Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 18:23
Static task
static1
Behavioral task
behavioral1
Sample
09092024125309092024TWSPO331120240909003.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09092024125309092024TWSPO331120240909003.xls
Resource
win10v2004-20240802-en
General
-
Target
09092024125309092024TWSPO331120240909003.xls
-
Size
185KB
-
MD5
f9ab1d7b74030338276597360d1f1fe9
-
SHA1
08dd4159d3e19c3f1140f07300d80ef64f1d75ef
-
SHA256
34a9da84adcef6ef3408b20bbdedfab6b961640ef765dbe1cb86cb3c48daa173
-
SHA512
65093248fb4adb398b926cac06b02960377974bc7cc4cba68e8f444efb48df69b16197535331ec5b047c78236f4f987d830ee4aeec44fadcad38b73ce7aed669
-
SSDEEP
3072:uXINL0+hGvRHDfiQZUZN32/VcgQ0RIsjO2z+NP0qJHuMmOboPywH:u4Z0LJHDSZNrD0esK2ajJSOyB
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2836 1696 mshta.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1696 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2836 1696 EXCEL.EXE 91 PID 1696 wrote to memory of 2836 1696 EXCEL.EXE 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\09092024125309092024TWSPO331120240909003.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\System32\mshta.exeC:\Windows\System32\mshta.exe -Embedding2⤵
- Process spawned unexpected child process
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD574f9625e3eb03dbb69dab1618d028622
SHA1741f30c0888b61c0cea25c0e3ce9d6229c2d5206
SHA2565c7ae1dafce51ae6cbb988aa8edadac0c41c7579eb15f4c50f93129a25ddb485
SHA5128875d719bdd1dfb7ff5d9435bc5389754e3a1b2f9ce4747eb058825c6aab4d9da0b411f2e5f2e1c936a2c2adebbacefd02bd2911d747e3d6417ac0e7721a566d