Analysis
-
max time kernel
149s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 15:32
Static task
static1
Behavioral task
behavioral1
Sample
OFFER DETAIL 75645.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
OFFER DETAIL 75645.xls
Resource
win10v2004-20240412-en
General
-
Target
OFFER DETAIL 75645.xls
-
Size
319KB
-
MD5
1dc1fa973594e14e2b517f281400941f
-
SHA1
1565eb8c6dc5248ecd19cfe4ff1cb6c33541ed1e
-
SHA256
fd363c89da6fb751baac4db6bc4d1cc302c88e1efeba1bfab397a627d4c1eead
-
SHA512
90e146ad9faa2acc760511fbdeed8c6883bbb274a158349ac995714709d77374789f77454e1bb818477274e0c60eb90684bcad3da3daa46f9d558861cf307669
-
SSDEEP
6144:xLunJatY35qAOJl/YrLYz+WrNhZF+E+fgL+0dD8ivSbVX2MIMflDClBnPlWjIKw8:xmJaU3bVX2MIuVC7ntWjIKN
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEEXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
EXCEL.EXEWINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
EXCEL.EXEWINWORD.EXEpid process 228 EXCEL.EXE 3812 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WINWORD.EXEdescription pid process Token: SeAuditPrivilege 3812 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
EXCEL.EXEWINWORD.EXEpid process 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 3812 WINWORD.EXE 3812 WINWORD.EXE 3812 WINWORD.EXE 3812 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 3812 wrote to memory of 3488 3812 WINWORD.EXE splwow64.exe PID 3812 wrote to memory of 3488 3812 WINWORD.EXE splwow64.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\OFFER DETAIL 75645.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:228
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD58a19e2f05bb9c727f7fb24ef7e6541e7
SHA1fc4e212ec0c090fffc2c1b9c70fe5cb6c77592db
SHA2567eb17f03f49ad906d62f715fe4e81e9341f8e7e900e429bc83d0787340dfa42f
SHA51282b40631302b2338d74c48aaf0b848435020936eb99a1945a6a5397e123a6107eb5681d458595af641d4078383de41370afc882d94aec89e4c65f51e86c4c0d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5b9725a2ecacee1154e61ac2732076dd8
SHA1cc4e74cfc56dac5d29b0e9434198163f4bc172c9
SHA2562061a591a8747168ff8d34a2b0cd6331f5a80740a1f002ea2f98b1c12d0aea87
SHA512c8a6d53ab1a3c48108829e121431a2d439bdddcf9a314641c61833b4e788835ac91336ba3da37048a4c6953615962b78302fecead8d30cad49eb5484ca23e0de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD53833910477bd2c92d79e39b786e320d4
SHA15d5d4d0872294ed6e1ca0bc18b407f0106076037
SHA2568e2b1d1464ed4dc5e1351a57e248e991af06ef046beb59c8e83306cc81074b90
SHA512bd88b15f6a9ea642c095917f9b3c44ee9fc09a74c75142a32add6badb9335afed932ef56b013ae75236acc363f4e7cc93828d74e6c703eeae3158016e7960506
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\F205C6E3-E7E4-4FE8-AA7B-BBCD74773A55
Filesize160KB
MD59afaba5b9b5fea417dc241d77bbaa4a5
SHA1c13e86fb3c9a41fc2fa1df829e62d21f66cf38b5
SHA2569a03c5e4ddae6b794011839724dfb914287db64f403e9a619fe391961c9dff6d
SHA5126592ccd65c2fa035d2a20c731efd3e89753253a0c361e5bb65e820c93e08da9194de878425bd43755373130dfdaca9cf68a40a06d22d2f7b49501ee23466a0c4
-
Filesize
21KB
MD5164d68348c8758636c49b37a282297d5
SHA14b59ffe25304bcb2a2a22397c735a726e29bf8a7
SHA256248db267a69c98e21aaf237e687b5bb1c8c6d0b91b0dd292d6ae06e1928a66bb
SHA512fcc5e8528200ee160eef98324038b0f664b8d8508338a4b70e524929cb2da635c040aa3dcbbade1952e2ba096ebed42b769979e19a3a2cf750f0dc4d840325ab
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD548a6621a90b03675e03fd9a8d42da02e
SHA113bc2f689cfc2824a38416ca132d42ef5dc85783
SHA256ac63ba8f9e221aca5444063abf924d72294d450a7d54b84fbf82ef3df5ea78e0
SHA51291fb6e3ee18a785ad1276c6ea6adf55437c13a8cdc97a1bc007a09f92515d933e715f001db53d2ef38e46303f3873de66b0fa54dcf57735e3b7f0c329b181b4b
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD5dadf8d28541eb0935e36111e126b1e77
SHA1d3f3e66cb7afcc2975cec27c0671b7fdbc59f816
SHA2562ec3ee28ec821ea65497301da782c6693de71f3fbc182506140ee16460539ced
SHA5121bd3fd0dc118623456729fdcd8e2555560f286ebab7e31c61eca12737fc4526bb5b7f12b593ac2b805daa5abb5b8d620022faa6f862331ad4b3760c053a09120
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FBEJHBLX\iamwithyoubecauseiloveyoualotwhichneverbeenforesxyoumysweetheartialwaysloveryoutrulybeaucse___ineverwanttokissyou[1].doc
Filesize73KB
MD596bd8f3d1b8badd184f3b8de29a26ab5
SHA15bbf4c72f5d2adc0348ac73cc1f70608dd1d554b
SHA25674b7cbd3c66d01a6e25ccbe17375138c6a32699c61bf170e18ffecd6ebd55237
SHA512dd8d1208f1954b24f5d2becfafa0ae27824a449486e946e6500a04c23c671a2ebb633b4c6808881003164aec027bd40801093d2b82e8e70f82408be5a2929847
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
230B
MD53b09edea5d16783576adfdb56cd26a63
SHA1682336d3558728c43a923ad306082521f1aa48c9
SHA256db4f3c9b12648f8f583091de8ba5fa920085f192ce5f85c36c0eafae7d7d6860
SHA512e5b9bb31a5981ba95199a1a653b268c550a73a3a581b770fefc5fad77a59e7cdca5618dc8bc55d574b708266f4c94f6ab89203c8cad370560b749f12688993ec
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize5KB
MD5a42ad4eff79dfb03d1f833ee4c8d45d9
SHA14c7e79001b123ff014f34fd884096dbf4e2021a3
SHA2561bed1dff03950db37aee5b61c8964b65224d7f86a1c09521babeabef887e0fc3
SHA5129d73614340c23667f831c515e3104ec91088b1ab25b052fe279ff5f814b077c9d688bad839a6265c77fa7d944cec8ed5ead31d9ff61c8b69ca738965cc850fa5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5fb53846e035763b5e3833154dc90652d
SHA18c101edf843abc94deb041c95b5c8dbf808a1fda
SHA256901c47cc6e74e7669afcc296a0227dc202d2a0d12d16e7b77e5da210d5b41a86
SHA5129bd8b5cd87b7bea7cf9a3e2631d7d7cc9ab6ebbe9dda2f2411d193fd3ff32574febbe6a355620fbdae89c483aafd36859025adc307c366b2df0854770e6c0582