Analysis
-
max time kernel
143s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 07:22
Static task
static1
Behavioral task
behavioral1
Sample
Scandocs.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Scandocs.xls
Resource
win10v2004-20241007-en
General
-
Target
Scandocs.xls
-
Size
646KB
-
MD5
36d0ab08e6d13427c73bb3bcf647974a
-
SHA1
f5c90bd4bc4245a020090e0716f1df6f47adbc14
-
SHA256
a11c3b13c7f4a3f7fb760b9740a681ed05b2d071ca021a77e7121b49ab485233
-
SHA512
2800baa385524cf5a8893a6e134b1dbd179fcbb09e6653b0b661889913b593651dc28ef4004dc89984f61b2403245ae34768cda6918d6d78cd3abdeb14530e2a
-
SSDEEP
12288:AKVbWNHd0zBREjqtnOdOXIOfYeG7vtjh1pKwf2yatxDnpSIbYOPI15QZ35:Lsd6/tnamfeFjbplfTazzb20Z3
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3296 2952 mshta.exe 83 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2952 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2952 EXCEL.EXE 2952 EXCEL.EXE 2952 EXCEL.EXE 2952 EXCEL.EXE 2952 EXCEL.EXE 2952 EXCEL.EXE 2952 EXCEL.EXE 2952 EXCEL.EXE 2952 EXCEL.EXE 2952 EXCEL.EXE 2952 EXCEL.EXE 2952 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2952 wrote to memory of 3296 2952 EXCEL.EXE 88 PID 2952 wrote to memory of 3296 2952 EXCEL.EXE 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Scandocs.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\System32\mshta.exeC:\Windows\System32\mshta.exe -Embedding2⤵
- Process spawned unexpected child process
PID:3296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5d39faa76ad5f7fc6d2f85833620ad41f
SHA12dde4f5f0b303915ab969b5fd872e1c42e62179c
SHA256d164f239522c237c4a08b253d921744f8d51a8a995e25297261dd6f027c774c0
SHA512a2c322722bbf71d2417c3a2cc34596055c8d18136201c7a8f61a65d0f9c4891777b43b0eb4153426d9c109f08cdc208c698aa2bae778714c132896315d70f979