Analysis

  • max time kernel
    1697s
  • max time network
    1160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2023 17:37

General

  • Target

    MONITORAMENTO DE RISCO_09.NOV.23.xlsx

  • Size

    649KB

  • MD5

    0403f10759e9b3ac8fda464304f53ff7

  • SHA1

    65890abd343acf964a6afe173d0696e2a0fda5d0

  • SHA256

    0cd4000757541f9629a00398daee891f287b5f60245c993be9fd15ff228826ff

  • SHA512

    ae0224d82777d6aa746e51dc2b74f591a068a58f8f008ff2e8d003b889458a77eeecf31880f74a8a3b775156139e61ecb2348d9ab9b6f689826c663e8d79723a

  • SSDEEP

    12288:nM2Sgz0DEKJjExvqDlZFyG0YZVpQNSU5XsWe8vwCUJFu6bSr:nM2hw/DlZFyG0YZr0XYMwFJohr

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\MONITORAMENTO DE RISCO_09.NOV.23.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4396
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:1540
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4944

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

      Filesize

      16KB

      MD5

      2c725b19dcf42f5e7cbb5b28231dbb4a

      SHA1

      7ac821271da51d65d4352f54863b73092ffddf6a

      SHA256

      d3cde21c5e2ed22f8200b426faea34808a0adc0b3074336b36e53255bcedffdc

      SHA512

      9c52ec245618114feb2192d54f02d2f8f8b1af36f493274f3453734bf436ca48d121cafd5b3e11805060c0b147e6e9535df5e87ac8553210cb5f96b50e1e72a8

    • memory/4396-0-0x00007FF8B9E70000-0x00007FF8B9E80000-memory.dmp

      Filesize

      64KB

    • memory/4396-1-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-2-0x00007FF8B9E70000-0x00007FF8B9E80000-memory.dmp

      Filesize

      64KB

    • memory/4396-3-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-4-0x00007FF8B9E70000-0x00007FF8B9E80000-memory.dmp

      Filesize

      64KB

    • memory/4396-6-0x00007FF8B9E70000-0x00007FF8B9E80000-memory.dmp

      Filesize

      64KB

    • memory/4396-5-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-7-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-9-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-8-0x00007FF8B9E70000-0x00007FF8B9E80000-memory.dmp

      Filesize

      64KB

    • memory/4396-10-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-11-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-12-0x00007FF8B7510000-0x00007FF8B7520000-memory.dmp

      Filesize

      64KB

    • memory/4396-13-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-14-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-15-0x00007FF8B7510000-0x00007FF8B7520000-memory.dmp

      Filesize

      64KB

    • memory/4396-16-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-17-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-18-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-19-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-20-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-21-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-29-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-30-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-33-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-48-0x00007FF8B9E70000-0x00007FF8B9E80000-memory.dmp

      Filesize

      64KB

    • memory/4396-49-0x00007FF8B9E70000-0x00007FF8B9E80000-memory.dmp

      Filesize

      64KB

    • memory/4396-50-0x00007FF8B9E70000-0x00007FF8B9E80000-memory.dmp

      Filesize

      64KB

    • memory/4396-51-0x00007FF8B9E70000-0x00007FF8B9E80000-memory.dmp

      Filesize

      64KB

    • memory/4396-52-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-53-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4396-54-0x00007FF8F9DF0000-0x00007FF8F9FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4944-55-0x00000132EA040000-0x00000132EA050000-memory.dmp

      Filesize

      64KB

    • memory/4944-71-0x00000132EA140000-0x00000132EA150000-memory.dmp

      Filesize

      64KB

    • memory/4944-87-0x00000132F2730000-0x00000132F2731000-memory.dmp

      Filesize

      4KB

    • memory/4944-88-0x00000132F2750000-0x00000132F2751000-memory.dmp

      Filesize

      4KB

    • memory/4944-89-0x00000132F2750000-0x00000132F2751000-memory.dmp

      Filesize

      4KB

    • memory/4944-90-0x00000132F2750000-0x00000132F2751000-memory.dmp

      Filesize

      4KB

    • memory/4944-91-0x00000132F2750000-0x00000132F2751000-memory.dmp

      Filesize

      4KB

    • memory/4944-92-0x00000132F2750000-0x00000132F2751000-memory.dmp

      Filesize

      4KB

    • memory/4944-93-0x00000132F2750000-0x00000132F2751000-memory.dmp

      Filesize

      4KB

    • memory/4944-94-0x00000132F2750000-0x00000132F2751000-memory.dmp

      Filesize

      4KB

    • memory/4944-95-0x00000132F2750000-0x00000132F2751000-memory.dmp

      Filesize

      4KB

    • memory/4944-96-0x00000132F2750000-0x00000132F2751000-memory.dmp

      Filesize

      4KB

    • memory/4944-97-0x00000132F2750000-0x00000132F2751000-memory.dmp

      Filesize

      4KB

    • memory/4944-98-0x00000132F2380000-0x00000132F2381000-memory.dmp

      Filesize

      4KB

    • memory/4944-99-0x00000132F2370000-0x00000132F2371000-memory.dmp

      Filesize

      4KB

    • memory/4944-101-0x00000132F2380000-0x00000132F2381000-memory.dmp

      Filesize

      4KB

    • memory/4944-104-0x00000132F2370000-0x00000132F2371000-memory.dmp

      Filesize

      4KB

    • memory/4944-107-0x00000132F22B0000-0x00000132F22B1000-memory.dmp

      Filesize

      4KB

    • memory/4944-119-0x00000132F24B0000-0x00000132F24B1000-memory.dmp

      Filesize

      4KB

    • memory/4944-121-0x00000132F24C0000-0x00000132F24C1000-memory.dmp

      Filesize

      4KB

    • memory/4944-122-0x00000132F24C0000-0x00000132F24C1000-memory.dmp

      Filesize

      4KB