Analysis

  • max time kernel
    142s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-02-2024 20:00

General

  • Target

    informe bancario y motivo del pago rechazado.xls

  • Size

    30KB

  • MD5

    40e068be98ea0b6ca31af370328840b6

  • SHA1

    11e7096e6268536aa7e80e6f87c0c7815b067566

  • SHA256

    d7ae9c118c01c6751d64e011c70f601a73cb566df9ab3d43d25e69e30a5d8e4a

  • SHA512

    d7f114e8a91535e98a2ff1c492879ccb9b4979e9cfcfaab612cc80bb88c80f55f15bbc0dfc080175f509dd282c43712b60990dd1eed9cac84d0c4e5283f5a8a9

  • SSDEEP

    768:grYJUWXzyicoPdTeSGoqfSE8yCFDKPcM6c:grYhX2NATeSlzJqcM

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\informe bancario y motivo del pago rechazado.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2448
  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4588
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:4888
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:1600
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1348 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:1460

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\1B2935FD-DFD1-4F34-A4AC-4E50F8015D73

          Filesize

          160KB

          MD5

          c2783ca77ae3be9bdbdeb990b7e478f1

          SHA1

          64c1543904724e751f982d66cdf9ecb0cd7b5a98

          SHA256

          1a16626fdc6ef90e8ef751620cadc197ec29c4d2558fa0a513428411317b3934

          SHA512

          9ed36642978807d714c2ff7713e3b11bfb3fa124b2e8f950018f90362ec69144db98cff3e7cd758992b291af69190e2055887506b61194c938d1251899f85024

        • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres

          Filesize

          2KB

          MD5

          1528d1e78fde87b0f12334acc58617d7

          SHA1

          2fdc21fd7677b096c0656f10d784f3d1f9324b6f

          SHA256

          ba53883c9bc671943de9e4b6d57e39a1e8b0ed48fd5a12588c133d19d3d0754e

          SHA512

          8fea2c54bba1da522a8d49a221e077046c9fda0e015322cb3189f6b9c37cc851e0b9f4c351158e3beafabfa9888e3b4f1f239ecd5462ffe207072891bedcb7a5

        • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres

          Filesize

          2KB

          MD5

          1d5fc97e4efb363f513a73497ca300f2

          SHA1

          512f4195c889729d59dab3e8a7e970b751f366ba

          SHA256

          f73a53cfb817bf4dab89995ce09d4c58b91416bbb718afd9e08d91cccae203da

          SHA512

          4836b6ef91ede37a7f430df359ff11e1e3c9c5dc67638d48853997c3a4d56e84a2349c1e3a5402c699ec0013001ff60bc062b91df8caf822350ef0f0fa2cdbea

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8ZO46T3J\mrngunlockurpurelovetounderstandhowimportanitsitogetreadyforlovetogetgreatlovertogetgreatlover[1].doc

          Filesize

          69KB

          MD5

          90454adfffe4a15a04a97ad173fd2ca3

          SHA1

          91b00307970f914356907c4e9655e68efa6515fb

          SHA256

          82e52b61e68ba6d8644476c6b23061b528053aa8a8d1f9fd85979a77f02e7edd

          SHA512

          28dde52c89e79c52ce5a03a582aa537126e2e57d26622f977356eac9533a14e37e4943b845ae68e2393267e66a3a3ce81873ecabe4ee6994974997a15b87d6e8

        • memory/2448-12-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-1-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

          Filesize

          64KB

        • memory/2448-5-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-8-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

          Filesize

          64KB

        • memory/2448-7-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-9-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-10-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-11-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-0-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

          Filesize

          64KB

        • memory/2448-13-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-14-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-15-0x00007FFE89080000-0x00007FFE89090000-memory.dmp

          Filesize

          64KB

        • memory/2448-19-0x00007FFE89080000-0x00007FFE89090000-memory.dmp

          Filesize

          64KB

        • memory/2448-26-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-29-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-31-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-40-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-34-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-36-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-37-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-38-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-39-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-42-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-117-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-33-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-43-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-44-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-46-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-41-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-45-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-115-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-110-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

          Filesize

          64KB

        • memory/2448-4-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-3-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

          Filesize

          64KB

        • memory/2448-6-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

          Filesize

          64KB

        • memory/2448-55-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-2-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-111-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/2448-107-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

          Filesize

          64KB

        • memory/2448-108-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

          Filesize

          64KB

        • memory/2448-109-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

          Filesize

          64KB

        • memory/4588-66-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4588-49-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4588-48-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4588-47-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4588-118-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

          Filesize

          2.0MB