Analysis
-
max time kernel
148s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:13
Static task
static1
Behavioral task
behavioral1
Sample
56882720_50174358_2024-05-23_203027.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
56882720_50174358_2024-05-23_203027.xls
Resource
win10v2004-20240508-en
General
-
Target
56882720_50174358_2024-05-23_203027.xls
-
Size
307KB
-
MD5
74e5490d445233f2448dce3734449ba4
-
SHA1
65f17e5cf0b97a21e7cb8f2f5255affe8a76b796
-
SHA256
9db870a4914a69f847d996c11ec1f6da501f6abf0a715a2a1c49cf82484317bf
-
SHA512
d47c750b13831eb77bd16b746bd137d616797dc2c11da5cbe66f5494e782dccae533e1241c07f28a55692cb60eab2c07ced5b986cd4f07794438830cbe34cddc
-
SSDEEP
6144:3KZvbHPkhP/sqnxxrcFviljLq2xLuFqah03KR09lTurgU:4LshP0sdcgljLq2xqFe6O9lu
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEEXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
WINWORD.EXEEXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
EXCEL.EXEWINWORD.EXEpid process 964 EXCEL.EXE 4308 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WINWORD.EXEdescription pid process Token: SeAuditPrivilege 4308 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
EXCEL.EXEWINWORD.EXEpid process 964 EXCEL.EXE 964 EXCEL.EXE 964 EXCEL.EXE 964 EXCEL.EXE 964 EXCEL.EXE 964 EXCEL.EXE 964 EXCEL.EXE 964 EXCEL.EXE 964 EXCEL.EXE 964 EXCEL.EXE 964 EXCEL.EXE 964 EXCEL.EXE 4308 WINWORD.EXE 4308 WINWORD.EXE 4308 WINWORD.EXE 4308 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 4308 wrote to memory of 1388 4308 WINWORD.EXE splwow64.exe PID 4308 wrote to memory of 1388 4308 WINWORD.EXE splwow64.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\56882720_50174358_2024-05-23_203027.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04Filesize
471B
MD5a1ea63317f798b4a8794feed068eb885
SHA189145042b32e863139c8d3b67763d1aaeb84628f
SHA2564cb414ada8d6af38feb16ac9db9da6a1480992aa217560134e02a72fb53a5b0f
SHA512bf7b88fc2c725e62dfa3ee08ff5d246f17fb4397bd745a99546b8083586a8aea334a431275de65c454b8c46b6ab90b9e0053d30b616cba28ccf7593697ff21dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04Filesize
412B
MD59f13dfe02bab5b71ff832d8c602640ce
SHA11b5ee4667f1bee48339be801d15fbbb2f37f7bdc
SHA25673338884901fd9d362b873720191bc06956f5a219f224b5f900a8544596e6a9e
SHA512891bd8bc6147275b41ac97c6923271517a6d0029e99546735aab7e70d563d670ac14d183648a1b612409eb6adbbc7d131905ffc09332cd48feb8bdb21fca7dfb
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\4E3CA210-F7EF-4ED1-8EE9-F5EB0AFB9C90Filesize
161KB
MD54d4a3709269fabdcca5f5b9060d51b40
SHA18498440ee40de439123b6b78180afc62e7992ea7
SHA2560ca06c2e09cc680142ccbfa6e22c10cad48e88ea82ce982b4c39ccee5a5cdf52
SHA512878ebe0f3c3f470900a5841518d2156eb824f5505fc8dc099d1cccc6fe06017d44a77ba43b0636ad08a51e8271b3507481e2cda55d08e52457b4996189162839
-
C:\Users\Admin\AppData\Local\Microsoft\Office\DLP\mip\logs\mip_sdk.miplogFilesize
21KB
MD56e5a4a5fe9053a90486004791a14543f
SHA1f20d7f6840a0c8b63530dc392fbd9310c8667f18
SHA256f2e341684d938da75bee7059330729951bdb1fbb00a96b632f1d81bffe284941
SHA512bb9c79ffb6e5c8d14966b3e8d0dafb1a9487300026ba74b862528954e1f8699332fd57af1805372165ab36a14ba180d6c7696a4f4e56f4d0a2b584d1e827c6ff
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresFilesize
2KB
MD56ae8fe16a1480c5ac87db5ebf6624867
SHA1d0d26b0f64dc7e56699d8bed45673600fd8c6f56
SHA2560dc83240d4702e6f7bb4c5e61e9731ef3201f41e330d547e8279dfb350f54745
SHA5126d5d9426236d2d60b002014cd996209387db02c3267160be4cc388d1c881625459a4386523c5b894be557c36079ecffd24b74d67932c8ca316c0f6779fa9799b
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbresFilesize
2KB
MD5fb495df1b91f3016fb5446134daf55ed
SHA11b2e7a8a0884124004e411451a4c7b35ef0d2cf8
SHA256c4df3413e01551c9757e7b1bba3b2f79ac2a62512175a9d3db94d4bce40bcf76
SHA512b1fc6ece6998d3b873df089e735f5fa11490fa2342cce40e8850d2d087da909c96ba5f4c7efed78fe47fe9172f9139fa0529d2cbf9b6eac2c3e43df34d5beff6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2IX84YPE\lionisthekingofthejunglewhosurviveentirethingsandlivelikeakingofthejunglelionkingiknowitsgreattounderstandkingofthejungleislion__reallyamazingkinglion[1].docFilesize
30KB
MD50185e99b23980e018cdb8575daa7aca0
SHA1b4113a5798d86a93b79565999772c5cc7f137ffc
SHA256503801ad97e7a462b68e61a70e9a59daa1a0f367fe1750c1b01d63d3642fc8a9
SHA512aeaf4861f54c5d914ead379e26fc340ddbcee199db66ebc333d44359edccc6652db3d5cf312ef6098da3bb453bc7374e90d3cbbf4580d805d5c3e64d3bfc0ea4
-
C:\Users\Admin\AppData\Local\Temp\TCDC445.tmp\gb.xslFilesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.datFilesize
234B
MD5c00513e8ac99b020a970b969c834afca
SHA18795cd8303d16e69abcd69734eddc1a1825a0706
SHA256330181db4d5839f5d64096d34d4752cd6d4ed0d100c085f2e84c3783d99149a2
SHA512476d803f4b5a68892f7c42ce2dcb23e9933c53dde1f60689e21d31d138a0a9feab9ed573a1c70c8af4a08169971b8cf22c49b6eea206ee46e6bf96c898f40c90
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-msFilesize
5KB
MD5499311899db4d86305849dfbdc067c7b
SHA1d515eb75622c00cc403ffcf4a35fa818eedac33d
SHA256e645e049135f5e18ce62c65be816847bc5403f9f23dc90db90ec5b7982124d05
SHA5129efb81ec2d01e7163e7f44bbfd68b597764dfe93bdcfe08ae9b4096c380092bfa8ed5f84e7ee6d57f037be31bdf42ad1a4e3789bb37625d20cec983fdb631a26
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-msFilesize
3KB
MD532221e6f96f4463f446506756ef2bfa9
SHA1ae32182b622cde6ffd258c6e9c541dc1494c48a3
SHA25680c25dc159461645a09a4e2b4c9f86d3cfca3ec7febe1c30e62ba016b89cb4f0
SHA51205c88daef1e8672592189179588482750a90f9f690a42ffea660b6e89582760c973dfcb6ae4923b02ab550d9f1089ccb477f3a1c4e54a5656927d2c2716f4772
-
memory/964-12-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/964-4-0x00007FFE0F630000-0x00007FFE0F640000-memory.dmpFilesize
64KB
-
memory/964-8-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/964-14-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/964-16-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/964-18-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/964-19-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/964-17-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/964-15-0x00007FFE0D450000-0x00007FFE0D460000-memory.dmpFilesize
64KB
-
memory/964-1-0x00007FFE0F630000-0x00007FFE0F640000-memory.dmpFilesize
64KB
-
memory/964-545-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/964-0-0x00007FFE0F630000-0x00007FFE0F640000-memory.dmpFilesize
64KB
-
memory/964-6-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/964-5-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/964-13-0x00007FFE0D450000-0x00007FFE0D460000-memory.dmpFilesize
64KB
-
memory/964-7-0x00007FFE0F630000-0x00007FFE0F640000-memory.dmpFilesize
64KB
-
memory/964-10-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/964-2-0x00007FFE0F630000-0x00007FFE0F640000-memory.dmpFilesize
64KB
-
memory/964-11-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/964-9-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/964-3-0x00007FFE4F64D000-0x00007FFE4F64E000-memory.dmpFilesize
4KB
-
memory/4308-37-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/4308-38-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/4308-41-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/4308-39-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/4308-40-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/4308-35-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/4308-555-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB
-
memory/4308-33-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmpFilesize
2.0MB