Analysis
-
max time kernel
1063s -
max time network
1150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:15
Behavioral task
behavioral1
Sample
Website_Redesign_Project.xls
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Website_Redesign_Project.xls
Resource
win11-20240802-en
General
-
Target
Website_Redesign_Project.xls
-
Size
92KB
-
MD5
8da737e5f973809a7ae6ddc039777635
-
SHA1
5d11137d7ee9cd56f2b97732fb95f1c60290ddf6
-
SHA256
ae077a49b9c64042bfec4c08c90696191ebf0cde63b8a2fb8a470ebe73427ced
-
SHA512
e089b0e9cf4e05536713f22b33b54c2e92e73fd5bf6bfc87623b394bf1584170ab3065aaa3b0b31d826e0ab783d0ad110c8f7fb1223331a345c785c0d79bc457
-
SSDEEP
1536:QcKoSsxz1PDZL2Qiw+4868O8K/5Le1k3hOdsylKlgxopeiBNhZFGzE+cL2kdAlIj:QcKoSsxzNDZL2Qiw+4868O8K/5Le1k34
Malware Config
Signatures
-
Blocklisted process makes network request 12 IoCs
flow pid Process 12 1248 msiexec.exe 59 1248 msiexec.exe 68 1248 msiexec.exe 70 1248 msiexec.exe 71 1248 msiexec.exe 72 1248 msiexec.exe 73 1248 msiexec.exe 74 1248 msiexec.exe 75 1248 msiexec.exe 76 1248 msiexec.exe 77 1248 msiexec.exe 81 1248 msiexec.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3820 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3820 EXCEL.EXE Token: SeIncreaseQuotaPrivilege 3820 EXCEL.EXE Token: SeSecurityPrivilege 1248 msiexec.exe Token: SeCreateTokenPrivilege 3820 EXCEL.EXE Token: SeAssignPrimaryTokenPrivilege 3820 EXCEL.EXE Token: SeLockMemoryPrivilege 3820 EXCEL.EXE Token: SeIncreaseQuotaPrivilege 3820 EXCEL.EXE Token: SeMachineAccountPrivilege 3820 EXCEL.EXE Token: SeTcbPrivilege 3820 EXCEL.EXE Token: SeSecurityPrivilege 3820 EXCEL.EXE Token: SeTakeOwnershipPrivilege 3820 EXCEL.EXE Token: SeLoadDriverPrivilege 3820 EXCEL.EXE Token: SeSystemProfilePrivilege 3820 EXCEL.EXE Token: SeSystemtimePrivilege 3820 EXCEL.EXE Token: SeProfSingleProcessPrivilege 3820 EXCEL.EXE Token: SeIncBasePriorityPrivilege 3820 EXCEL.EXE Token: SeCreatePagefilePrivilege 3820 EXCEL.EXE Token: SeCreatePermanentPrivilege 3820 EXCEL.EXE Token: SeBackupPrivilege 3820 EXCEL.EXE Token: SeRestorePrivilege 3820 EXCEL.EXE Token: SeShutdownPrivilege 3820 EXCEL.EXE Token: SeDebugPrivilege 3820 EXCEL.EXE Token: SeAuditPrivilege 3820 EXCEL.EXE Token: SeSystemEnvironmentPrivilege 3820 EXCEL.EXE Token: SeChangeNotifyPrivilege 3820 EXCEL.EXE Token: SeRemoteShutdownPrivilege 3820 EXCEL.EXE Token: SeUndockPrivilege 3820 EXCEL.EXE Token: SeSyncAgentPrivilege 3820 EXCEL.EXE Token: SeEnableDelegationPrivilege 3820 EXCEL.EXE Token: SeManageVolumePrivilege 3820 EXCEL.EXE Token: SeImpersonatePrivilege 3820 EXCEL.EXE Token: SeCreateGlobalPrivilege 3820 EXCEL.EXE Token: SeShutdownPrivilege 3820 EXCEL.EXE Token: SeIncreaseQuotaPrivilege 3820 EXCEL.EXE Token: SeCreateTokenPrivilege 3820 EXCEL.EXE Token: SeAssignPrimaryTokenPrivilege 3820 EXCEL.EXE Token: SeLockMemoryPrivilege 3820 EXCEL.EXE Token: SeIncreaseQuotaPrivilege 3820 EXCEL.EXE Token: SeMachineAccountPrivilege 3820 EXCEL.EXE Token: SeTcbPrivilege 3820 EXCEL.EXE Token: SeSecurityPrivilege 3820 EXCEL.EXE Token: SeTakeOwnershipPrivilege 3820 EXCEL.EXE Token: SeLoadDriverPrivilege 3820 EXCEL.EXE Token: SeSystemProfilePrivilege 3820 EXCEL.EXE Token: SeSystemtimePrivilege 3820 EXCEL.EXE Token: SeProfSingleProcessPrivilege 3820 EXCEL.EXE Token: SeIncBasePriorityPrivilege 3820 EXCEL.EXE Token: SeCreatePagefilePrivilege 3820 EXCEL.EXE Token: SeCreatePermanentPrivilege 3820 EXCEL.EXE Token: SeBackupPrivilege 3820 EXCEL.EXE Token: SeRestorePrivilege 3820 EXCEL.EXE Token: SeShutdownPrivilege 3820 EXCEL.EXE Token: SeDebugPrivilege 3820 EXCEL.EXE Token: SeAuditPrivilege 3820 EXCEL.EXE Token: SeSystemEnvironmentPrivilege 3820 EXCEL.EXE Token: SeChangeNotifyPrivilege 3820 EXCEL.EXE Token: SeRemoteShutdownPrivilege 3820 EXCEL.EXE Token: SeUndockPrivilege 3820 EXCEL.EXE Token: SeSyncAgentPrivilege 3820 EXCEL.EXE Token: SeEnableDelegationPrivilege 3820 EXCEL.EXE Token: SeManageVolumePrivilege 3820 EXCEL.EXE Token: SeImpersonatePrivilege 3820 EXCEL.EXE Token: SeCreateGlobalPrivilege 3820 EXCEL.EXE Token: SeShutdownPrivilege 3820 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Website_Redesign_Project.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3820
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize671B
MD5cbc7d00fa7e5d53c04cd08021d275fe4
SHA1c1d3dc877dffcda240b48a782abe28d8f8e1e98c
SHA256b2a8edef81a768bac46bf751f71b33f950eeb08b5e400b5b76909503f56fb3f6
SHA512c4d9b367467ac480f7d48762e4148b6b5a96f7c3a4234901c4b1ecc4b119ac21c1f38b1a5d4940245fdb5b69fb319da54f23361cd02ef04afb32ebb23ae6ab1a