Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-02-2024 22:35

General

  • Target

    informe bancario y motivo del pago rechazado.xls

  • Size

    30KB

  • MD5

    40e068be98ea0b6ca31af370328840b6

  • SHA1

    11e7096e6268536aa7e80e6f87c0c7815b067566

  • SHA256

    d7ae9c118c01c6751d64e011c70f601a73cb566df9ab3d43d25e69e30a5d8e4a

  • SHA512

    d7f114e8a91535e98a2ff1c492879ccb9b4979e9cfcfaab612cc80bb88c80f55f15bbc0dfc080175f509dd282c43712b60990dd1eed9cac84d0c4e5283f5a8a9

  • SSDEEP

    768:grYJUWXzyicoPdTeSGoqfSE8yCFDKPcM6c:grYhX2NATeSlzJqcM

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\informe bancario y motivo del pago rechazado.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4288
  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:4620
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:4636
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:968

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\E1E03BAD-9713-444F-BB97-53EB33F03E9A

          Filesize

          160KB

          MD5

          bfd7b5bd841a32557bfe56e81d89be09

          SHA1

          8ab2e5e9d52d073a680078158e3efd781c505a5c

          SHA256

          f65e653aae6938c9b435fd0be23015e03eabddef1cba67d90d4f31cd1a6ec075

          SHA512

          274e30854e1e26aa58c1bfe53f0bf6da3dc53218b99712f48a8738f6015261a474658dfedec7f4076c9f49bafd8ca1d9ddb2458919407daeb0bffe92c50847e2

        • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres

          Filesize

          2KB

          MD5

          3f23443bcd5ceb19acbaf39496d1cbc1

          SHA1

          d8c3dd56357b7ef7305fabe9f89a223200c965da

          SHA256

          d357e15ecebf0375b5155310b77c604eebd1ebff73b34a66d0900ac702013614

          SHA512

          e55e479bde584db46bbe5e93ca2b35651677dce7af5b5f1a0ba0ee19ee0b8e60101b721a0d5a37e3aa44ea21207af6e32e265e23c5e6c7cd234fd758dc64fc09

        • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres

          Filesize

          2KB

          MD5

          511d11f27624c71b8c6bcf2acc06df31

          SHA1

          6dbf2aba5e0c23757615d8e2361f6b522830ad9d

          SHA256

          6519cd07674b28b4101ef880d4d113f458c3572af610a86afc0908840e9a3014

          SHA512

          7684cb185dccc6a6762ad5cd9f127270dc543fc30989a951090cca937e42539f9604ba077ec7c07094f5f370e505343f70a9b1f9f58a3b99da9fc6b18f4e9b78

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\KPYHB2C1\mrngunlockurpurelovetounderstandhowimportanitsitogetreadyforlovetogetgreatlovertogetgreatlover[1].doc

          Filesize

          69KB

          MD5

          90454adfffe4a15a04a97ad173fd2ca3

          SHA1

          91b00307970f914356907c4e9655e68efa6515fb

          SHA256

          82e52b61e68ba6d8644476c6b23061b528053aa8a8d1f9fd85979a77f02e7edd

          SHA512

          28dde52c89e79c52ce5a03a582aa537126e2e57d26622f977356eac9533a14e37e4943b845ae68e2393267e66a3a3ce81873ecabe4ee6994974997a15b87d6e8

        • memory/1424-47-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/1424-67-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/1424-34-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/1424-46-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/1424-45-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/1424-44-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/1424-43-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/1424-41-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/1424-39-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/1424-38-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/1424-36-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-10-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-13-0x00007FFDB01B0000-0x00007FFDB01C0000-memory.dmp

          Filesize

          64KB

        • memory/4288-17-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-18-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-19-0x00007FFDB01B0000-0x00007FFDB01C0000-memory.dmp

          Filesize

          64KB

        • memory/4288-20-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-22-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-21-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-23-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-15-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-11-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-14-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-12-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-16-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-0-0x00007FFDB2B10000-0x00007FFDB2B20000-memory.dmp

          Filesize

          64KB

        • memory/4288-9-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-8-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-6-0x00007FFDB2B10000-0x00007FFDB2B20000-memory.dmp

          Filesize

          64KB

        • memory/4288-7-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-5-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-3-0x00007FFDB2B10000-0x00007FFDB2B20000-memory.dmp

          Filesize

          64KB

        • memory/4288-4-0x00007FFDB2B10000-0x00007FFDB2B20000-memory.dmp

          Filesize

          64KB

        • memory/4288-2-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-63-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-64-0x00007FFDF2A90000-0x00007FFDF2C85000-memory.dmp

          Filesize

          2.0MB

        • memory/4288-1-0x00007FFDB2B10000-0x00007FFDB2B20000-memory.dmp

          Filesize

          64KB