Analysis

  • max time kernel
    178s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-03-2023 23:34

General

  • Target

    SecuriteInfo.com.XF.AShadow.1205.10577.18568.xls

  • Size

    36KB

  • MD5

    cddadcb2f1e8be946577e547d4b2f511

  • SHA1

    f9db1e42a3a3e35076a371de508136ed167f6ee1

  • SHA256

    346566a4153a1a31a509ebec84a81e0b1659353771ef48801ae6b86afd895da3

  • SHA512

    aab17efba200cc5c75b986f2b71a9750a4ba7b9ec32a0fd6492e50bd3de9abafe9699190733ab3730950132ae3e7c89ad84e5b7876b2aa6452537dee75ba26aa

  • SSDEEP

    768:PPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJus2acPTost9H:nok3hbdlylKsgqopeJBWhZFGkE+cL2N3

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.XF.AShadow.1205.10577.18568.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Windows\explorer.exe
      explorer.exe C:\Users\Public\Documents\s5s3.vbs
      2⤵
      • Process spawned unexpected child process
      PID:4080
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\s5s3.vbs"
      2⤵
        PID:2088

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Public\Documents\s5s3.vbs
      Filesize

      564B

      MD5

      45957a3f1ac1b22bc42012af6f1d11bf

      SHA1

      618222ccc88d61c756eddfc6a1d88672b019127e

      SHA256

      ac80007ca28abfcc71a99df59b91112a5bb8ebac84d124d0b84394e7a1f0db84

      SHA512

      a3737487c31d6c775a7673f3a9768439c8c5c6f299c1186c8995340b84a1a126cdc9552bfe7620995ba74f32547152488ec739e053ca435862a8022f47bee3e8

    • memory/640-133-0x00007FF89F510000-0x00007FF89F520000-memory.dmp
      Filesize

      64KB

    • memory/640-135-0x00007FF89F510000-0x00007FF89F520000-memory.dmp
      Filesize

      64KB

    • memory/640-134-0x00007FF89F510000-0x00007FF89F520000-memory.dmp
      Filesize

      64KB

    • memory/640-136-0x00007FF89F510000-0x00007FF89F520000-memory.dmp
      Filesize

      64KB

    • memory/640-137-0x00007FF89F510000-0x00007FF89F520000-memory.dmp
      Filesize

      64KB

    • memory/640-138-0x00007FF89CBE0000-0x00007FF89CBF0000-memory.dmp
      Filesize

      64KB

    • memory/640-139-0x00007FF89CBE0000-0x00007FF89CBF0000-memory.dmp
      Filesize

      64KB