Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 07:40
Behavioral task
behavioral1
Sample
96a3b86629145f9cde890fa142e839c2.xlsm
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
96a3b86629145f9cde890fa142e839c2.xlsm
Resource
win10v2004-20231215-en
General
-
Target
96a3b86629145f9cde890fa142e839c2.xlsm
-
Size
248KB
-
MD5
96a3b86629145f9cde890fa142e839c2
-
SHA1
349ebab6eaa17ccf1495fffa7c4fed32d44045f8
-
SHA256
493473d97655707584a3999e69c02655d17811f9404ad06304da7c7c59014b73
-
SHA512
d8f048eb16dd765675d323138448abb8bbbcb8aaa9f73617fec991f063a5e14f55deb032a0336148ab4c526175a5f38bf3cb2ed69869a67f34fdcb445af1f2d0
-
SSDEEP
6144:SUtZbAPPimNA/kjoitkvJI5Lhvu9ZLgzBRDSI/qOMcMsAB:JtZbAPDNAcMfizaZ8zB1NMsK
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1576 3932 MSHTA.exe 25 -
Blocklisted process makes network request 2 IoCs
flow pid Process 32 1576 MSHTA.exe 33 1576 MSHTA.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3932 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3932 EXCEL.EXE 3932 EXCEL.EXE 3932 EXCEL.EXE 3932 EXCEL.EXE 3932 EXCEL.EXE 3932 EXCEL.EXE 3932 EXCEL.EXE 3932 EXCEL.EXE 3932 EXCEL.EXE 3932 EXCEL.EXE 3932 EXCEL.EXE 3932 EXCEL.EXE 3932 EXCEL.EXE 3932 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3932 wrote to memory of 1576 3932 EXCEL.EXE 90 PID 3932 wrote to memory of 1576 3932 EXCEL.EXE 90
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\96a3b86629145f9cde890fa142e839c2.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SYSTEM32\MSHTA.exeMSHTA C:\ProgramData\fPSXbsqe.sct2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
PID:1576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5a3b5d53610edc291fcb17a5d95958832
SHA14f9b2824c0d93e85a1faca70a16421815e152acc
SHA2567be2cca5203b43a51a4249db525db57013730da612ecc31b49e6c347f78b18a7
SHA512b0cfdaca3e8ae4b1846042e078f5a0d8b8c5118be246c8394d419ac5d1630430d92685c118caffa31a37b66abdc18b52915d5db134735ed93d0accc34c6be4ea