Analysis
-
max time kernel
148s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
cfa70bdd4f97f10fdb4067b7683edc6aefcd90ac65e83e783efc3e8ffbfedc03.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
cfa70bdd4f97f10fdb4067b7683edc6aefcd90ac65e83e783efc3e8ffbfedc03.xls
Resource
win10v2004-20240508-en
General
-
Target
cfa70bdd4f97f10fdb4067b7683edc6aefcd90ac65e83e783efc3e8ffbfedc03.xls
-
Size
308KB
-
MD5
fd1a4445eb0ac43a444303dfbcd14bff
-
SHA1
cdd327c448729d39584282a461d10c37b3f00a4f
-
SHA256
cfa70bdd4f97f10fdb4067b7683edc6aefcd90ac65e83e783efc3e8ffbfedc03
-
SHA512
2243b86581a8bfa0315367d5c914a2a72f4137585b9ce4e86bacd6ecf42ef570e591ec39dff5262769307590fbb138417149a9f8dedb442bd42eddc59eaa78fa
-
SSDEEP
6144:lKW5fnuSrQBkay4KX4mEmHSCn0rhia5WQ2P2TFHsEvT9KLtXqO:vvuSrgkayFX4/ULTPasEvYLtq
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEWINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
WINWORD.EXEEXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
EXCEL.EXEWINWORD.EXEpid process 4632 EXCEL.EXE 2596 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WINWORD.EXEdescription pid process Token: SeAuditPrivilege 2596 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
EXCEL.EXEWINWORD.EXEpid process 4632 EXCEL.EXE 4632 EXCEL.EXE 4632 EXCEL.EXE 4632 EXCEL.EXE 4632 EXCEL.EXE 4632 EXCEL.EXE 4632 EXCEL.EXE 4632 EXCEL.EXE 4632 EXCEL.EXE 4632 EXCEL.EXE 4632 EXCEL.EXE 4632 EXCEL.EXE 2596 WINWORD.EXE 2596 WINWORD.EXE 2596 WINWORD.EXE 2596 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 2596 wrote to memory of 816 2596 WINWORD.EXE splwow64.exe PID 2596 wrote to memory of 816 2596 WINWORD.EXE splwow64.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cfa70bdd4f97f10fdb4067b7683edc6aefcd90ac65e83e783efc3e8ffbfedc03.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD564c143e9f2a438ddf74501d3b3cc54bf
SHA166b41aabcaa5c364d405c858b85fa7a995f53c72
SHA25602802fa86c2539668fb375ddf8b3ffa5a6c7ad8ae0050c3471dc9fca1275c0ca
SHA5129decfe443630833dfc6c4e2b728c0395d0cbd59a5d868639f300244c4c61df6540b21d33497a8dd4e1947aaef02e4cbc815f53acc21d70ba1653d9492f438e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD5b98d8ef60eb54d46562d30ac0c62f3a5
SHA16157b39cfd6f5323e526fc8ebed37833b44c9645
SHA256d11b83b3df5f7fd3422f3bf0590dd6607aec05979b9af610ae339b1c52f9f25f
SHA512c9599f394e16351a41795be31c15ab4174ad485e89a3457dee96afeecf2bf0a70d15afa24da3d571f7d7bd53476b89b0fcea00a4c51d15c4794da2090789d311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
392B
MD5f9fbf4e1e419cfb8761dd05b6402be10
SHA19e0d03d3f0ebaac910d4567c13508775a77e3ea5
SHA25605659b345217491e1321b1fab7d98114eaac4bd29e1e30a66c3ae49afa60e1ad
SHA512609fbbc0bcef862f13d279f31243017e4740cb363b3a1e2e6a8a87cab03c2bcbe7ee36d7d2beabc145cd7eb9485308429092de1e8da58d35cdb60c6b97dd0d81
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\79306D6E-1D8C-41C7-A96F-1F96CFEABBCCFilesize
161KB
MD5f087663f124c404c9a9645ef41229986
SHA194c0fb3625bca1d3c83da57036a8bfa7fe65dcd2
SHA2565d5a95be19d219ad2de990fc08482e6927654476942fa1f4c06685b039c69536
SHA51244ee22d7414c939953bbb41a1b57fa8f7afc7a1a37238e722579b991da531be23039fb7da65c4be93f3b54de63616a0ac15d7f8aba50f232aac17c863bcc5a82
-
C:\Users\Admin\AppData\Local\Microsoft\Office\DLP\mip\logs\mip_sdk.miplogFilesize
21KB
MD53cb427a833e15c5efd192b212218f494
SHA17042dda228b2cd2ef938a7d8a543b55bb4bfa1d4
SHA25651ba5a99aec939fd10cf5ba0cc0d317a95758132383e1b363d147cd898514508
SHA5126b3786519efb80a1958d908a3d21ee88dbb434076df0254003eaa6cea4cdf10b350235eed270c967f680b6068b39c54a56957b056a948058a16e3ca515d3968a
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresFilesize
2KB
MD5279a407982a0df60e45d3c4fe0c60b7c
SHA1a035de3b91310df9ed0c4f11cc5378af7887dc58
SHA256a593741467fbbc3403176e0bae9e5ea01a2c39fa9476b8f61f5c36a7c96a4b4b
SHA51284226c83130a4e8edde67e2253ff5e5cec9f14f6997f8a80b72dae01c00d06e9734dbf5e97dbed88f943a9427a82eb5cd3aa218269924ff106f0aba08ec03454
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbresFilesize
2KB
MD57ff6c2f0213e390150e71d159bce942b
SHA12eecb5076c280e0368df283f672f5e3e4db6aa63
SHA256a0d6ffb24e4576f93bc4ef06b36b2f46c10c81398122ca59c99cd8a553143e45
SHA512f597f44c4b3924cf32b4727d63d2719ba94c8679f2792669d0cd9b705837ff59863ad83eb8c4bb988ce1e0d055ab6227ee1342a0a17a1d9a5c27f211ec408049
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VLW1SL5J\bluelinkimagesgreatwithlionpicturewhichlooklikeverybeautifultoseetheadvantageoflionisbehavingattitudeallgreaterthe__anothergirltosee[1].docFilesize
37KB
MD5579ae7684b44059c6df7f843af04fd72
SHA1dd8a17517b4b1d0216bfe6c38e9e61745f4d221a
SHA2561a3b16582a25d3970441c462299bf550c85c7f4f5887392b1248dc3198584961
SHA512bcb3551e003988d111a0ca0626e89ea236be5f3c748496642b8c35df81e4d24ac983289f7698d0a1945ad628b2ef7e2809b792b6cd3ca04efd763b235efc4e7f
-
C:\Users\Admin\AppData\Local\Temp\TCD8F51.tmp\iso690.xslFilesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.datFilesize
229B
MD5a1fdcdba3e25566e891746d87c5ae32c
SHA100b2198c755fe3677699d54da7705c3e26cf1f5c
SHA25626444e1407d9f616cb61babcc2016b6b11ef07a12af9a003c50c42a06da415d1
SHA5122526874e1d66d9b30e1b03a3e308a632e97a665e6009671e3685e911c2d65e608cd547aca289ab0f667faea327cca56910c535ed248fb6e3242ff2b04dd3618c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-msFilesize
5KB
MD59005a6efac895075c6687ae4ae4dcf5c
SHA14ef60a7dfdc040a366dfef00a603dec6f6d74415
SHA256749a32a57287e20babd7fb2e1d879301f60cca890680fbc45918d771323eaaed
SHA512b352280a87ac31ff1c808f1062aa0312f292569c61b71916a82db7a91c5804557e1a5e77edc2169c4c27c68f752f60a64a321bcf776bb42a796a03721551d0fd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-msFilesize
3KB
MD5176ef9814fbe221dde09851ed1c32cbf
SHA1bd5ed360322f773ee365b804261ba1cbfdcbb6b5
SHA256a7eda92bbe6edef0e7185457f99cd7bc4c90e2814d578b8d4bda1c22c9c6e8a2
SHA512d75f7c70c12eb441e4e72d9eeac576d57127c5c2b0868bb024df52b5f4baf9161b7203dc74867af0656b49272c07d7aa7da73025cae0b89322c59eeb56778547
-
memory/2596-46-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/2596-582-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/2596-51-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/2596-50-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/2596-49-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/2596-48-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/2596-47-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/4632-10-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/4632-11-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/4632-19-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/4632-21-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/4632-20-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/4632-15-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/4632-17-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/4632-16-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/4632-14-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/4632-13-0x00007FF9DF7D0000-0x00007FF9DF7E0000-memory.dmpFilesize
64KB
-
memory/4632-12-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/4632-18-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/4632-0-0x00007FF9E1830000-0x00007FF9E1840000-memory.dmpFilesize
64KB
-
memory/4632-9-0x00007FF9DF7D0000-0x00007FF9DF7E0000-memory.dmpFilesize
64KB
-
memory/4632-8-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/4632-7-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/4632-6-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/4632-5-0x00007FFA2184D000-0x00007FFA2184E000-memory.dmpFilesize
4KB
-
memory/4632-4-0x00007FF9E1830000-0x00007FF9E1840000-memory.dmpFilesize
64KB
-
memory/4632-3-0x00007FF9E1830000-0x00007FF9E1840000-memory.dmpFilesize
64KB
-
memory/4632-1-0x00007FF9E1830000-0x00007FF9E1840000-memory.dmpFilesize
64KB
-
memory/4632-581-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmpFilesize
2.0MB
-
memory/4632-2-0x00007FF9E1830000-0x00007FF9E1840000-memory.dmpFilesize
64KB