Resubmissions

21/04/2024, 08:44

240421-knlkksfc74 1

21/04/2024, 08:36

240421-khmkpafb44 5

Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 08:44

General

  • Target

    Gantt_Excel_Pro_Daily_Free_ani.xlsm

  • Size

    768KB

  • MD5

    871d2d4088f0b1278f189994cd57b962

  • SHA1

    5100c823db17ffc9b922160b752ef4425c8a26b7

  • SHA256

    ebe0dcf3e771fd15e3860b953a0abc464b6bfc31baac0fbfcb0e5ed6bf5a3371

  • SHA512

    654b7308cb2991da2d8d9edf2f191ea236d23736c5fe0aa330f4e28ce54512f51b508a52de46b79ca90fc8e934251c43d37f674d618cfe805a725309b532b0e3

  • SSDEEP

    24576:VYcHbO471bCo/oQE8axvwjgwxh5BNdQH5JL:+Y1mey8Oig2rpQHT

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Gantt_Excel_Pro_Daily_Free_ani.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3512
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1168
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:3156

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3512-0-0x00007FFF6E4B0000-0x00007FFF6E4C0000-memory.dmp

        Filesize

        64KB

      • memory/3512-1-0x00007FFFAE430000-0x00007FFFAE625000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-2-0x00007FFF6E4B0000-0x00007FFF6E4C0000-memory.dmp

        Filesize

        64KB

      • memory/3512-4-0x00007FFF6E4B0000-0x00007FFF6E4C0000-memory.dmp

        Filesize

        64KB

      • memory/3512-3-0x00007FFFAE430000-0x00007FFFAE625000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-5-0x00007FFFAE430000-0x00007FFFAE625000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-7-0x00007FFFAE430000-0x00007FFFAE625000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-8-0x00007FFF6E4B0000-0x00007FFF6E4C0000-memory.dmp

        Filesize

        64KB

      • memory/3512-6-0x00007FFF6E4B0000-0x00007FFF6E4C0000-memory.dmp

        Filesize

        64KB

      • memory/3512-9-0x00007FFFAE430000-0x00007FFFAE625000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-10-0x00007FFFAE430000-0x00007FFFAE625000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-11-0x00007FFF6BE80000-0x00007FFF6BE90000-memory.dmp

        Filesize

        64KB

      • memory/3512-12-0x00007FFFAE430000-0x00007FFFAE625000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-13-0x00007FFFAE430000-0x00007FFFAE625000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-14-0x00007FFF6BE80000-0x00007FFF6BE90000-memory.dmp

        Filesize

        64KB

      • memory/3512-16-0x00007FFFAE430000-0x00007FFFAE625000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-15-0x00007FFFAE430000-0x00007FFFAE625000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-17-0x00007FFFAE430000-0x00007FFFAE625000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-18-0x00007FFFAE430000-0x00007FFFAE625000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-19-0x00007FFFAE430000-0x00007FFFAE625000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-20-0x00007FFFAE430000-0x00007FFFAE625000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-22-0x000001B593200000-0x000001B593400000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-48-0x000001B599910000-0x000001B59A8E0000-memory.dmp

        Filesize

        15.8MB

      • memory/3512-266-0x000001B58DB40000-0x000001B58DF40000-memory.dmp

        Filesize

        4.0MB

      • memory/3512-556-0x00007FFFAE430000-0x00007FFFAE625000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-557-0x00007FFFAE430000-0x00007FFFAE625000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-558-0x000001B593200000-0x000001B593400000-memory.dmp

        Filesize

        2.0MB

      • memory/3512-559-0x000001B599910000-0x000001B59A8E0000-memory.dmp

        Filesize

        15.8MB

      • memory/3512-560-0x000001B58DB40000-0x000001B58DF40000-memory.dmp

        Filesize

        4.0MB