Analysis
-
max time kernel
76s -
max time network
113s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
06/06/2024, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
Orden de compra.xls
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Orden de compra.xls
Resource
win10v2004-20240426-en
General
-
Target
Orden de compra.xls
-
Size
398KB
-
MD5
feadbeab04cafce5ef327b3c712019b7
-
SHA1
fb0ad6fb394d7098b176fcf72f4bf392010ec2d9
-
SHA256
71533a30ee9f92a67081b457464ec85564d0b6b1bf38004091305ca3ee70ab75
-
SHA512
cacd9712b56ee21d16c19e9e09f4c8108bc14ab561f215060a2210cb7dcaf80e6fbb418bb0658ac755521bea868a9d0d7f74a5a51e8da2dec8ea793b5f02ba45
-
SSDEEP
12288:9qFzu4LjCgPGp3m5JmKGcBE/7xjjijt4lOhiN/Xne:azu4LjvCI4VzF2jlhyve
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 596 EXCEL.EXE 560 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 560 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 596 EXCEL.EXE 596 EXCEL.EXE 596 EXCEL.EXE 596 EXCEL.EXE 596 EXCEL.EXE 596 EXCEL.EXE 596 EXCEL.EXE 596 EXCEL.EXE 560 WINWORD.EXE 560 WINWORD.EXE 560 WINWORD.EXE 560 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 560 wrote to memory of 1560 560 WINWORD.EXE 78 PID 560 wrote to memory of 1560 560 WINWORD.EXE 78
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Orden de compra.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:596
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5bd8ab302c2a4f71ae273d638a185fc5e
SHA1518f300d427a642ad45dacec31e75bb6570439fe
SHA256bc8d69eef1cf73c1b2900dfa80bb9aae47c428bfbad4f901fef599717be5f98b
SHA5125645af08e5dbf5933455cb4ea38924db39dc3a4ea9be768bbe3076eba2075ccaf1223b395efa150d5496cc615ba708bbfac31ccfbe5c07be6f2fad03cb01a986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD555bca5e2037bc781ea8a1e2149d864b8
SHA1009402eb20075002965e6b5e8930183dc7355ee4
SHA256ca372187b9746721f0c9bc088c138c0c31bc384d379c610173813c992c1533d4
SHA512bcd215a716e48963123eb87f6a84421f0590b45d57c4c809dced4b1c9e77b5171be5350439ff60434cb3bd5fe71de5ffb6654bbae3585ed8ca1e963360ce58e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD506439552ef0cd0d4d78a7b41e11171ee
SHA1b878063a10fc79efbfda5b311567879113d1ec3c
SHA25647ea5d9c98da0c1f73e292c0b8efb7e4aee8d0d51f471356bfd9205d676f2604
SHA512b48f866389ce3b58d61fdb2784a34e73ae5247f707ba52dbe4eda173c37583783f70e0186734246ddf7310acc725b9bdbb2661401841d4eaf947aa3188c4e437
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\7B41EEB1-DC22-427D-A890-290891A3B327
Filesize161KB
MD5bebd8dba29dffe629811acf66258c6b8
SHA1ba6c79397178847e7124939b6c5bdaf0a0090d7a
SHA2568eb2ee91fb00efe1ff46aab1f7e2cfe022f110abd2b62a71914407839903cd3f
SHA5127f8382c63d20c5dd40e8ac79d30ef693eeccd87a9eb0b1846fdd1d6f0139a76a53517c8d5acbdc9b9972ae9096f09e627a201cd80acd48f50d0d349a1bccecee
-
Filesize
21KB
MD5b338569fa7cffb6bb2d7ce663d8fc590
SHA14d5f4eb243fd6f373b42b80b9d8c9be65c8052da
SHA256b85f0b3c527267d5d40c77779660fa76c1ef113f32dc70ba58b4368b2413785b
SHA51290facac916258c95a35ec5ce3d50db1cb3b3b085235b697281341ab9e0ed07f96bc6783d9ff01062eac1cfc1e874f7736c331ba6d038cd7b2e9168f66c44593b
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\74a0ad00a184813f0b8867eb2f8dfef7227a18a4.tbres
Filesize2KB
MD5f0bc257d86d50edb0f7ca2d8427060c1
SHA1646f2a1dc8e6ad4e4404b4a240fa82948dadc8f2
SHA25674e0936300dd27abe1e621d25c92d4a8d91fe537669e9c8b4e162bc713e06267
SHA512de3fd7001158b7631c5f1914799eb1625cfa03138ed057c5e5e2f26ad94ba2c540a5b1311da70b8395d7c4dc066d89dbd0b07cbef18cddee1302f60622dade71
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7GTPFJEK\lionnsisthekingmakerofthejungletounderstandhowlongthetruthgoingtobehideiamtransferingentirepowertolion__heistrulyakingofthejungle[1].doc
Filesize43KB
MD520d369963aa62c1085bc7282c111c410
SHA14520e4bae9d15af480c4347abbee95b255fcdd6b
SHA256dd31b9a658a0172da4b5a76b5529e5b0c96dd6949cca7fee2f44c4e3039fccef
SHA51279bd60bd35f06e955797658ec3cf3d78c74ec25e7fb19120e1e88b019d1041028671e0a2c1038157ed64d1d58253ec316450c2208d0a8801bd32ad11670e5e73
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
229B
MD5833e7b970627444f7e9861d1b73f0554
SHA19c757b1bfc2b688443924835e33599dc46fd9d3a
SHA256833be5e9de7c2411285f2dd89940d68a6c840099db0bcfe466ae1cda364192a7
SHA5126a1908290bcadd6528819e9d8a41ef209ed5a9063a31baa3f878a912dd900df91eee90d1fb097462c1d0c8f63607e5eecb048beaf18ce1e9cc412b17f6b44457
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5f73422bc0b3d6498570561c6d279ee9a
SHA12fef06bfb16201d692a32eec2581b6080f83e7fd
SHA256202ecdee508d09c8c5fe104663d9d8b842a90f7ea0d5d5fc0bf3a6737a26fd39
SHA512c2b88b227d1dd40ab2bd556e0bafb29d86a56f49bca8761b0728f1c306967a0c64ab3201c2fa53097cb9a658170e68735b660759cea94ed14aa8a8e83eac16b4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize5KB
MD5bd90f0e5d3afe9d96524ee581eedf6be
SHA1d7adc8374731163a893c325dea2e4b900ff2ba7d
SHA2564ddd9fe3239a21be29207d9f8fa1d641158907c3611f03221a5d1de83c44b697
SHA51287920a98a41a9598be4304b4a42e0f4eb358ae1cd73a9f736d83f2f2a3741a8beffb55b72eebcdacd345fb83d7186b372ab1f6a91033c015dd15f82934a7939f