Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2024 14:53
Static task
static1
Behavioral task
behavioral1
Sample
Moto Parts Specifications 10000pcs.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Moto Parts Specifications 10000pcs.xls
Resource
win10v2004-20240508-en
General
-
Target
Moto Parts Specifications 10000pcs.xls
-
Size
280KB
-
MD5
8c5389452b99db45d0950da9e78f979c
-
SHA1
037c5e32e127136e230392048e2a45bc68fd9aef
-
SHA256
261a3d632d4b42abe4ff190b7c39feaeabc7405c790f2b7c25de0678f77ff4a3
-
SHA512
d7b6c1f864bdc7fbc67dbcacb26c5186bbc44c4448d7de7253616b81e48227dbea0b9eb9fb3947d7851e48a429f1c188aaccde67e4b9f3110c280dd7989c6d0e
-
SSDEEP
6144:NqFzL5LIT47HuES6/dvL0DS6n9oOfpRKf/saZ/V/6:NqFzu4LFXvoGY7Kf/5/
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3712 EXCEL.EXE 1828 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 1828 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 3712 EXCEL.EXE 3712 EXCEL.EXE 3712 EXCEL.EXE 3712 EXCEL.EXE 3712 EXCEL.EXE 3712 EXCEL.EXE 3712 EXCEL.EXE 3712 EXCEL.EXE 3712 EXCEL.EXE 3712 EXCEL.EXE 3712 EXCEL.EXE 3712 EXCEL.EXE 1828 WINWORD.EXE 1828 WINWORD.EXE 1828 WINWORD.EXE 1828 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1828 wrote to memory of 4396 1828 WINWORD.EXE 99 PID 1828 wrote to memory of 4396 1828 WINWORD.EXE 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Moto Parts Specifications 10000pcs.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3712
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4396
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04
Filesize471B
MD5be0f80225826889a820e84d22d8b3438
SHA17dfdd3ad6d5149b1e6a0f1aec907b947a1248087
SHA25613b3a9d744988146e7c4d4cd27c4b2cce75495fc39cb90d8df16ff80438ce1e1
SHA5126124217bb9f9e793da57f74ad7f852d2552b0f6ae1448a710b4356db2359798540f4b25506300307c48be3b1f2ad3b65bc8776072a028ed6aeb5cbea22785975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04
Filesize412B
MD5ca6c9e232f1d4c3fef25a106ef6304e4
SHA157676997ef244e4de54e816daa560b319b3d42f9
SHA256cf6faec1fe52a03130573e5632df60db48ae1f42a1774d708ef7b584fa3a93ec
SHA5121ac55545e427cd53bbe955c4b69d9fcfe030527dddd3620ccacfe9269214e5c957fc139081a55e9e807e15f87909220acc9af36a4d3dac31e94e34d6a4382290
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\B9EABF8F-EE42-4B29-842F-FB88248AC3F0
Filesize161KB
MD59642a4fa237510127a1c9608693f1b08
SHA183058677b6c29dacb763de4486a37f06e91befbe
SHA256f335dc729c2dbe968d3af17536ffe5a06ec3bf4d974822a97fdfdde2f4d2c053
SHA512281736581725f56a9b44a6bbc67a1b13d6e07c789a4f9454be0bb4f4169be49a00c47ac758a5765385432100dbad79b7896860935e2cdac1f9acea6c3207ac8f
-
Filesize
21KB
MD51cd949ba5bc6867e0fd6f6c9e17c808a
SHA15fd9f0b7f6a6f256f8a754ba4ead507bf8040cd7
SHA256654674002dfb5eb282071c6fc8572f0b5a1839790cfbad7614656f7b6ee50d4a
SHA512cf9af4405e26e7f2a13f5228e8e301a391eab897a823718a0d89141b1a38f4707450e6bd1c166752f3472b4bd897512d5b9b3600f527d958feea1b66b6b14536
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD51451ce42a37d0afe2b8e11568839e771
SHA1986f559c1e20018fa8839b12e6ddc4e4f9941d29
SHA25694cbbdbe53a939f35aae1b9cfcf2d2e72606390587ebddea8f7cf6a98f4998ce
SHA5122daedd02bde8c3e8b992a54d9f9b1bc560970f9bcfadab1850ddc464bbede74975f443d109e4d18f305626ce2cfe2f26ea887b78cfbdd9d606272216ce83feb4
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD5f7d035ffaac4e12754ec8527cfd58705
SHA1e20d38bc948f052a422cbdba60da367941c8a6e9
SHA25616fdb4b1511b9a928a3cec3097523c9d7da269d613ee6df01688a31da7215792
SHA51293f1071818a66c79f324291dcf0f860df107c9dce64dde53e3f9cd6c99d029ebbc2a85df23465999a4b07edf52efa01ebcd1a8ec5a0ee53dc19e6016e9678cc2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2IX84YPE\lionsarekingogthejunglewhorulestheentireforestandlionsgreattounderstandtheyaregreattoundersetandlionsarekindofthejungle__lionsarekingofjungle[1].doc
Filesize35KB
MD556b4ddf6c247124f9bc633b06b169a84
SHA1f6d0dfca950ccd1fcb92ed511afba92db7edc843
SHA25667ad0f57895b9963fff217941c49d4eb97023d65fd5b3d36ab936c24fa35a6f0
SHA5126b9e14c704e944b576091f0339e874ed679eeb6d2eba55bb65826fa66d7cb0856d20e1a99cb3cb40599b1065586a138aacf64617490c1c7a237e67ed61b980a3
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
234B
MD50cba7429226b7a0d1f9d7389c8a677fc
SHA19a47fa78a8e95c9d039e032993502b2df237be7e
SHA25644f21abc623d9f390bd3b2efece3625beeb3da3fcaa0b4e42763d55167d0bca8
SHA512d3a60bea6d85e50c762b3229b137b7132e24c0c9ec0d69036d4b22426441034871cbd1a11a02888873a82700f130b74a4f255a6bf1668adf76cf541baba4a2a7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize5KB
MD555128b804ef47e30af025124c07d4a78
SHA1339b13e828586952ec99a70b2e66ca66d3e2da4b
SHA256cbfd6fa8d079569aa0c43f12ba9dad1edcf28d9e448ab2b66172d14cdf9e6c82
SHA512a53854d5491dc123e0a19edd8adfe28cec5c8b37df0d986af7f8ff7b0054f74a229bd6718bd9a0c7f451e52f7bbb4dd5d31116572b1388d36852453a22afbbd1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD555634edf163ac426d1a13bc0c364fdcb
SHA1e7591f78229fcb91cc4b48d865c9e425a37c7cd4
SHA256bbd114c294cad8999068eb500b2ac3ae5a7eae27111c321520d564276dba099a
SHA5125ce291b9fbbb664cff96f9690364e5b27af493463405cc5268d05add74b49657a7679fd623504c12b05e47341c54c74883e2ab74d6e7ffa9c6f53a153c4ab44c