Analysis
-
max time kernel
164s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 20:22
Behavioral task
behavioral1
Sample
e243762ffcb82d6453466201aba5b7b7.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e243762ffcb82d6453466201aba5b7b7.xls
Resource
win10v2004-20240226-en
General
-
Target
e243762ffcb82d6453466201aba5b7b7.xls
-
Size
36KB
-
MD5
e243762ffcb82d6453466201aba5b7b7
-
SHA1
059eaf64ab28158bedca6014335a9e2ab74e5bd8
-
SHA256
c3ef9596c5bc29733922c5c75bd0a553eaea2373ee010b82b707a115bec4ccdc
-
SHA512
e50f0287335e22b3e358be09515e33c320e8c4c94b73462215778ee7861d53abf92a924ef05fbbff1a69be4306c480f40adea47052be0775e33cc2f46ee0a545
-
SSDEEP
768:oPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJYE6v/ipC3TNII0TY8:Eok3hbdlylKsgqopeJBWhZFGkE+cL2Ns
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3076 1644 explorer.exe 84 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1644 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1644 EXCEL.EXE 1644 EXCEL.EXE 1644 EXCEL.EXE 1644 EXCEL.EXE 1644 EXCEL.EXE 1644 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 3076 1644 EXCEL.EXE 92 PID 1644 wrote to memory of 3076 1644 EXCEL.EXE 92 PID 760 wrote to memory of 4084 760 explorer.exe 94 PID 760 wrote to memory of 4084 760 explorer.exe 94
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e243762ffcb82d6453466201aba5b7b7.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\explorer.exeexplorer.exe C:\Users\Public\Documents\QuC9ON.vbs2⤵
- Process spawned unexpected child process
PID:3076
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\QuC9ON.vbs"2⤵PID:4084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
572B
MD50f9408e8862027ee591e77c460646a44
SHA1fa0246cb3cc606a480fed35aac5035b399f1a3b3
SHA256314ce923802a5d738f36203304593029358e48a342aaed17360c5671d7b82e56
SHA51293050e636d0ef517ff275465e2b45a62d47d79a13847b992d1ed5dcecb9f48a6a62d189ebb9a4733960ffc28c7f9eacedaabffa9080f2fe2b9d2ad76bbb9fd67