Analysis
-
max time kernel
25s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 14:43
Behavioral task
behavioral1
Sample
3a2a493445f99b7dcaca0d0e7c0d9291.xls
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3a2a493445f99b7dcaca0d0e7c0d9291.xls
Resource
win10v2004-20231215-en
General
-
Target
3a2a493445f99b7dcaca0d0e7c0d9291.xls
-
Size
35KB
-
MD5
3a2a493445f99b7dcaca0d0e7c0d9291
-
SHA1
1ff1f21f7dc4a01d9796687b405782e766c587bb
-
SHA256
7866226257cf566903342b2bf987e8a3f0f6f9c0c7c5951b4feaf74e5821e042
-
SHA512
cfbf54525e203e66c2bc51ac00c5c140226723bc93b6c85590208dc684e2542434de860895986d2879999fd7f59ef53aecd194b25ff190a4913d2e327a102ade
-
SSDEEP
768:TPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJX2edkc5MkZEUF:Lok3hbdlylKsgqopeJBWhZFGkE+cL2Nq
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4976 2136 explorer.exe 15 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2136 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3a2a493445f99b7dcaca0d0e7c0d9291.xls"1⤵
- Suspicious use of SetWindowsHookEx
PID:2136 -
C:\Windows\explorer.exeexplorer.exe C:\Users\Public\Documents\HKXUlsy7.vbs2⤵
- Process spawned unexpected child process
PID:4976
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:992
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\HKXUlsy7.vbs"2⤵PID:1912
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
606B
MD51854ac625fbe4881ab4174267048d082
SHA18722dc1b33941121107fce4f5c4e8564dd7d30db
SHA256d6ee30dd5e034717740b16c7f5128674e5cf413e8057487e2c7d156a511892f9
SHA51247aff508af3836cee6a6ecb190b3671a71cd40678b54f1f5e9212ac8c103948a64301c3a97aaeada11f08f5b6d7f4e438771e465b0bf26a604f3bf49782e50ed