Analysis

  • max time kernel
    4s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 13:31

General

  • Target

    381b94ee4daaa6f09c8defa848e4d0b6.xlsm

  • Size

    228KB

  • MD5

    381b94ee4daaa6f09c8defa848e4d0b6

  • SHA1

    dddbbec057c38165457a5f55864ff0a69b0c41e3

  • SHA256

    03b3c34ac41dc48e0deeb97fdb2727b30e203a0fa8c40fa40ce3d9edfb9b3a6e

  • SHA512

    33ef6d70286d6458d6ce5e4b3d05564133e693a2823efc37e5e9b81b63a73e3aef6f44abca2ba569fe4766accb71ac04424ae8e7b557e6837b5af9f0c8fb1644

  • SSDEEP

    6144:PogkLjLh7aAO9PxrKf5EJkaPDxyb0ddIRN/mI+0y:QDLZ75O9PpCWkEDUb60/4

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\381b94ee4daaa6f09c8defa848e4d0b6.xlsm"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1268
    • C:\Windows\SYSTEM32\MSHTA.exe
      MSHTA C:\ProgramData\LjyiqKlNCXBE.sct
      2⤵
      • Process spawned unexpected child process
      PID:2712

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\LjyiqKlNCXBE.sct

          Filesize

          25KB

          MD5

          3cd034085ebf798efa53a5575d4fd2c7

          SHA1

          07c4fb3d1b1acbcb081d6b4f808b0ef7525f89ca

          SHA256

          77a7f5795f1a41fcd525556041e0ff7c9217430e20900c5b279067ce24c44900

          SHA512

          15dfc7b236b8c73b7eeaef8d9e24ab3c78c064eb8c827ec7d3252254ce4fafa607bdc3e672851a37ec69730cd1f0364760da6ead5078c7cdb14a28cba2203d9e

        • memory/1268-18-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-8-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-9-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-10-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-12-0x00007FFAAA0E0000-0x00007FFAAA0F0000-memory.dmp

          Filesize

          64KB

        • memory/1268-14-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-16-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-1-0x00007FFAAC9F0000-0x00007FFAACA00000-memory.dmp

          Filesize

          64KB

        • memory/1268-17-0x00007FFAAA0E0000-0x00007FFAAA0F0000-memory.dmp

          Filesize

          64KB

        • memory/1268-19-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-15-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-20-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-13-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-22-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-23-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-21-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-4-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-7-0x00007FFAAC9F0000-0x00007FFAACA00000-memory.dmp

          Filesize

          64KB

        • memory/1268-11-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-6-0x00007FFAAC9F0000-0x00007FFAACA00000-memory.dmp

          Filesize

          64KB

        • memory/1268-5-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-3-0x00007FFAAC9F0000-0x00007FFAACA00000-memory.dmp

          Filesize

          64KB

        • memory/1268-2-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-0-0x00007FFAAC9F0000-0x00007FFAACA00000-memory.dmp

          Filesize

          64KB

        • memory/1268-48-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-49-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-70-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-71-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-72-0x00007FFAEC970000-0x00007FFAECB65000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-69-0x00007FFAAC9F0000-0x00007FFAACA00000-memory.dmp

          Filesize

          64KB

        • memory/1268-68-0x00007FFAAC9F0000-0x00007FFAACA00000-memory.dmp

          Filesize

          64KB

        • memory/1268-67-0x00007FFAAC9F0000-0x00007FFAACA00000-memory.dmp

          Filesize

          64KB

        • memory/1268-66-0x00007FFAAC9F0000-0x00007FFAACA00000-memory.dmp

          Filesize

          64KB