Analysis
-
max time kernel
296s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2024 05:43
Behavioral task
behavioral1
Sample
24102024_0543_24102024_Po docs.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
24102024_0543_24102024_Po docs.xls
Resource
win10v2004-20241007-en
General
-
Target
24102024_0543_24102024_Po docs.xls
-
Size
98KB
-
MD5
ad791e87a785989bf5dc066db100e652
-
SHA1
dabe7215a329944fd262906aae16b9c9ec689c0e
-
SHA256
26daad7f2b88dfa67240b07b416d9261909f0398e17e8a62e29a8e324d49d94d
-
SHA512
c07fab2453f8efbb4c37a5b53e2f29574c770d07b4ba3ead5b07b2365c8214863f273474091fe54bdafcd024fa236ab4c97e32bd8bbb68f75378247b27d62ab3
-
SSDEEP
1536:NiqHy1S6F8b2SQrEkawpoXIoAD4qBYs8N3Ff6iugVOUYoFMz7C9Rvrp2CU:3eFHrE2sIo8LQt6yTMvIrp
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4136 4544 mshta.exe 83 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4544 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4544 wrote to memory of 4136 4544 EXCEL.EXE 93 PID 4544 wrote to memory of 4136 4544 EXCEL.EXE 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\24102024_0543_24102024_Po docs.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\System32\mshta.exeC:\Windows\System32\mshta.exe -Embedding2⤵
- Process spawned unexpected child process
PID:4136
-