Analysis

  • max time kernel
    143s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2024 11:24

General

  • Target

    TT12822024.xls

  • Size

    640KB

  • MD5

    3e23db29ce7cdc215bac52c531aed525

  • SHA1

    57286b0272df8386254ba0fbe340f0fba2cafbc8

  • SHA256

    2fc21f78d38708b2fd7d776780305ae303ec4277e41241462d4cf3f94a779d29

  • SHA512

    0dfe34dcf345a6d501ad6d20758b212f7c13af5181330fcdbad3598a748b155c811438bde78220efd26aa73ffe6273c639fea7d04ed2b7d32f1a58da43195843

  • SSDEEP

    12288:ECf1SLuA5XvOZWQNb7/Aiy/vyEzrFdIiC1smRaAVpwnzI613rQdq:zMxxvXQ5/ny/v9r4PKqczI6NMd

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\TT12822024.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\System32\mshta.exe
      C:\Windows\System32\mshta.exe -Embedding
      2⤵
      • Process spawned unexpected child process
      PID:3492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    b616ad430352b016cd8c8d85963a9dde

    SHA1

    4cb7478d7ce02f61f631f620aa23c8eb304fe21f

    SHA256

    a62ac88db2618330f47c7343f038d0021550cd37ff25364e541296932b4a90e4

    SHA512

    6bc2185fa1315935d57f47f576039708833d6a85f56af0c3740bbb3d72fac0bbec29f99e152363eb52128c325bbad4be12400d8c39c613b913c156d77aeeb109

  • memory/3056-13-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-5-0x00007FFE58610000-0x00007FFE58620000-memory.dmp

    Filesize

    64KB

  • memory/3056-18-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-0-0x00007FFE58610000-0x00007FFE58620000-memory.dmp

    Filesize

    64KB

  • memory/3056-4-0x00007FFE58610000-0x00007FFE58620000-memory.dmp

    Filesize

    64KB

  • memory/3056-9-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-12-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-11-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-15-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-16-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-17-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-14-0x00007FFE55D40000-0x00007FFE55D50000-memory.dmp

    Filesize

    64KB

  • memory/3056-21-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-22-0x00007FFE55D40000-0x00007FFE55D50000-memory.dmp

    Filesize

    64KB

  • memory/3056-20-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-19-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-2-0x00007FFE58610000-0x00007FFE58620000-memory.dmp

    Filesize

    64KB

  • memory/3056-10-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-1-0x00007FFE58610000-0x00007FFE58620000-memory.dmp

    Filesize

    64KB

  • memory/3056-8-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-7-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-6-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-91-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-89-0x00007FFE58610000-0x00007FFE58620000-memory.dmp

    Filesize

    64KB

  • memory/3056-90-0x00007FFE58610000-0x00007FFE58620000-memory.dmp

    Filesize

    64KB

  • memory/3056-87-0x00007FFE58610000-0x00007FFE58620000-memory.dmp

    Filesize

    64KB

  • memory/3056-88-0x00007FFE58610000-0x00007FFE58620000-memory.dmp

    Filesize

    64KB

  • memory/3056-50-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-3-0x00007FFE9862D000-0x00007FFE9862E000-memory.dmp

    Filesize

    4KB

  • memory/3492-55-0x00007FF6F2FD0000-0x00007FF6F2FD8000-memory.dmp

    Filesize

    32KB

  • memory/3492-54-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3492-44-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3492-45-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3492-48-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3492-47-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB

  • memory/3492-46-0x00007FFE98590000-0x00007FFE98785000-memory.dmp

    Filesize

    2.0MB