Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 05:58
Static task
static1
Behavioral task
behavioral1
Sample
Pedido de GmbH.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Pedido de GmbH.xls
Resource
win10v2004-20240802-en
General
-
Target
Pedido de GmbH.xls
-
Size
706KB
-
MD5
7cf3baf28b4c40a5e747ff8b89f001d7
-
SHA1
17ce4f2d4d833ff744335b635b7a37be7ef32f6f
-
SHA256
e72bf4cc80fc4cd1b1924851e85b45b06c20de1d7490947a01197bca64036e4c
-
SHA512
fdde12d17b5d3881ea98df4da3dcd82108c4b988ed134b920d49bad393fece0242f5e9181f86ee8b24beb526b7a46ca7a837808e30f8705456fd2a7a6f317789
-
SSDEEP
12288:m+UOAsHFnd7HeT/o8gg8Rsfe8fB7RY/KKCjCdAT2bbBme+I0u+ssDsh6PG:mepsAbg8R8BNGKtUAT2/YjssDs4P
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3784 2436 mshta.exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2436 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2436 wrote to memory of 3784 2436 EXCEL.EXE 86 PID 2436 wrote to memory of 3784 2436 EXCEL.EXE 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Pedido de GmbH.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\System32\mshta.exeC:\Windows\System32\mshta.exe -Embedding2⤵
- Process spawned unexpected child process
PID:3784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD591845584bb644a2b744b52bd8e9c617c
SHA10f7f622dafe63d7746d34caa953b55921d608bd3
SHA256ae833bc77686caccda751682873fcc03b817bf2bf0be744608677d08263baed6
SHA5124d5a43dca2d2f5aed9836f80937919446a737d0213e225aed438113b5bbabd46a0cb0b6178966d5b532886bb8d379decea0fc27c881a35b1cdb6afd3b910c32a