Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 09:56
Behavioral task
behavioral1
Sample
8edad5ba6901c7953229753e56f458fb.xls
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8edad5ba6901c7953229753e56f458fb.xls
Resource
win10v2004-20231215-en
General
-
Target
8edad5ba6901c7953229753e56f458fb.xls
-
Size
36KB
-
MD5
8edad5ba6901c7953229753e56f458fb
-
SHA1
7c4675a6e8c8ebadbc33a0871d4e0454a90706b8
-
SHA256
ea682315bd046be806b1cba6217c2423cf6cecf0f77572ecf9b1d25e7005941e
-
SHA512
d5b401b40c12e2962882c65099b9c02b8c83f14013a0a4bf6937cfbab992e0675270d9ab3e69976806ab7273a72fbc8c3a756de9381c394e12938ea0638c73e1
-
SSDEEP
768:lPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJvtXKrblkdjZ3Z9:Nok3hbdlylKsgqopeJBWhZFGkE+cL2NQ
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 952 4412 explorer.exe 59 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4412 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4412 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4412 EXCEL.EXE 4412 EXCEL.EXE 4412 EXCEL.EXE 4412 EXCEL.EXE 4412 EXCEL.EXE 4412 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4412 wrote to memory of 952 4412 EXCEL.EXE 89 PID 4412 wrote to memory of 952 4412 EXCEL.EXE 89 PID 1240 wrote to memory of 4520 1240 explorer.exe 91 PID 1240 wrote to memory of 4520 1240 explorer.exe 91
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\8edad5ba6901c7953229753e56f458fb.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\explorer.exeexplorer.exe C:\Users\Public\Documents\drW.vbs2⤵
- Process spawned unexpected child process
PID:952
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\drW.vbs"2⤵PID:4520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
595B
MD535d9ebda2d2c8006ebc1d3c77535f93b
SHA146cfc7909f2cb0c058adbc3457b10a03edc8df6c
SHA2561761bc7bb3d4ca8f8407615267dff020f4e534b867499587b4692c883283296c
SHA51267707d9f5147ec884d23c2ff056dd42dc436e97e9d0845825f5c36b474036921445a0706d9099b8fcd191866b010d9649daae3d00adf360bb4cbf1fea6d72f9b