Analysis

  • max time kernel
    144s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2024 19:32

General

  • Target

    TT12822024.xls

  • Size

    640KB

  • MD5

    3e23db29ce7cdc215bac52c531aed525

  • SHA1

    57286b0272df8386254ba0fbe340f0fba2cafbc8

  • SHA256

    2fc21f78d38708b2fd7d776780305ae303ec4277e41241462d4cf3f94a779d29

  • SHA512

    0dfe34dcf345a6d501ad6d20758b212f7c13af5181330fcdbad3598a748b155c811438bde78220efd26aa73ffe6273c639fea7d04ed2b7d32f1a58da43195843

  • SSDEEP

    12288:ECf1SLuA5XvOZWQNb7/Aiy/vyEzrFdIiC1smRaAVpwnzI613rQdq:zMxxvXQ5/ny/v9r4PKqczI6NMd

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\TT12822024.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Windows\System32\mshta.exe
      C:\Windows\System32\mshta.exe -Embedding
      2⤵
      • Process spawned unexpected child process
      PID:4536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    991aab24bed86f67b2621fbcc405bb63

    SHA1

    484314d3094f3b3cf4175ecc6a6550649e88e0e2

    SHA256

    4370cd8455e2ef81d96d976c75f88a34da7c3ed72d34b6adeb3e423c94170795

    SHA512

    1c2822d51fe6290e6fb4614f2c2563e78ebc45a894138e74a64532ae4c8d86c7de635534657b89644f288c16bcaaf44c6f5fc8f2e89188d17e8cba2437f3ba57

  • memory/2916-8-0x00007FFD090F0000-0x00007FFD09100000-memory.dmp

    Filesize

    64KB

  • memory/2916-10-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB

  • memory/2916-0-0x00007FFD090F0000-0x00007FFD09100000-memory.dmp

    Filesize

    64KB

  • memory/2916-7-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB

  • memory/2916-12-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB

  • memory/2916-13-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB

  • memory/2916-15-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB

  • memory/2916-14-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB

  • memory/2916-16-0x00007FFD06D40000-0x00007FFD06D50000-memory.dmp

    Filesize

    64KB

  • memory/2916-11-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB

  • memory/2916-17-0x00007FFD06D40000-0x00007FFD06D50000-memory.dmp

    Filesize

    64KB

  • memory/2916-45-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB

  • memory/2916-2-0x00007FFD090F0000-0x00007FFD09100000-memory.dmp

    Filesize

    64KB

  • memory/2916-1-0x00007FFD4910D000-0x00007FFD4910E000-memory.dmp

    Filesize

    4KB

  • memory/2916-9-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB

  • memory/2916-5-0x00007FFD090F0000-0x00007FFD09100000-memory.dmp

    Filesize

    64KB

  • memory/2916-4-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB

  • memory/2916-3-0x00007FFD090F0000-0x00007FFD09100000-memory.dmp

    Filesize

    64KB

  • memory/2916-6-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB

  • memory/2916-47-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB

  • memory/2916-46-0x00007FFD4910D000-0x00007FFD4910E000-memory.dmp

    Filesize

    4KB

  • memory/4536-51-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB

  • memory/4536-43-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB

  • memory/4536-42-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB

  • memory/4536-41-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB

  • memory/4536-35-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB

  • memory/4536-52-0x00007FF6FB290000-0x00007FF6FB298000-memory.dmp

    Filesize

    32KB

  • memory/4536-39-0x00007FFD49070000-0x00007FFD49265000-memory.dmp

    Filesize

    2.0MB