Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 08:40
Behavioral task
behavioral1
Sample
672d6e97bfb84a7e63fcc1283e4b505f.xls
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
672d6e97bfb84a7e63fcc1283e4b505f.xls
Resource
win10v2004-20231222-en
General
-
Target
672d6e97bfb84a7e63fcc1283e4b505f.xls
-
Size
36KB
-
MD5
672d6e97bfb84a7e63fcc1283e4b505f
-
SHA1
08238eb48884b146af90b8afe8f6f871f927cb16
-
SHA256
adb9ba27ef2d3392323890dc4d09d5ff510d9b5dc2c0220c0bfafb464a709392
-
SHA512
2ed67c2c8ef53dc47f5b2ec2cc03c37199f5d95f9bbdacee219d946f24a1d942fc87e3d12d30111ef9af40e4a3573755e77bbcc8e89e30c5debcdc1a860da5b8
-
SSDEEP
768:FPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJf+q477S+41qjz/qFe:tok3hbdlylKsgqopeJBWhZFGkE+cL2NN
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3808 1788 explorer.exe 17 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1788 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1788 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1788 EXCEL.EXE 1788 EXCEL.EXE 1788 EXCEL.EXE 1788 EXCEL.EXE 1788 EXCEL.EXE 1788 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1788 wrote to memory of 3808 1788 EXCEL.EXE 63 PID 1788 wrote to memory of 3808 1788 EXCEL.EXE 63 PID 5064 wrote to memory of 5060 5064 explorer.exe 67 PID 5064 wrote to memory of 5060 5064 explorer.exe 67
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\672d6e97bfb84a7e63fcc1283e4b505f.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\explorer.exeexplorer.exe C:\Users\Public\Documents\OSxhL.vbs2⤵
- Process spawned unexpected child process
PID:3808
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\OSxhL.vbs"2⤵PID:5060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
602B
MD555e8e39c157da3e1cfea6c3ee9549d60
SHA1dd1a0684032d11110a272fefe323def4e609e5e9
SHA256e22ee8073fe376fa07b3a690b0b34ffc1b2d725ec36c5905596121009cd31799
SHA5124c2ec1e18f711dad11c1bdfc6b0139c56f6e7bbe20825514392ff0a4f366af26b22ef16ccd37e293b1c7057349861f7c0d7daed4e54509266a25ea8f36da34a1