Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 16:43
Behavioral task
behavioral1
Sample
74ff7e7adc7c3926e45143fe7ee1ba07.xls
Resource
win7-20231215-en
General
-
Target
74ff7e7adc7c3926e45143fe7ee1ba07.xls
-
Size
36KB
-
MD5
74ff7e7adc7c3926e45143fe7ee1ba07
-
SHA1
04f0cc8f411db9545e825ce05218ea91b00c48ba
-
SHA256
dd869415613ab9aea2599927c23572bcefd9466af5a69f8f6ab239dc2f6c84bb
-
SHA512
f56de18c85d60649b10fa3c444713a049faa9ab6e99162fe357cd6ffae17e0e8b550b5b57fae889ca3059a94299fc7a27ae3b2e415f291c691eb4a90842ea69a
-
SSDEEP
768:APqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJnGbm5+LlQqKqTD:Mok3hbdlylKsgqopeJBWhZFGkE+cL2Nr
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
explorer.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3372 1564 explorer.exe EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1564 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
EXCEL.EXEpid process 1564 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
EXCEL.EXEpid process 1564 EXCEL.EXE 1564 EXCEL.EXE 1564 EXCEL.EXE 1564 EXCEL.EXE 1564 EXCEL.EXE 1564 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
EXCEL.EXEexplorer.exedescription pid process target process PID 1564 wrote to memory of 3372 1564 EXCEL.EXE explorer.exe PID 1564 wrote to memory of 3372 1564 EXCEL.EXE explorer.exe PID 5064 wrote to memory of 4956 5064 explorer.exe WScript.exe PID 5064 wrote to memory of 4956 5064 explorer.exe WScript.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\74ff7e7adc7c3926e45143fe7ee1ba07.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\explorer.exeexplorer.exe C:\Users\Public\Documents\BRxTLnc.vbs2⤵
- Process spawned unexpected child process
PID:3372
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\BRxTLnc.vbs"2⤵PID:4956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553B
MD56be146c0e044d61af5ca64a56b59c2f6
SHA1b308cfcd77e68c37a1e3c5ecffeb30821edbaa37
SHA2566bcbe5ade82a1f4e29ffa55db55fe1710bccc4aa6eb5628b36461fac0c04aa4d
SHA512be7d386cbc47cc0f7bba74040812ab2a9c7ffd32a9918b167dd2b621fe4c9386418d9254dcbe65c200c189141b936de299e08e089a12716494527e0dab62a824