Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
offertfrfrgan.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
offertfrfrgan.xls
Resource
win10v2004-20240704-en
General
-
Target
offertfrfrgan.xls
-
Size
250KB
-
MD5
a3cf9e49b576180f453b4195a4fda171
-
SHA1
172a2b533ed72156c4408af1494e0c0cc1972fba
-
SHA256
544fd96fa98b592051e4d150804bd7fd3562cc6b7ca4dd8d8c6f30c106350c62
-
SHA512
4b9937f2948bdde4e761cbedf7fa60d08dd7876f2af2fbbf517fc81eeb43999df7c2229ad4808a669f4c0ae0cca499b9a8f4a2a2ef06bec9bd1e3af637ec4ef8
-
SSDEEP
6144:Kuu1rzqdxZnkV6DYu78zmUC+qzVfSYWNxE13rC1OVysKll:KuuVzCZS6D/78zPCfFdUxEJ2U
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4048 EXCEL.EXE 3620 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 3620 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4048 EXCEL.EXE 4048 EXCEL.EXE 4048 EXCEL.EXE 4048 EXCEL.EXE 4048 EXCEL.EXE 4048 EXCEL.EXE 4048 EXCEL.EXE 4048 EXCEL.EXE 4048 EXCEL.EXE 4048 EXCEL.EXE 4048 EXCEL.EXE 4048 EXCEL.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3620 wrote to memory of 4908 3620 WINWORD.EXE 89 PID 3620 wrote to memory of 4908 3620 WINWORD.EXE 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\offertfrfrgan.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4048
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4908
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD51bfe0a81db078ea084ff82fe545176fe
SHA150b116f578bd272922fa8eae94f7b02fd3b88384
SHA2565ba8817f13eee00e75158bad93076ab474a068c6b52686579e0f728fda68499f
SHA51237c582f3f09f8d80529608c09041295d1644bcc9de6fb8c4669b05339b0dd870f9525abc5eed53ad06a94b51441275504bc943c336c5beb63b53460ba836ca8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5ef3502dd2a1ad1049afe6c2c09e1970b
SHA1f57a0f303313d8d634a6d1bae18050bac1cae5b0
SHA25631eb3223aabbbcd8808eef08e02229d8f5bc97ecb0cb8562cbb08c5ef39653f3
SHA512cc4fa2a08fbdb512f9a0d4b84b4b5f36df80941c6f71751790ce32b487c9dc0d15bb8ba09860651ff70ca13d8b1001d4f3fe7459889da2db5edd304f50d855e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5bcd0d59a81bbe7018b178bd82fecadb4
SHA1ac96f85e4238dc8f2c34794784116e99dd531934
SHA25652babd2928ad6eb319669185c7eed591df77e66ce325e006ca6c26ceb54ffb6c
SHA512a27a7785679b1ea345c3a81812157dd539fc5412e511ada16f07c01f58ec84c4b04a46f44000ec3b6abcb167674a73a9895bde19193f84cb12a9f9d805b647eb
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\F818EE0E-7DAA-4454-A8B7-4A35C36CFE9D
Filesize168KB
MD5855bc8562adec9b573fb1f937d410481
SHA1304380ae1537405ec022e55898d28fc4e4148092
SHA2569a80f7afd582f222f8f15c7644905b6c86e662f94115b3687ea94003f949d6ce
SHA512d86e45aa5d218ba833f3c03a966ee08b84693f8c4574b4f6ccf439f31dcf543f7ef5f0ab4f1b749a73e46447f964f4e86977cf4407b6ee9122d9bd444a466fee
-
Filesize
11KB
MD515252bca13bbcc2b0a45b7f9fa207e35
SHA13ee61c50b42e2fa437e4d0fabd1b89eb2defcda2
SHA2562c99e6558508a5c04e0575a7668916e61581f82c537d2da961b199939a70106b
SHA512b485ec691cc5761bb5310b2c0766b72aeaf20138a2e18841c5b7aa11ef24cf6d6eef02fd0ba9126835552a75f7f12ab93f658e5df31e8c2e9beab5b41bdf2949
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD50f1f15b19018163c1316de0b3f37b6ae
SHA16a3eda65b4bce4ace543588de64aaf26cfa78e23
SHA2562aacdf53d135f08991c8967c005c2245f6f608feff9401ee90682043239b1a67
SHA512e60efa95bf7cdd3167fa992c032a7623947c708c75e304a6eb9801442a92ddaedcf3e0dae77af37cce5bfc88c92d8c85d5e9e240c42d15e001d01a1a235182d9
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD5d51ec25db0eb70a846a303d2f138de1c
SHA1442457cc9f86e56e509644a0c28db11a9df6fc3c
SHA2562b32acdceec0ded0f2be876d648a6cf7f3ee73a9ad82b13fa43a3c0a659b7f57
SHA5127c66f59c434d30762b6a6534b8879cbde6738e82a840cdca8bbfd1c297c2518c61e62571e763541a603a9420e4371a9c0105f2b7beee7d36d71ab1a4c8d76d39
-
Filesize
114KB
MD58d234d694685ef558303f59db56e0056
SHA1c69487910ae2ed7752777906b7bf9070a5be4383
SHA2562d4338fca2036c2acf76079eb68168b183661c41129514e8f2cf4e615717fd40
SHA51205ceb80af49047569fd587d6696ff66b17cf0e0723975e753c25f6de5e1034982fe02f9cc39edb8336fa705e1d72073a3fc6daace1677568cc0579cbe98b70ac
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
215B
MD580dd7c06ddbfbc08cd5484f60a713f8e
SHA1b702b095cc74b95a2160a1609ba9d72e047ea38b
SHA256633e9c05a747d3814898802f885515b3ee5f7dce4a259931682f099043e54812
SHA51221e0b6ce20ca3bb0fe15a41f3958b467ec2d8e75e4a1802ed7dc1835351118dfe6ebc4c5133112df68236b2231589d08bc23ea06082681788d6cd981c2d43b33
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD51c95ad2f8201e2343da9e5f2a14fb169
SHA15fbb793351564d248a93c085e43f7ffb73891cfe
SHA25611b58fee045d12b6ebdeaf48e303abfe70335391ad5a51cf12a5c8c6a79432ae
SHA5120618b1e85198da8073e4bec7b8a2e67cf5b484b8e0e74fa233605b46505bd237273772952fb843661cc50b8ff3efc003c6db722a0bd2a37485863042e3b47bf6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD539ed12fd81d5f0fdf1b31b58fad2025d
SHA1594207d74024c0b6d6ddc8681ddc08defda52549
SHA2569daf707d5a098e58f1d3c5a3a0c2963e053662874dffa6b5e49609730bc3bbd3
SHA51206af1fc31166e4c49a53ddb9d1059219b89af915ec4519478ad503aeb3b09f75b6afbfe9bbd6c24442e12c5001327f11315ffba5f1bc03837ca1ff5f517edbc1