Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
Athnaton_ANP00224_Specification.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Athnaton_ANP00224_Specification.xls
Resource
win10v2004-20240802-en
General
-
Target
Athnaton_ANP00224_Specification.xls
-
Size
939KB
-
MD5
15d90d6aa9eb2c890494884bdaff2e91
-
SHA1
d55134055fb68cab73e32d6ed70d936399484a3d
-
SHA256
d472c895106cfebcb6eea8701416aed96b9770c256432ee7ee7a9b8a60a6d254
-
SHA512
a4f10b41f37be48b3ddf83e6c0d133cd8ae8655c4a8fac3235be0dc961c5bf2e3e80d6b924b446ba44a07b7bbdbf99d87b308637332bbb050b4c51c25dab5c8e
-
SSDEEP
12288:xmzHJEjwWYSqD3DERnLRmF8Dl3PTKuG44G24rBedMPQr6eyCQSEB9:gcwHSqbARM8B3ugedV7Q
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2468 3160 mshta.exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3160 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3160 EXCEL.EXE 3160 EXCEL.EXE 3160 EXCEL.EXE 3160 EXCEL.EXE 3160 EXCEL.EXE 3160 EXCEL.EXE 3160 EXCEL.EXE 3160 EXCEL.EXE 3160 EXCEL.EXE 3160 EXCEL.EXE 3160 EXCEL.EXE 3160 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3160 wrote to memory of 2468 3160 EXCEL.EXE 85 PID 3160 wrote to memory of 2468 3160 EXCEL.EXE 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Athnaton_ANP00224_Specification.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\System32\mshta.exeC:\Windows\System32\mshta.exe -Embedding2⤵
- Process spawned unexpected child process
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD592b0a86c120bd98e7b8c569e02eddf6e
SHA1161ab316b98da4abb40ba211d3bc98c474b6f97c
SHA256925eb275b2281fa1a65b032b93ea217ea2b127b88db0afc70b1a9c74a280596a
SHA51299bd33c28ed76212c56f9cfe368e1331b5335dbffb58462fac18a8209dc1ad1d8e6dd035419e8be72bc5a9c74c42e27861cac15ee3641855cae44cda367572ec