Resubmissions

29/08/2024, 14:12

240829-rhtsbswarc 10

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 14:12

General

  • Target

    Swift Payment.xls

  • Size

    537KB

  • MD5

    3ddbb73564bd5da178d353887cb82cf1

  • SHA1

    9e7cfbac422ef392dff72228be57a86f37eed26a

  • SHA256

    eaf3b9c1bdaf72da0a5d2a1a8c4f128712463c558e8af23830126bf07ef63847

  • SHA512

    c4cc01cc620b8f5cf457221679760f5a36e32cf1d2fa42f3a30bac8949bd152ab0097e2ce02da70111533b0b21c43a71200aba97362c0270623a56a2b1d44d0e

  • SSDEEP

    12288:pNsZ4UeZzxvJLrl0jHUxIbuKlt70AFg7JzXAZo+r:s2xxJIUgL0AGkb

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Swift Payment.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\System32\mshta.exe
      C:\Windows\System32\mshta.exe -Embedding
      2⤵
      • Process spawned unexpected child process
      PID:972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    1b306dd9f3f47d2ce7ee410ccf2de568

    SHA1

    11406807cc231635dc166bf0b007c3d626103125

    SHA256

    c6546978d3810ba46cd19a1d96ec849b6199a0c02b6105f8f34364f38621a2c9

    SHA512

    372a538ad283e1fab8d863d61857a6c435578e24fdab7b115d149baf27808262177ae083d3e4b999db567b86243579f5043054cc520c7dfe68414c976a7e5f2a

  • memory/972-41-0x00007FFBD42D0000-0x00007FFBD44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/972-51-0x00007FF7B29C0000-0x00007FF7B29C8000-memory.dmp

    Filesize

    32KB

  • memory/972-50-0x00007FFBD42D0000-0x00007FFBD44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/972-43-0x00007FFBD42D0000-0x00007FFBD44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1640-16-0x00007FFBD42D0000-0x00007FFBD44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1640-18-0x00007FFB91AA0000-0x00007FFB91AB0000-memory.dmp

    Filesize

    64KB

  • memory/1640-5-0x00007FFB94350000-0x00007FFB94360000-memory.dmp

    Filesize

    64KB

  • memory/1640-9-0x00007FFBD42D0000-0x00007FFBD44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1640-11-0x00007FFBD42D0000-0x00007FFBD44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1640-10-0x00007FFBD42D0000-0x00007FFBD44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1640-8-0x00007FFBD42D0000-0x00007FFBD44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1640-13-0x00007FFBD42D0000-0x00007FFBD44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1640-15-0x00007FFBD42D0000-0x00007FFBD44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1640-0-0x00007FFBD436D000-0x00007FFBD436E000-memory.dmp

    Filesize

    4KB

  • memory/1640-17-0x00007FFB91AA0000-0x00007FFB91AB0000-memory.dmp

    Filesize

    64KB

  • memory/1640-14-0x00007FFBD42D0000-0x00007FFBD44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1640-12-0x00007FFBD42D0000-0x00007FFBD44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1640-7-0x00007FFBD42D0000-0x00007FFBD44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1640-6-0x00007FFB94350000-0x00007FFB94360000-memory.dmp

    Filesize

    64KB

  • memory/1640-4-0x00007FFBD42D0000-0x00007FFBD44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1640-45-0x00007FFBD436D000-0x00007FFBD436E000-memory.dmp

    Filesize

    4KB

  • memory/1640-46-0x00007FFBD42D0000-0x00007FFBD44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1640-2-0x00007FFB94350000-0x00007FFB94360000-memory.dmp

    Filesize

    64KB

  • memory/1640-3-0x00007FFB94350000-0x00007FFB94360000-memory.dmp

    Filesize

    64KB

  • memory/1640-1-0x00007FFB94350000-0x00007FFB94360000-memory.dmp

    Filesize

    64KB

  • memory/1640-83-0x00007FFB94350000-0x00007FFB94360000-memory.dmp

    Filesize

    64KB

  • memory/1640-86-0x00007FFB94350000-0x00007FFB94360000-memory.dmp

    Filesize

    64KB

  • memory/1640-85-0x00007FFB94350000-0x00007FFB94360000-memory.dmp

    Filesize

    64KB

  • memory/1640-84-0x00007FFB94350000-0x00007FFB94360000-memory.dmp

    Filesize

    64KB

  • memory/1640-87-0x00007FFBD42D0000-0x00007FFBD44C5000-memory.dmp

    Filesize

    2.0MB