Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-10-2024 09:55

General

  • Target

    Shipping Documents WMLREF115900.xls

  • Size

    98KB

  • MD5

    98502d8342f1afd8b699b26ff777a919

  • SHA1

    0d0c6a6f90611fee9c232d90fca0776dbbff5241

  • SHA256

    40bcfababa169393524d58a9447ea465ac7a18edd09ae9eaea2739c8d77dab9d

  • SHA512

    0d1e03166c7dc08098acaeace97930fdc7bfa5b50932bbb6ee151691202389f1d7d053c2d0b0a6248ecfa7a6056bd16a0ad2a61e91a6f03d292d7ace1d5e7e86

  • SSDEEP

    1536:MiqHy1S6F8b2SQrEkawpoXIow7yLHXXRD6G10u9QvuTUpx2MjeHmfDI7:UeFHrE2sIoeK3XR2GWumv6UprT

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Shipping Documents WMLREF115900.xls"
    1⤵
    • System Network Configuration Discovery: Internet Connection Discovery
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\Windows\System32\mshta.exe
      C:\Windows\System32\mshta.exe -Embedding
      2⤵
      • Process spawned unexpected child process
      PID:1660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    9dcfbc200273312fbe01e39fa2896536

    SHA1

    40e5fc4e948decc86a760450a91081ed14899c24

    SHA256

    2cac294ebceeba11abe7a3b085a16b49651f31198d9268bb65fc7e36a41b5b82

    SHA512

    517825c21b84fea1d933009cc89ddbcf59a0ba42ad7dc0c51327bf878ae06e21e7a040020bdc29b18f9dfc5bdf4d5c749972519da6d5aae7a5f2daefe38a521e

  • memory/736-14-0x00007FFB60E70000-0x00007FFB61065000-memory.dmp

    Filesize

    2.0MB

  • memory/736-1-0x00007FFB60F0D000-0x00007FFB60F0E000-memory.dmp

    Filesize

    4KB

  • memory/736-6-0x00007FFB20EF0000-0x00007FFB20F00000-memory.dmp

    Filesize

    64KB

  • memory/736-5-0x00007FFB60E70000-0x00007FFB61065000-memory.dmp

    Filesize

    2.0MB

  • memory/736-2-0x00007FFB20EF0000-0x00007FFB20F00000-memory.dmp

    Filesize

    64KB

  • memory/736-8-0x00007FFB20EF0000-0x00007FFB20F00000-memory.dmp

    Filesize

    64KB

  • memory/736-10-0x00007FFB60E70000-0x00007FFB61065000-memory.dmp

    Filesize

    2.0MB

  • memory/736-12-0x00007FFB1ED00000-0x00007FFB1ED10000-memory.dmp

    Filesize

    64KB

  • memory/736-11-0x00007FFB60E70000-0x00007FFB61065000-memory.dmp

    Filesize

    2.0MB

  • memory/736-9-0x00007FFB60E70000-0x00007FFB61065000-memory.dmp

    Filesize

    2.0MB

  • memory/736-7-0x00007FFB60E70000-0x00007FFB61065000-memory.dmp

    Filesize

    2.0MB

  • memory/736-13-0x00007FFB1ED00000-0x00007FFB1ED10000-memory.dmp

    Filesize

    64KB

  • memory/736-4-0x00007FFB60E70000-0x00007FFB61065000-memory.dmp

    Filesize

    2.0MB

  • memory/736-3-0x00007FFB20EF0000-0x00007FFB20F00000-memory.dmp

    Filesize

    64KB

  • memory/736-0-0x00007FFB20EF0000-0x00007FFB20F00000-memory.dmp

    Filesize

    64KB

  • memory/736-17-0x00007FFB60E70000-0x00007FFB61065000-memory.dmp

    Filesize

    2.0MB

  • memory/736-18-0x00007FFB60E70000-0x00007FFB61065000-memory.dmp

    Filesize

    2.0MB

  • memory/736-16-0x00007FFB60E70000-0x00007FFB61065000-memory.dmp

    Filesize

    2.0MB

  • memory/736-46-0x00007FFB60F0D000-0x00007FFB60F0E000-memory.dmp

    Filesize

    4KB

  • memory/736-45-0x00007FFB60E70000-0x00007FFB61065000-memory.dmp

    Filesize

    2.0MB

  • memory/736-15-0x00007FFB60E70000-0x00007FFB61065000-memory.dmp

    Filesize

    2.0MB

  • memory/1660-43-0x00007FFB60E70000-0x00007FFB61065000-memory.dmp

    Filesize

    2.0MB

  • memory/1660-40-0x00007FFB60E70000-0x00007FFB61065000-memory.dmp

    Filesize

    2.0MB

  • memory/1660-39-0x00007FFB60E70000-0x00007FFB61065000-memory.dmp

    Filesize

    2.0MB

  • memory/1660-47-0x00007FFB60E70000-0x00007FFB61065000-memory.dmp

    Filesize

    2.0MB

  • memory/1660-48-0x00007FF711800000-0x00007FF711808000-memory.dmp

    Filesize

    32KB

  • memory/1660-42-0x00007FFB60E70000-0x00007FFB61065000-memory.dmp

    Filesize

    2.0MB