Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 17:38
Static task
static1
Behavioral task
behavioral1
Sample
PaymentAdvice.xls
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
PaymentAdvice.xls
Resource
win10v2004-20241007-en
General
-
Target
PaymentAdvice.xls
-
Size
1.1MB
-
MD5
038c9e2471b60b7ad1395c6fcbdb46de
-
SHA1
4663cf7b0be0dc80f255d2e3fa210120910d8e1d
-
SHA256
c1b87e35d9bcc37980e406e3c9aa910aed0dde54f90ffbd521291c80b230b3f3
-
SHA512
7a6b8da94b152230b5c41bc90e2e7fd465ee4db61083e62b6e36f74a46197bd64117b3d5be3a6b6b433eee3b935c555bde4bdad9e3b177fc6f50b1a6c31d12e9
-
SSDEEP
24576:guq9PLiijE2Z5Z2amsQnNF84LJQoh6sQ/E7DxA8r+W4:guEPLiij7Z5ZKsYFjLJQoh6X/EX+d
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3980 1244 mshta.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1244 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1244 wrote to memory of 3980 1244 EXCEL.EXE 87 PID 1244 wrote to memory of 3980 1244 EXCEL.EXE 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\PaymentAdvice.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\System32\mshta.exeC:\Windows\System32\mshta.exe -Embedding2⤵
- Process spawned unexpected child process
PID:3980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5650cd9f4e44a3ba887d569025f27bc10
SHA11e37a584f593273756c9d347c486cae9333f2cbd
SHA256f838cea60c4cf7d07abed1668bac485b5978338224ba7fad4c41d0df9a6fafc7
SHA512308e8ca32bde29e20fc327ea8f0e4069039ce4881ab8ad5e04592952ab0d98388b960f216769192f0421fc1ec49f925411ffccc6e57302cfcf5dc592cb8b4226