Analysis

  • max time kernel
    143s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/09/2024, 07:37

General

  • Target

    06623c47be31158c77417823a17e5e1c203068da959bbaaa64743420371e9a81.xls

  • Size

    209KB

  • MD5

    5b28aea68f6bcfd8336c85b3722e2a1a

  • SHA1

    823f8e5c8f994193202af76a22fd6e989f5b11cd

  • SHA256

    06623c47be31158c77417823a17e5e1c203068da959bbaaa64743420371e9a81

  • SHA512

    43b5476dc553a68c0be346bd4cb68b72e5974a971ffd0f4dfd46d3ee47cfca64b550da9596e6a1f485118dacd35cc25d579fb175fa044b9c022ccb9aa87d90e9

  • SSDEEP

    6144:xYh2x8eIzSrXvjNC0tc5J68eKZI8DQyfaWlBjhb:xTx8eIzSrtofU8DZd

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\06623c47be31158c77417823a17e5e1c203068da959bbaaa64743420371e9a81.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Windows\System32\mshta.exe
      C:\Windows\System32\mshta.exe -Embedding
      2⤵
      • Process spawned unexpected child process
      PID:5080

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

          Filesize

          2KB

          MD5

          fafc3ae6868429713226fe0ddd9df16f

          SHA1

          d2849a08c38358db0854be84b2e392cdf581a48a

          SHA256

          b3d26a1cb9fea023909b6a290b78d80740cac692e7f742ec1fb925418be94bac

          SHA512

          06b273b7ce8946fe07f69a62fa31d706d381d8bcef7e80217a1ac223571b6ca137bb43b5f768f6ce5a0c58baf78b81ba38cf3f63407f59e832c2cfb85cb6b70e

        • memory/5072-19-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5072-17-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5072-4-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

          Filesize

          64KB

        • memory/5072-7-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5072-8-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5072-10-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5072-12-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5072-13-0x00007FFF1EA50000-0x00007FFF1EA60000-memory.dmp

          Filesize

          64KB

        • memory/5072-11-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5072-2-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

          Filesize

          64KB

        • memory/5072-9-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5072-6-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5072-5-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

          Filesize

          64KB

        • memory/5072-15-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5072-14-0x00007FFF1EA50000-0x00007FFF1EA60000-memory.dmp

          Filesize

          64KB

        • memory/5072-20-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5072-21-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5072-1-0x00007FFF60ECD000-0x00007FFF60ECE000-memory.dmp

          Filesize

          4KB

        • memory/5072-3-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

          Filesize

          64KB

        • memory/5072-18-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5072-16-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5072-90-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5072-88-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

          Filesize

          64KB

        • memory/5072-89-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

          Filesize

          64KB

        • memory/5072-86-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

          Filesize

          64KB

        • memory/5072-87-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

          Filesize

          64KB

        • memory/5072-0-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

          Filesize

          64KB

        • memory/5072-50-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5072-51-0x00007FFF60ECD000-0x00007FFF60ECE000-memory.dmp

          Filesize

          4KB

        • memory/5072-52-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5080-53-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5080-54-0x00007FF6AE2D0000-0x00007FF6AE2D8000-memory.dmp

          Filesize

          32KB

        • memory/5080-48-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5080-47-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5080-46-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5080-44-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5080-45-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB

        • memory/5080-43-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

          Filesize

          2.0MB