Analysis
-
max time kernel
1045s -
max time network
943s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2024 20:56
Static task
static1
Behavioral task
behavioral1
Sample
Scan5437.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Scan5437.xls
Resource
win10v2004-20240802-en
General
-
Target
Scan5437.xls
-
Size
547KB
-
MD5
227d73b67aed2a5ad8a006579b72c14d
-
SHA1
a7737457a2dd79c9bfc86ea64d4b6182fc393666
-
SHA256
c1758d87a43a553070581905031b40f65af98067dfb0a865625634b7159dafc2
-
SHA512
cde6f17b8630d8bd389aadd902cd833ad4fc69055d0a299cd38630414e6e22a74135d78878811eed1b2703cdb01580f1c040dd2bab653843ce97894d5969f8bc
-
SSDEEP
12288:IZ1GWVjZScJbyWKEVuqg2/6VnDIh7xOP1fJYWe/egIY4Fg3lh:IbrjZsWKElYnvtfw/ed
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4196 728 mshta.exe 83 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 728 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 728 EXCEL.EXE 728 EXCEL.EXE 728 EXCEL.EXE 728 EXCEL.EXE 728 EXCEL.EXE 728 EXCEL.EXE 728 EXCEL.EXE 728 EXCEL.EXE 728 EXCEL.EXE 728 EXCEL.EXE 728 EXCEL.EXE 728 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 728 wrote to memory of 4196 728 EXCEL.EXE 92 PID 728 wrote to memory of 4196 728 EXCEL.EXE 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Scan5437.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\System32\mshta.exeC:\Windows\System32\mshta.exe -Embedding2⤵
- Process spawned unexpected child process
PID:4196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD50fded38e0dbe324c9fc7a36604f15dd0
SHA1d43408a72ae1afd5e034f1b769afb1b2b70f88ab
SHA256e505e18ea37365b80ca2365e8791a9052d5c016caa31d71a15bc1b5cfa1373ae
SHA512646e30061e36fcd25039f91f09d17c3c456597253aff41e5036e056e33ec7374a87d7ae7bf5b1a8e84c8bea4c13ee9753f7e775a5146c80cc10c93fa324ba06f