Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 08:19
Static task
static1
Behavioral task
behavioral1
Sample
Orden2410188.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Orden2410188.xls
Resource
win10v2004-20240802-en
General
-
Target
Orden2410188.xls
-
Size
938KB
-
MD5
39e2230ab8f6d983bee40367b44d0d99
-
SHA1
92e81d6b42529bd3171b4541ea252fce6ba3c010
-
SHA256
ed0b1f5749e23d2494de9cdeda7aca03c44690e22dfbd2f4b5f96baa73986406
-
SHA512
2d9e2060a4251c50e3d32896d71025fc57c2e588d5cbd88ce0c9ba52287f4e40d4775f528958032f7323c3f02d3a0e9e39872e5427b5ed3e9dbbfcd8234ba90c
-
SSDEEP
12288:UmzHJEjwWYSRD3DERnLRmF8Dl3PT7uZNPK+N4Uu/UbH0ilKLdcoCYd8Eojy1f9w:ncwHSRbARM8B3l+iv/UbUxLdwYLom1V
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 936 2336 mshta.exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2336 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2336 wrote to memory of 936 2336 EXCEL.EXE 86 PID 2336 wrote to memory of 936 2336 EXCEL.EXE 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Orden2410188.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\System32\mshta.exeC:\Windows\System32\mshta.exe -Embedding2⤵
- Process spawned unexpected child process
PID:936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5e43003c99d4550a5b6c6f51686f671fb
SHA1dbd784a74088b2fd64d59266022459b98e5443d5
SHA25605252d94eca922d78f2804494f7a94a9ee2d81945b39c547792b9138e7f90ff9
SHA512d77c8d071d558252797c50dd7ebb1c31cdb5a9e01819d9d2690d7f41186c8304f960945995a757d4838a4bbdd265409a74a210d9c816c1b6898be2840da8bff5