Analysis

  • max time kernel
    144s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-05-2024 10:24

General

  • Target

    45e1a55069c41ee818bd2d8f8692d05109d85e6d0616a452b1d4acc2a559a1ea.xls

  • Size

    241KB

  • MD5

    51c5c3a311d9f0e9f2bf6cc69fe4e757

  • SHA1

    0da4417db449a5e59cedd20f4c9e9b63680db8b3

  • SHA256

    45e1a55069c41ee818bd2d8f8692d05109d85e6d0616a452b1d4acc2a559a1ea

  • SHA512

    0fc0882e35ee2c1f37ac86d7e33f776d0a51ba8ffe65f4d6d76a097e52601923a22b3848d4c7666a4988704a347ba9481c0d04994d332b3a89e439268ecc9edf

  • SSDEEP

    6144:qd4UcLe0JOqPQZR8MDdATCR3tSv0W8HrzFPA3RNcr4arH:NUP/qPQZR8MxAm/S8W8LzFP+RNWNj

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\45e1a55069c41ee818bd2d8f8692d05109d85e6d0616a452b1d4acc2a559a1ea.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1268
  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2204
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:400

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

        Filesize

        717B

        MD5

        822467b728b7a66b081c91795373789a

        SHA1

        d8f2f02e1eef62485a9feffd59ce837511749865

        SHA256

        af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

        SHA512

        bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

        Filesize

        471B

        MD5

        601546482f46c71cdab6b331340e0e55

        SHA1

        df582e6cb8d3de63ee31212b85bfc14b28bf1998

        SHA256

        521c23da9919eb446c563f602744242a920b02ffcb3fa2f51b90ff389e565eb4

        SHA512

        55a268e3aa117270d74f6670ca87abc5c55c72b92913097b60b21509195f5a8fead2789d659bfe1fe336c777aba2cd4758e75860a61c751315143052948ab077

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

        Filesize

        192B

        MD5

        a7c5e22198330e0d2ec66c88563424a4

        SHA1

        1e865981d450512b07a36eace0cae38021196951

        SHA256

        c3c3d8a20e971892f7e28abd3bc72b7d6d73c126a6a3c7f35dbcfd5440bffb0d

        SHA512

        be99d7aaae4ab2bedd78668b53ec373fd4d6722e7e61f9e75ced5c780b842d47bba7a8f9b50c95f8e0e4d2cc06e44fd529e5de652bb59f8ccc0bb88c3329a5a3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

        Filesize

        412B

        MD5

        10e01dccf56bba95552d67d6c45d2723

        SHA1

        0e8cf5f0d541e474f04d6e8b5cd0ff3ce6620587

        SHA256

        5422463f872368dfecfe9051dbbfb64ea3ead0cebec6eae1c30a833028cbdc36

        SHA512

        3ead3c81b260bccd2be609529d997edcb7bb63c57086b56a1f0847040321382d2d085bdf3a77f451558f27c1d64d154534c047b113dd9de539342b480ab7ba29

      • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\09422775-D5F7-4729-8932-0B5CA3DDB968

        Filesize

        160KB

        MD5

        7e91dd3bfaa0eaef1c16e35db31a863c

        SHA1

        9bbc1896b8a9f0d05803f17c340fbe7483ee2df3

        SHA256

        fd92ea3ae0bfec69510997a0685e76f3f4a1ad89429bd7d07fc45856358533c8

        SHA512

        3f4393da716b4928057b6d0ec270bfd7284eb94d6846144b87144c3c9b3b5262518f010b621c6093d1239d6375145da0e1bfce65c9e928ddcd7a2c80825cfb25

      • C:\Users\Admin\AppData\Local\Microsoft\Office\DLP\mip\logs\mip_sdk.miplog

        Filesize

        21KB

        MD5

        e11339406b93eafacaa803393b664eed

        SHA1

        74fd8f40a8904aab761925e250342a39a165c93e

        SHA256

        936018728e47a4d6eff1a1ad6961b2424537b1f75ccaff1684fbd373d42162b0

        SHA512

        681facfb3164d9827a406b791867a8fd45f919537002788ecafbf945f0cbaf935de95d7828efdbb5e65393661eb541dd5bfcbd1de8550f4ad789c182c2c2f5d1

      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres

        Filesize

        2KB

        MD5

        b196eef16bc8fd7f71db5f4fffebe2d0

        SHA1

        70e8c0327e5222245047443fafb89f4cf5813fdf

        SHA256

        6e5e50f1d5c623eddbe7f1d8f06cc7506b6b8e62bf0f42364c2721e30d487145

        SHA512

        0f2e404809530367e6a004c6943f0a994904b4517b02195f11e17143648b4e31c6c566491d9423f74d016385a0621215ded280cd4adc596d77824d45c7efad96

      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres

        Filesize

        2KB

        MD5

        0a66a5f7b7609f05e1e2bde831638511

        SHA1

        7b0f612e9dc3274361957cbf678793926a04b729

        SHA256

        34190b488c4ae45c74733c9a3f2cb3e05a31a1192ce854814c9c033a11806ff9

        SHA512

        68b1043722ac74cddd146b8a2cb7a13ac00d8936286560b7cec9f025b186e7d7596ec1ceae8ccb97778bfdf6684c651e10088253ce82ea0ec45d79f1cf406abe

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Y2QVXCX4\europeherootforentirepurposehappenedwthhappinessskeisverybeatuiful___heisverygoodnadbeautiufl[1].doc

        Filesize

        79KB

        MD5

        39579fba8fb7611900ac896d4b298140

        SHA1

        b5e7e63b7bb8fe8912f51d293abdabbc988ccc4b

        SHA256

        97bfc85dd5d34c914685fcc9c544b815f257400512a25e7b3b0074845c900acc

        SHA512

        6bdfef986eacccc6be1bec479963bc7e35f56d696847f27e8f752ad4a322ce795b91c02bd1b92fc320cb0df358c9031094582bffc831afe5155c0f0c883f47ea

      • C:\Users\Admin\AppData\Local\Temp\TCD7A10.tmp\iso690.xsl

        Filesize

        263KB

        MD5

        ff0e07eff1333cdf9fc2523d323dd654

        SHA1

        77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

        SHA256

        3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

        SHA512

        b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

        Filesize

        232B

        MD5

        809e53f2fbcb09f6d44acc530c226e03

        SHA1

        e23eca99de9c6cd45daf998a6903eba2b901f43d

        SHA256

        49d92d96f26e36fa7972a57d83d57893a854d9787fac9bcb9e33e55865a6fbbe

        SHA512

        3e1caef34191077e2f98ba4f209dc81038c532ba791e31c3cf941278d3722a6865f3182f0850d4ebb01ea2613ea3c37dfff02da4819a08b0fe6893a1d6ffa217

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

        Filesize

        5KB

        MD5

        a65f947e2fa84741ccad74eeaa1a6190

        SHA1

        48926a8b09c3376d9338a4b9f3371db0a7712dfe

        SHA256

        a9de6ed7591a8f4baba32d85be69a958d9a787858667dd354f0254ccfb3d6a74

        SHA512

        6b90f3a692ff40fb60a7845c98ce3a0754c2d8f82b95c65f3025b142277669d2c3704e9590e57078a7385ec47e83c7a3fe7d7fcde76e53a8d65eef71311ac2b3

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

        Filesize

        3KB

        MD5

        b9aa92bfcc8002710712452cb82a03f3

        SHA1

        06ef26d558680054580655b13b13d4e9ae12f6d8

        SHA256

        7cea5cfc43a5ab71da41a44b12164405163a26c88a0f334ef1cf8ba07ed70116

        SHA512

        cd14ee7bc664d66fb0680f3d778929c438a04bb5f5dbe5742bee8ea2e6868893b9bc3dcf8452f2a6c7a3b2932911c5990229984a76fb294cdd64f0dee362f05b

      • memory/1268-5-0x00007FFDB1E70000-0x00007FFDB1E80000-memory.dmp

        Filesize

        64KB

      • memory/1268-3-0x00007FFDB1E70000-0x00007FFDB1E80000-memory.dmp

        Filesize

        64KB

      • memory/1268-14-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/1268-18-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/1268-19-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/1268-17-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/1268-16-0x00007FFDAF820000-0x00007FFDAF830000-memory.dmp

        Filesize

        64KB

      • memory/1268-618-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/1268-614-0x00007FFDB1E70000-0x00007FFDB1E80000-memory.dmp

        Filesize

        64KB

      • memory/1268-615-0x00007FFDB1E70000-0x00007FFDB1E80000-memory.dmp

        Filesize

        64KB

      • memory/1268-616-0x00007FFDB1E70000-0x00007FFDB1E80000-memory.dmp

        Filesize

        64KB

      • memory/1268-617-0x00007FFDB1E70000-0x00007FFDB1E80000-memory.dmp

        Filesize

        64KB

      • memory/1268-572-0x00007FFDF1E8D000-0x00007FFDF1E8E000-memory.dmp

        Filesize

        4KB

      • memory/1268-13-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/1268-4-0x00007FFDB1E70000-0x00007FFDB1E80000-memory.dmp

        Filesize

        64KB

      • memory/1268-6-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/1268-7-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/1268-9-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/1268-12-0x00007FFDAF820000-0x00007FFDAF830000-memory.dmp

        Filesize

        64KB

      • memory/1268-11-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/1268-10-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/1268-8-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/1268-0-0x00007FFDB1E70000-0x00007FFDB1E80000-memory.dmp

        Filesize

        64KB

      • memory/1268-1-0x00007FFDF1E8D000-0x00007FFDF1E8E000-memory.dmp

        Filesize

        4KB

      • memory/1268-2-0x00007FFDB1E70000-0x00007FFDB1E80000-memory.dmp

        Filesize

        64KB

      • memory/1268-15-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/1268-571-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2084-44-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2084-573-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2084-41-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2084-42-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2084-43-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2084-39-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2084-40-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2084-627-0x00007FFDF1DF0000-0x00007FFDF1FE5000-memory.dmp

        Filesize

        2.0MB