Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2024 08:23
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-000753.xla.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
RFQ-000753.xla.xls
Resource
win10v2004-20240226-en
General
-
Target
RFQ-000753.xla.xls
-
Size
62KB
-
MD5
42d3837bf1dc78a79c488153d7ff0ca9
-
SHA1
40dd20643ba58bb81a27c3be4c37c84cc6a2ce6f
-
SHA256
d483c4f1670ea7a69f9cdbbf716e67f1511e271d485229566afaa67011304dd6
-
SHA512
18b9ce199b52a66f7a3666226defaf4ecdecf4293e8fd7bd51f3896e1b0f24d7d7cbe6034a16fd8f43d6c9882888a9612f2b6d73b33dcffa309a6442d7f1373d
-
SSDEEP
768:UyBP0/+sG1tzXyBP0nApAEhJrOawVkC43+1eaIqnxMsijgO4E9XFzd:U68/pG1tzX68ApAEzrOawaaZus04E9
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEEXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
WINWORD.EXEEXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
EXCEL.EXEWINWORD.EXEpid process 2308 EXCEL.EXE 2368 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WINWORD.EXEdescription pid process Token: SeAuditPrivilege 2368 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEWINWORD.EXEpid process 2308 EXCEL.EXE 2308 EXCEL.EXE 2308 EXCEL.EXE 2308 EXCEL.EXE 2308 EXCEL.EXE 2308 EXCEL.EXE 2308 EXCEL.EXE 2308 EXCEL.EXE 2368 WINWORD.EXE 2368 WINWORD.EXE 2368 WINWORD.EXE 2368 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 2368 wrote to memory of 2156 2368 WINWORD.EXE splwow64.exe PID 2368 wrote to memory of 2156 2368 WINWORD.EXE splwow64.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\RFQ-000753.xla.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2308
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2156
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Filesize471B
MD55cc2e0e109c3d69d03e379265c71e84b
SHA1089f290c62a64b9bfc09e52f83fdf6fa271c86e8
SHA256d0548244625b1b1d9bfb926006b7b322fca18feeab10dbec29eb7d15ef5c71bb
SHA51249b4fa01530827fc43d90fa44a24c829e41517e61c54b9ff3813f1185bf1c19ff1c205ec3a590dcd07428b40396dcb0d9e7e9adce617d1b10ae01bb897824096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Filesize412B
MD57c3a4d5cc623e8646b275a01f0356a85
SHA15a4850956a901ca7b56061aeb67e3beae5d860f2
SHA25676e6c85cbd09d0091c204dfa2c03703e3c490b92bba595c597392d2f5bcfe04a
SHA5123e61e96afd5f0ffb2f2360791b97477e937c885b817e4b2da7d853260d3b4f527d0c10bfa222ccd6ec1ef9686cab54259cc1f32afd624e058659b4700bf6f22d
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\50117AF1-9FD3-4B96-B7D9-D2FB1279D921
Filesize160KB
MD58344197427a4fc6f5de6472e2deda83c
SHA1a7d93b9574453ab7926ac7ee6b182f6eae5e9644
SHA25699e3b47a3ee56b035766e6d29666784eb2013d8ecb71f1b7a03cde84de181bc5
SHA51224d82cedb234af9570828932b8cf8895131618a76d38be39641f67db24d8982c60f20c4109a61283430c59287f55830e57d0925528848c070f3be391d0b5c55f
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD55e59a42593e8c59b2cd0b93bd02fa978
SHA126b626d6434d9b807001622476e5c74ba6662373
SHA2561bbd91a2a1d314a1e3c52bc77803e8bea428edb218cbd74c16dc3fd276e9e4d0
SHA5123f7ef2ad7d761a95c9623010dabc069acc7b07a7dbfe49dbd7323467ebe8748b092886a821d10b0ad9ffe30f843586c432d3f3ec1a9c633f220e54e7f65c9d92
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD57eef3bce952a8fa8d4fad7085f88b745
SHA1f46c8d1dbaa8cbfb4b5d655011b2fd426f02cdd7
SHA25684f5800df7301ea756456bc602d29a79b534d4abbf67098161daa04dd5943191
SHA5120f921d871a4586d473eb17ebee254dd345bc6fea3eb01a396d4b67fc943c4b463aa22acdec6234214a784f1c233cb5509e334d7ac86e6a3a73506f33342d099a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\N1D00922\ilovehimtrulyfrommediafxpixelhandtreatedbymediapixelnetworkstilleverythinggodd____sweetkissigivenheronneckandfacetoget[1].doc
Filesize61KB
MD5e7b1dab5d64b8e37ab2c8b0a05fd486c
SHA15ae4d3a7dec17b9740d4573e8f1014769e683f79
SHA256fc8d8e349b245c33b43169523d6d8ebbc617f07d3ec592bc71eccba272a53bed
SHA5121d68bb3e96612a9dca2a7d7dbfcf17297e0c39ed6e9dd7425c21176723393dfbbf6133c7cf1441e1a971fe8d46b89d08fda9fab02679efe24e70948d187ff710