Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2024, 01:34

General

  • Target

    ba2fb4155e5de91a3180e71f7535757d.xls

  • Size

    110KB

  • MD5

    ba2fb4155e5de91a3180e71f7535757d

  • SHA1

    cde3bc2e199e02f19c551b3084f7674122c9ef19

  • SHA256

    36baae4e17d6c7c294f543016ff2167ef2d2801f5990bf67e6ce54ebfb24a0e8

  • SHA512

    64fc89b7fff597527903865c5e108a09e0032deb3b1c30535bceb7a030c443361093668a574fdda2faa772fe7cd4f9ffa376e73a3bcc324aec86ad9d2034f426

  • SSDEEP

    1536:0hhhnshmKyDj0zn4YhDLS1NYJF5IZ952wxlsiiquOXxidjFs2jcc0lbxOqTgZZxP:zvFZu2jcc0lbxOK+c9JtXwei

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • Deletes itself 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ba2fb4155e5de91a3180e71f7535757d.xls"
    1⤵
    • Deletes itself
    • Enumerates connected drives
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:3804
      • C:\Windows\system32\attrib.exe
        attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
        3⤵
        • Views/modifies file attributes
        PID:3348
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:3244
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:3496

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\ba2fb4155e5de91a3180e71f7535757d.xls

          Filesize

          150KB

          MD5

          67fbb2b7aaf6de8ed79e2fbbb9b8c295

          SHA1

          57c1a9f0fdd1d414b14c6fda6a0cc1a294e60303

          SHA256

          2ff2ac6aea9971a151565164194739e26957fe9095294ced7d76934ef0a54046

          SHA512

          af8965a925e7d05e601a6bdf4d74eeb07bb79bf264f597a8a77a1d1589e64cca2613cb69d29fe689898280e0189604c3c6b3f51d1ab48a5b1b11207727b05965

        • memory/4812-1-0x00007FFF31A10000-0x00007FFF31A20000-memory.dmp

          Filesize

          64KB

        • memory/4812-0-0x00007FFF31A10000-0x00007FFF31A20000-memory.dmp

          Filesize

          64KB

        • memory/4812-3-0x00007FFF31A10000-0x00007FFF31A20000-memory.dmp

          Filesize

          64KB

        • memory/4812-2-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-4-0x00007FFF31A10000-0x00007FFF31A20000-memory.dmp

          Filesize

          64KB

        • memory/4812-5-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-6-0x00007FFF31A10000-0x00007FFF31A20000-memory.dmp

          Filesize

          64KB

        • memory/4812-7-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-8-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-9-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-10-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-12-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-11-0x00007FFF2F490000-0x00007FFF2F4A0000-memory.dmp

          Filesize

          64KB

        • memory/4812-14-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-13-0x00007FFF2F490000-0x00007FFF2F4A0000-memory.dmp

          Filesize

          64KB

        • memory/4812-15-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-16-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-17-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-18-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-20-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-21-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-22-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-23-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-19-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-30-0x000001D34B5B0000-0x000001D34BDB0000-memory.dmp

          Filesize

          8.0MB

        • memory/4812-39-0x000001D34A090000-0x000001D34A490000-memory.dmp

          Filesize

          4.0MB

        • memory/4812-42-0x000001D34B5B0000-0x000001D34BDB0000-memory.dmp

          Filesize

          8.0MB

        • memory/4812-45-0x000001D350250000-0x000001D351220000-memory.dmp

          Filesize

          15.8MB

        • memory/4812-49-0x000001D350250000-0x000001D351220000-memory.dmp

          Filesize

          15.8MB

        • memory/4812-54-0x000001D350250000-0x000001D351220000-memory.dmp

          Filesize

          15.8MB

        • memory/4812-55-0x000001D350250000-0x000001D351220000-memory.dmp

          Filesize

          15.8MB

        • memory/4812-57-0x000001D350250000-0x000001D351220000-memory.dmp

          Filesize

          15.8MB

        • memory/4812-65-0x000001D34B5B0000-0x000001D34BDB0000-memory.dmp

          Filesize

          8.0MB

        • memory/4812-72-0x000001D350250000-0x000001D351220000-memory.dmp

          Filesize

          15.8MB

        • memory/4812-109-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-110-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-114-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB

        • memory/4812-115-0x000001D34B5B0000-0x000001D34BDB0000-memory.dmp

          Filesize

          8.0MB

        • memory/4812-116-0x000001D34B5B0000-0x000001D34BDB0000-memory.dmp

          Filesize

          8.0MB

        • memory/4812-119-0x000001D34A090000-0x000001D34A490000-memory.dmp

          Filesize

          4.0MB

        • memory/4812-120-0x000001D350250000-0x000001D351220000-memory.dmp

          Filesize

          15.8MB

        • memory/4812-121-0x000001D350250000-0x000001D351220000-memory.dmp

          Filesize

          15.8MB

        • memory/4812-122-0x000001D350250000-0x000001D351220000-memory.dmp

          Filesize

          15.8MB

        • memory/4812-123-0x000001D350250000-0x000001D351220000-memory.dmp

          Filesize

          15.8MB

        • memory/4812-124-0x000001D350250000-0x000001D351220000-memory.dmp

          Filesize

          15.8MB

        • memory/4812-125-0x000001D34B5B0000-0x000001D34BDB0000-memory.dmp

          Filesize

          8.0MB

        • memory/4812-126-0x000001D350250000-0x000001D351220000-memory.dmp

          Filesize

          15.8MB

        • memory/4812-145-0x00007FFF31A10000-0x00007FFF31A20000-memory.dmp

          Filesize

          64KB

        • memory/4812-144-0x00007FFF31A10000-0x00007FFF31A20000-memory.dmp

          Filesize

          64KB

        • memory/4812-143-0x00007FFF31A10000-0x00007FFF31A20000-memory.dmp

          Filesize

          64KB

        • memory/4812-142-0x00007FFF31A10000-0x00007FFF31A20000-memory.dmp

          Filesize

          64KB

        • memory/4812-146-0x00007FFF71990000-0x00007FFF71B85000-memory.dmp

          Filesize

          2.0MB