Analysis

  • max time kernel
    143s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2024 08:51

General

  • Target

    Payment Advice.xls

  • Size

    1.0MB

  • MD5

    d6ad3108a8014d64c39ae1fe463112c5

  • SHA1

    f5bb7665aa11ad21d9fa117a6e7b270c533a5844

  • SHA256

    7b75ff23cf680717091181e61002f59e66a118302af798fc031548aead7a6af4

  • SHA512

    3bae03cb73bceae2e54255833d92cb2cf0a6e3b826997b4754909c103508b79734df24bd1e42161a292e30e83232569eecfb1d23d85856564a6b12dfc62b735f

  • SSDEEP

    12288:6mzHJEyfN1YVuBPT39LZEBD3DERnLRmF8DHFg6pvXlc857Jw6b4EJvQJwuXAw79r:9hfgVY3YBbARM8bF9pfW2GH5wa73N

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Payment Advice.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:772
    • C:\Windows\System32\mshta.exe
      C:\Windows\System32\mshta.exe -Embedding
      2⤵
      • Process spawned unexpected child process
      PID:1484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/772-12-0x00007FFB947B0000-0x00007FFB949A5000-memory.dmp

    Filesize

    2.0MB

  • memory/772-3-0x00007FFB54830000-0x00007FFB54840000-memory.dmp

    Filesize

    64KB

  • memory/772-14-0x00007FFB947B0000-0x00007FFB949A5000-memory.dmp

    Filesize

    2.0MB

  • memory/772-17-0x00007FFB947B0000-0x00007FFB949A5000-memory.dmp

    Filesize

    2.0MB

  • memory/772-5-0x00007FFB947B0000-0x00007FFB949A5000-memory.dmp

    Filesize

    2.0MB

  • memory/772-6-0x00007FFB947B0000-0x00007FFB949A5000-memory.dmp

    Filesize

    2.0MB

  • memory/772-4-0x00007FFB54830000-0x00007FFB54840000-memory.dmp

    Filesize

    64KB

  • memory/772-8-0x00007FFB947B0000-0x00007FFB949A5000-memory.dmp

    Filesize

    2.0MB

  • memory/772-7-0x00007FFB54830000-0x00007FFB54840000-memory.dmp

    Filesize

    64KB

  • memory/772-9-0x00007FFB947B0000-0x00007FFB949A5000-memory.dmp

    Filesize

    2.0MB

  • memory/772-10-0x00007FFB52560000-0x00007FFB52570000-memory.dmp

    Filesize

    64KB

  • memory/772-11-0x00007FFB947B0000-0x00007FFB949A5000-memory.dmp

    Filesize

    2.0MB

  • memory/772-0-0x00007FFB54830000-0x00007FFB54840000-memory.dmp

    Filesize

    64KB

  • memory/772-1-0x00007FFB9484D000-0x00007FFB9484E000-memory.dmp

    Filesize

    4KB

  • memory/772-2-0x00007FFB54830000-0x00007FFB54840000-memory.dmp

    Filesize

    64KB

  • memory/772-18-0x00007FFB947B0000-0x00007FFB949A5000-memory.dmp

    Filesize

    2.0MB

  • memory/772-16-0x00007FFB947B0000-0x00007FFB949A5000-memory.dmp

    Filesize

    2.0MB

  • memory/772-15-0x00007FFB52560000-0x00007FFB52570000-memory.dmp

    Filesize

    64KB

  • memory/772-13-0x00007FFB947B0000-0x00007FFB949A5000-memory.dmp

    Filesize

    2.0MB

  • memory/772-45-0x00007FFB947B0000-0x00007FFB949A5000-memory.dmp

    Filesize

    2.0MB

  • memory/772-44-0x00007FFB9484D000-0x00007FFB9484E000-memory.dmp

    Filesize

    4KB

  • memory/772-43-0x00007FFB947B0000-0x00007FFB949A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1484-41-0x00007FFB947B0000-0x00007FFB949A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1484-36-0x00007FFB947B0000-0x00007FFB949A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1484-49-0x00007FFB947B0000-0x00007FFB949A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1484-50-0x00007FF7FAC60000-0x00007FF7FAC68000-memory.dmp

    Filesize

    32KB