ccd6af7955bcb9269a1a3ee3f8c49bb9f308315b954cd7
-
SSDEEP
1536:EpQDyT9HK9LKt9+CNtVnwkpIatI8yhcDYZUeNBc/qw6/lhH:3awKt00dwkOmI8yht5xb/
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1376 EXCEL.EXE 3140 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 3140 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1376 EXCEL.EXE 1376 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1376 EXCEL.EXE 1376 EXCEL.EXE 1376 EXCEL.EXE 1376 EXCEL.EXE 1376 EXCEL.EXE 1376 EXCEL.EXE 1376 EXCEL.EXE 1376 EXCEL.EXE 3140 WINWORD.EXE 3140 WINWORD.EXE 3140 WINWORD.EXE 3140 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3140 wrote to memory of 4888 3140 WINWORD.EXE 97 PID 3140 wrote to memory of 4888 3140 WINWORD.EXE 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Swift 01-Nov-2023.xla.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1376
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4888
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\C4C7278F-6E0E-493C-9DC9-B24CA9B97ECB
Filesize156KB
MD543e9be13fb92697da4de7037f23b9ef2
SHA114ad234e5fb7b89a6b7fe4a10ea9394392c6b30b
SHA25668731d69f7040813bd062528406f6e3cb9c1c7e0d8779c830f195b5f7588107f
SHA51227db96675d6ee7deadcf883f8910fe04f7d7581bfaa7eb680f0e3fca336791ecb18dbc551232dd95631101c9ee473f88a7d3674c95bcd1b6bd6e2e5eda078bee
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD52329da4b510b197cb58a48b16a0c0415
SHA1da6809c21da7865ac1f29b4665592c8943ec0630
SHA256f0ec6d7560417c230590743d333ef6a3fe0828e15dcbfd92b607e5e17da5ddc0
SHA51231f243ea86f6fc8b2365e12707fd072353cd771bf2314754f1742d640fb5e5b9bb425bfc26a6428dd076a8f32b1b2793b7d0b5c52e244ea565846f7578bd9f9b
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD5b3386dd5e67e0358c5ed282b881ebead
SHA18835665dc1f49f0da01aef79be65e40562567104
SHA25680a376aea2e33968506b32724025671e004097031194e851798643bc14f1adf9
SHA512570db1e0fbf20eb88461660e8c3f8f5332bbcd1f686cbe7c23c72d258fc605aee484020714dcf15eed72fc56fd0a2b8e46ad19048e14e3393ca5678d2698b6a8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\X8T7NIZL\HTMLieHistoryCacheBrowser[1].doc
Filesize20KB
MD5a34d540cde2a2844e8357e05e50b7417
SHA11924aa79ea965bfc42a46be1e8a543fdf71f99e0
SHA2562b7fb4059f6a4ad5d7e9402901adb6049dffffbd169e718bf18bac57ebd88d48
SHA512e2f6e1bdca42b693c4a037f2c3bc312e7f913af0343ae659cace483df7b49a38bfad1a6e900408cdd240833e914cc15a9f40cf5bd91f6c7af78038c927041d0e