Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
93946883de3d4074ac4baed60abcc3f2d0c57c8ef6e41ceaedbc5ca0de55dc30.xls
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
93946883de3d4074ac4baed60abcc3f2d0c57c8ef6e41ceaedbc5ca0de55dc30.xls
Resource
win10v2004-20240226-en
General
-
Target
93946883de3d4074ac4baed60abcc3f2d0c57c8ef6e41ceaedbc5ca0de55dc30.xls
-
Size
47KB
-
MD5
11a62e1437c97806b4087a209952abb1
-
SHA1
6f4a65dd084cfcd67567da0b232226a08d6ac1bf
-
SHA256
93946883de3d4074ac4baed60abcc3f2d0c57c8ef6e41ceaedbc5ca0de55dc30
-
SHA512
f75bbaf5debf2620ef1bb47eed90367a0afd03398e7d25847182f8a29f51d128fd3abd38f31aaa2b71bc7282dbec5c6afadb10149d90bcbe6903ff922e02474a
-
SSDEEP
768:rXyBP05j54QzpC555L3Nj7PRFpXoP0cHSJmE6A:rX685V4+pQ5L3NbpXo8cHSJmE
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4624 EXCEL.EXE 3328 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 3328 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE 3328 WINWORD.EXE 3328 WINWORD.EXE 3328 WINWORD.EXE 3328 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3328 wrote to memory of 512 3328 WINWORD.EXE 102 PID 3328 wrote to memory of 512 3328 WINWORD.EXE 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\93946883de3d4074ac4baed60abcc3f2d0c57c8ef6e41ceaedbc5ca0de55dc30.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4624
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:512
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Filesize471B
MD50036cd341a5c6b65ef2e5dc7f1f587b9
SHA10df419ce44bcc31a61af07196694d10b341dd168
SHA256d8ad8789af97cebd782c26dd800a1ee5f1fa75efdc4b47c882a9c89b52bc53a9
SHA512fa2d98e5216e2b93d6d7b39a2bdd1a6e352fb71980cb212216295efb12455136efba4d5fa3cdd4977590ff89e0a6cbc06f3c198f68aab375f9f99761ba7a2a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Filesize412B
MD54ba92591fda28cddf8558d5d0da6e00b
SHA169661974fc08d7b63cd2887918db1717cfb71a3e
SHA256f66c5c9fa162e828f4e367aea1b130d2eb3388c1cc200fad16064f5a71575001
SHA5124aa4ab0ed8ad303b54ce1da8d892bf6102cc19face7aad432993b5e90990790ec74f6939c2b420c5e9c6c14e0b08065e8f6b3a140e4432e821ac8c56f67d2360
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\810F5E26-8724-44C1-8595-71C068FCD4CF
Filesize160KB
MD5b33902e9402748a3354dcd5676b576cc
SHA18de1080d9c3f4e9cb24dfef7257e24dc961b3cbc
SHA2565a7b7ec844b124afb63981a612e682a5896328a8c49ef07c0810a932c4ce5ea4
SHA5123444be432caccc289e294f35c803c292abdad490e9fa0ea95ec2450d600526dd079875234dd1572bfd0c56a66332bdd8188e4d60853f78a3daebd0c3805bb0d4
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD5cd64aecdada66a3cbf9a92c8f63ec69f
SHA11b259332965bbd0b4137ab38dd0b2937a30a4546
SHA25650470b960d6828da07cbcb76652c7e813db186a8c43b3bfaef9e28df820d99c6
SHA512ebe09bce983f2a69bb1f82c53f6ef659c16a61699ef80cff56ce3430fcd8cc0b607f239b5cb07f17a3cc9a458e5742c35b22ed2e5b4324d5df107ed3a7f126c7
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD5fa1ffda2684286742642b61bdc97d1af
SHA1a5665110e9201954147354d71a32dd870b0f25d5
SHA2566a62bb55faa4bc76f1b232287dfcf03627341bc5ae3672e103974c0083b59c14
SHA5126e4880782928c8deb545833076b0b26959f7f05bfa7b55b391ba67ab3157019006ab90b96e1e351b33c42fb8be62531c740db55fab0fe771140f93a98aa8af6a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UUFWLFGT\shelovemywifemorethankanyonebutsametimeiloveagirlwholovingmealot_____sheisreallymyloverwhocarewholovedmefromtheheart[1].doc
Filesize71KB
MD565e41469da1397e3e1c9d70fc29fe2e2
SHA1b234d40cee175effca9a503c908b408a91c7a7da
SHA256a60f72316633a40d5ab45b035ecd03b7cd0162ce161946cfa2ad86d11fbc9c13
SHA51222a75d17446e8b6556a1fb3fdb1f8f4671d3f894a717541c7b51861f1c87c2bdd593b998762b37b1844c9028d9cd79510a0414d87c79f679266b519f44e75c56