Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
18-01-2024 05:47
Static task
static1
Behavioral task
behavioral1
Sample
8549cb420ed5c1edf32b7e28d9d2010dac4867c0dba3650e1f8e7655278d4c5b.xls
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8549cb420ed5c1edf32b7e28d9d2010dac4867c0dba3650e1f8e7655278d4c5b.xls
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
8549cb420ed5c1edf32b7e28d9d2010dac4867c0dba3650e1f8e7655278d4c5b.xls
Resource
win10v2004-20231215-en
General
-
Target
8549cb420ed5c1edf32b7e28d9d2010dac4867c0dba3650e1f8e7655278d4c5b.xls
-
Size
302KB
-
MD5
250841072f7bb27d6a75cd026249bb87
-
SHA1
190342d9c712d9af9a3dce9eb3f2ff32bf100e23
-
SHA256
8549cb420ed5c1edf32b7e28d9d2010dac4867c0dba3650e1f8e7655278d4c5b
-
SHA512
27435486bd6eec7c591ec5388aec063d0ceb6f7198bda22dcb5c01dab11aaf878fa5d4b8723fefcb1983387e011100effd1e39d9e38f5b5511e2b1c997b788f0
-
SSDEEP
6144:6vBNSHBMixiMK6G+ZFrTUvCp4sJgo0r6Rz4rN9RjymY7TaGv37Aodpz:6vBNQpozwjTqCfgo0ugNymWbvrf3
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2788 EXCEL.EXE 3960 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 3960 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2788 EXCEL.EXE 2788 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2788 EXCEL.EXE 2788 EXCEL.EXE 2788 EXCEL.EXE 2788 EXCEL.EXE 2788 EXCEL.EXE 2788 EXCEL.EXE 2788 EXCEL.EXE 2788 EXCEL.EXE 2788 EXCEL.EXE 2788 EXCEL.EXE 2788 EXCEL.EXE 2788 EXCEL.EXE 3960 WINWORD.EXE 3960 WINWORD.EXE 3960 WINWORD.EXE 3960 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3960 wrote to memory of 4256 3960 WINWORD.EXE 75 PID 3960 wrote to memory of 4256 3960 WINWORD.EXE 75
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\8549cb420ed5c1edf32b7e28d9d2010dac4867c0dba3650e1f8e7655278d4c5b.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2788
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\8F5D510A-31BF-4DBB-9D3D-538D0DCC7A64
Filesize158KB
MD513daf4626e1e5d6d2f736627a51f8662
SHA1982b48fd1c1f3b2e00c1186718cfe9cc7be1675f
SHA256d1d2ec58c50a7dbd8c5a933e6625350678796dd5166ece51e9ddb2ae616570c7
SHA51237a2c7430c56bcca837fed3a945aaac513215fdaf5892c455805c24e15ffb43849e53f0b23e2c8e1cf2910b18059f5dc2d6bb2956cd80da60c180b7249278d61
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\74a0ad00a184813f0b8867eb2f8dfef7227a18a4.tbres
Filesize2KB
MD5c983498436042d3c6db5fa68cf986625
SHA1dc10cb8176f065d22f0a4510a6c58f3ae6e766f7
SHA2562ec828f8a76ccb8f1857f20a2fbacdf1e76247084e207bee80bf03ad9abd705b
SHA51231b30b6a86cd71b99882d5f5bbf74360dc0d685592435205f9b87d37043a4146f333a74b8750a87cdf89778a0878eadddd026ea095bbea72e1581ee5a4b7aab9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EMHIAF5P\microbiolagicalthingshappeneingaroundtheworldforentireprocesstostartfromthefirsttonowforev[1].doc
Filesize57KB
MD587d895bf138934010dff583e24b8719b
SHA121bf4cb9f70b31285976bbd1ce438d61ca20c614
SHA256ad024cbfdc10c8fa85cb7927a7739ed88e9d70af73997c24133124eb794361b7
SHA51250b13afe914b4ca6f9a273764e39da927f7126807502870eeb7bce87d85b3fee68a64e39787e2daa3d87be7322ae60f9462b2065cf6b039fb6cd668b18591875