Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2024 12:27
Behavioral task
behavioral1
Sample
ce0f34a451afcd323c0d54e8487e0a47.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ce0f34a451afcd323c0d54e8487e0a47.xls
Resource
win10v2004-20240226-en
General
-
Target
ce0f34a451afcd323c0d54e8487e0a47.xls
-
Size
36KB
-
MD5
ce0f34a451afcd323c0d54e8487e0a47
-
SHA1
c77da7d93fa82a4d4e60174c4c6f280b2a2fcfb1
-
SHA256
4462ef15c4f1a56056467efde11effada3c20c593a9a389cef993f3531937e9f
-
SHA512
b6aee8f0c8c4a034931bac9d362c753e2f44d6baa15bcc9869550fef70772070ee0f67c49fee3ed0face398de63e3cfcb80e6d3b92efd1672b0a597265b42df7
-
SSDEEP
768:VPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJv6MRWZxX8teR2FjBSs:dok3hbdlylKsgqopeJBWhZFGkE+cL2Ng
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3844 2036 explorer.exe 88 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2036 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2036 EXCEL.EXE 2036 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2036 EXCEL.EXE 2036 EXCEL.EXE 2036 EXCEL.EXE 2036 EXCEL.EXE 2036 EXCEL.EXE 2036 EXCEL.EXE 2036 EXCEL.EXE 2036 EXCEL.EXE 2036 EXCEL.EXE 2036 EXCEL.EXE 2036 EXCEL.EXE 2036 EXCEL.EXE 2036 EXCEL.EXE 2036 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 3844 2036 EXCEL.EXE 93 PID 2036 wrote to memory of 3844 2036 EXCEL.EXE 93 PID 3952 wrote to memory of 4008 3952 explorer.exe 95 PID 3952 wrote to memory of 4008 3952 explorer.exe 95
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ce0f34a451afcd323c0d54e8487e0a47.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\explorer.exeexplorer.exe C:\Users\Public\Documents\fuSeNcs.vbs2⤵
- Process spawned unexpected child process
PID:3844
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\fuSeNcs.vbs"2⤵PID:4008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549B
MD5b228fbaf72ae54d24fd7d19033485463
SHA139bc0285458fa452fc4c3622f6904ab7919fbea2
SHA256faee8000a52dd79e559b0716d7a8a6c3ca41ba2a09628cc8eed437875edb9b92
SHA51209115469a527ed7b69e3c9b5a2f8978e611e501e9ca8dfd651684f8cde6e10bb9e7cbf99cae3a7b99dbdbf5a0576590c0edaaf87437df0c0a3cc6f89967e974e