Analysis

  • max time kernel
    143s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2024 08:19

General

  • Target

    Orden2410188.xls

  • Size

    938KB

  • MD5

    39e2230ab8f6d983bee40367b44d0d99

  • SHA1

    92e81d6b42529bd3171b4541ea252fce6ba3c010

  • SHA256

    ed0b1f5749e23d2494de9cdeda7aca03c44690e22dfbd2f4b5f96baa73986406

  • SHA512

    2d9e2060a4251c50e3d32896d71025fc57c2e588d5cbd88ce0c9ba52287f4e40d4775f528958032f7323c3f02d3a0e9e39872e5427b5ed3e9dbbfcd8234ba90c

  • SSDEEP

    12288:UmzHJEjwWYSRD3DERnLRmF8Dl3PT7uZNPK+N4Uu/UbH0ilKLdcoCYd8Eojy1f9w:ncwHSRbARM8B3l+iv/UbUxLdwYLom1V

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Orden2410188.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Windows\System32\mshta.exe
      C:\Windows\System32\mshta.exe -Embedding
      2⤵
      • Process spawned unexpected child process
      PID:936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    3KB

    MD5

    e43003c99d4550a5b6c6f51686f671fb

    SHA1

    dbd784a74088b2fd64d59266022459b98e5443d5

    SHA256

    05252d94eca922d78f2804494f7a94a9ee2d81945b39c547792b9138e7f90ff9

    SHA512

    d77c8d071d558252797c50dd7ebb1c31cdb5a9e01819d9d2690d7f41186c8304f960945995a757d4838a4bbdd265409a74a210d9c816c1b6898be2840da8bff5

  • memory/936-36-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

    Filesize

    2.0MB

  • memory/936-44-0x00007FF76BD30000-0x00007FF76BD38000-memory.dmp

    Filesize

    32KB

  • memory/936-43-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

    Filesize

    2.0MB

  • memory/936-39-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

    Filesize

    2.0MB

  • memory/936-37-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-6-0x00007FFD31310000-0x00007FFD31320000-memory.dmp

    Filesize

    64KB

  • memory/2336-13-0x00007FFD2EBF0000-0x00007FFD2EC00000-memory.dmp

    Filesize

    64KB

  • memory/2336-8-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-9-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-10-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-11-0x00007FFD2EBF0000-0x00007FFD2EC00000-memory.dmp

    Filesize

    64KB

  • memory/2336-15-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-14-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-16-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-7-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-12-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-2-0x00007FFD31310000-0x00007FFD31320000-memory.dmp

    Filesize

    64KB

  • memory/2336-5-0x00007FFD31310000-0x00007FFD31320000-memory.dmp

    Filesize

    64KB

  • memory/2336-4-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-42-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-3-0x00007FFD7132D000-0x00007FFD7132E000-memory.dmp

    Filesize

    4KB

  • memory/2336-0-0x00007FFD31310000-0x00007FFD31320000-memory.dmp

    Filesize

    64KB

  • memory/2336-1-0x00007FFD31310000-0x00007FFD31320000-memory.dmp

    Filesize

    64KB