Analysis

  • max time kernel
    141s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 16:15

General

  • Target

    Swift 01-Nov-2023.xla.xls

  • Size

    101KB

  • MD5

    59914c978891a061e2870c3f14b2a108

  • SHA1

    a4811c1437da8a14081002802f20ee7c1c9760b7

  • SHA256

    199e6a04393765cb8c52797906db84536abf7ef4b25406ccbe008bcc649a4a45

  • SHA512

    201c2c248c38314431300985ed9b2af473d65fb3f9421c9506bed95779239189835ca464666ee313f0ccd6af7955bcb9269a1a3ee3f8c49bb9f308315b954cd7

  • SSDEEP

    1536:EpQDyT9HK9LKt9+CNtVnwkpIatI8yhcDYZUeNBc/qw6/lhH:3awKt00dwkOmI8yht5xb/

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Swift 01-Nov-2023.xla.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1376
  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3140
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:4888
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:4636

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\C4C7278F-6E0E-493C-9DC9-B24CA9B97ECB

              Filesize

              156KB

              MD5

              43e9be13fb92697da4de7037f23b9ef2

              SHA1

              14ad234e5fb7b89a6b7fe4a10ea9394392c6b30b

              SHA256

              68731d69f7040813bd062528406f6e3cb9c1c7e0d8779c830f195b5f7588107f

              SHA512

              27db96675d6ee7deadcf883f8910fe04f7d7581bfaa7eb680f0e3fca336791ecb18dbc551232dd95631101c9ee473f88a7d3674c95bcd1b6bd6e2e5eda078bee

            • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres

              Filesize

              2KB

              MD5

              2329da4b510b197cb58a48b16a0c0415

              SHA1

              da6809c21da7865ac1f29b4665592c8943ec0630

              SHA256

              f0ec6d7560417c230590743d333ef6a3fe0828e15dcbfd92b607e5e17da5ddc0

              SHA512

              31f243ea86f6fc8b2365e12707fd072353cd771bf2314754f1742d640fb5e5b9bb425bfc26a6428dd076a8f32b1b2793b7d0b5c52e244ea565846f7578bd9f9b

            • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres

              Filesize

              2KB

              MD5

              b3386dd5e67e0358c5ed282b881ebead

              SHA1

              8835665dc1f49f0da01aef79be65e40562567104

              SHA256

              80a376aea2e33968506b32724025671e004097031194e851798643bc14f1adf9

              SHA512

              570db1e0fbf20eb88461660e8c3f8f5332bbcd1f686cbe7c23c72d258fc605aee484020714dcf15eed72fc56fd0a2b8e46ad19048e14e3393ca5678d2698b6a8

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\X8T7NIZL\HTMLieHistoryCacheBrowser[1].doc

              Filesize

              20KB

              MD5

              a34d540cde2a2844e8357e05e50b7417

              SHA1

              1924aa79ea965bfc42a46be1e8a543fdf71f99e0

              SHA256

              2b7fb4059f6a4ad5d7e9402901adb6049dffffbd169e718bf18bac57ebd88d48

              SHA512

              e2f6e1bdca42b693c4a037f2c3bc312e7f913af0343ae659cace483df7b49a38bfad1a6e900408cdd240833e914cc15a9f40cf5bd91f6c7af78038c927041d0e

            • memory/1376-13-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-1-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-4-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-8-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-7-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-9-0x00007FFF2B8B0000-0x00007FFF2B8C0000-memory.dmp

              Filesize

              64KB

            • memory/1376-10-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-11-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-12-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-0-0x00007FFF2B8B0000-0x00007FFF2B8C0000-memory.dmp

              Filesize

              64KB

            • memory/1376-14-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-16-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-15-0x00007FFF29010000-0x00007FFF29020000-memory.dmp

              Filesize

              64KB

            • memory/1376-17-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-18-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-19-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-20-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-22-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-21-0x00007FFF29010000-0x00007FFF29020000-memory.dmp

              Filesize

              64KB

            • memory/1376-23-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-25-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-26-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-27-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-123-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-6-0x00007FFF2B8B0000-0x00007FFF2B8C0000-memory.dmp

              Filesize

              64KB

            • memory/1376-2-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/1376-3-0x00007FFF2B8B0000-0x00007FFF2B8C0000-memory.dmp

              Filesize

              64KB

            • memory/1376-5-0x00007FFF2B8B0000-0x00007FFF2B8C0000-memory.dmp

              Filesize

              64KB

            • memory/3140-43-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-45-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-48-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-49-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-50-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-51-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-66-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-65-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-116-0x00007FFF2B8B0000-0x00007FFF2B8C0000-memory.dmp

              Filesize

              64KB

            • memory/3140-67-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-47-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-40-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-46-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-113-0x00007FFF2B8B0000-0x00007FFF2B8C0000-memory.dmp

              Filesize

              64KB

            • memory/3140-41-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-112-0x00007FFF2B8B0000-0x00007FFF2B8C0000-memory.dmp

              Filesize

              64KB

            • memory/3140-117-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-121-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-119-0x00007FFF2B8B0000-0x00007FFF2B8C0000-memory.dmp

              Filesize

              64KB

            • memory/3140-122-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-124-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB

            • memory/3140-37-0x00007FFF6B830000-0x00007FFF6BA25000-memory.dmp

              Filesize

              2.0MB