Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 08:31

General

  • Target

    Payment Advice-RefA22D4YdWsbE5.xls

  • Size

    645KB

  • MD5

    a9a9c2318ac29160ece850c60e6b7aa6

  • SHA1

    67701eb4f6813927c5262edf55d9943146f521a2

  • SHA256

    b0cd17647fc69ec21565ca141e88795eaf36084fb4d179198e988ab449d46483

  • SHA512

    c5db07d40516e468835e827fbf9643a442c4ebbd0c2941c97f4d00010fbe66b032be8a1fcdf568515f727810a7d7f0bf0c2707ac40a20c55616fb72c85166c1c

  • SSDEEP

    12288:UbWNHd0zBRlrOiVNYNPPg1O+R8G7kN/eTXjWxMyPg+8FlX0iv6p:8sd4rrV6NP41ttkN2TQXbEb

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Payment Advice-RefA22D4YdWsbE5.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3216
    • C:\Windows\System32\mshta.exe
      C:\Windows\System32\mshta.exe -Embedding
      2⤵
      • Process spawned unexpected child process
      PID:1852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    8595703ad1863598ee478e92d712bcac

    SHA1

    a7c15d5d3d8b825c449f852ee736260113cbbcda

    SHA256

    f4a671f5edcb3506c444d742a1c44b9c4ae8ac37467d6d0b84e87a40bb3f3fd7

    SHA512

    75dfb8c80073976c0d46c311b24f5771d4a19c5f4aada69849c535224bbca52329f8e395c9bb661f9ff42a9434a28a411a691b48349975822569d7b6dcb29040

  • memory/1852-42-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1852-53-0x00007FF70F220000-0x00007FF70F228000-memory.dmp

    Filesize

    32KB

  • memory/1852-52-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1852-44-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-14-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-19-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-9-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-12-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-11-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-13-0x00007FF9FCEE0000-0x00007FF9FCEF0000-memory.dmp

    Filesize

    64KB

  • memory/3216-10-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-15-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-16-0x00007FF9FCEE0000-0x00007FF9FCEF0000-memory.dmp

    Filesize

    64KB

  • memory/3216-1-0x00007FFA3F58D000-0x00007FFA3F58E000-memory.dmp

    Filesize

    4KB

  • memory/3216-17-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-21-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-20-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-2-0x00007FF9FF570000-0x00007FF9FF580000-memory.dmp

    Filesize

    64KB

  • memory/3216-18-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-8-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-7-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-6-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-4-0x00007FF9FF570000-0x00007FF9FF580000-memory.dmp

    Filesize

    64KB

  • memory/3216-46-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-47-0x00007FFA3F58D000-0x00007FFA3F58E000-memory.dmp

    Filesize

    4KB

  • memory/3216-48-0x00007FFA3F4F0000-0x00007FFA3F6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3216-5-0x00007FF9FF570000-0x00007FF9FF580000-memory.dmp

    Filesize

    64KB

  • memory/3216-3-0x00007FF9FF570000-0x00007FF9FF580000-memory.dmp

    Filesize

    64KB

  • memory/3216-0-0x00007FF9FF570000-0x00007FF9FF580000-memory.dmp

    Filesize

    64KB