Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 02:01

General

  • Target

    002eb261ac533e6ec256236996b229688b08f56aa143f2b2a257c215bfba0195.xls

  • Size

    1.2MB

  • MD5

    c4de8d19dd2ca3d7dbe8bef7df57cbec

  • SHA1

    61337281c5dd8dc3586e8286e38ebdb27126b0a7

  • SHA256

    002eb261ac533e6ec256236996b229688b08f56aa143f2b2a257c215bfba0195

  • SHA512

    d2b502172f3fa2fe1102c6fbca9a9e23e0ad3946e65a0e0d3309f51ae252969097f5256d20080a865fb9142840f3a20fdd5fcd4984b030f8a90a225bdd20e174

  • SSDEEP

    24576:Cj+sS5ylM7RPQH/9A20bh6XwItW9PS9dfbHVUlrkwCIGwD:Cj+Zsyk/u2ukW09dfZoRfGwD

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\002eb261ac533e6ec256236996b229688b08f56aa143f2b2a257c215bfba0195.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\System32\mshta.exe
      C:\Windows\System32\mshta.exe -Embedding
      2⤵
      • Process spawned unexpected child process
      PID:4168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    3KB

    MD5

    d744c33069f8de762686ffbf38697618

    SHA1

    93e9a5b88ce1bc8ba65d1745b422e055b7dbd2a6

    SHA256

    8bede850cecee79ceee16b9e3962a9f32ea091fdaea88348a00c3adcfe840e32

    SHA512

    f3aa82ef84d6afb9c6afdc37ddcc16d645aec1c11160f189541c219085a92e52b3c4783e8047d6c9a594d22570f21970ea2c359ad2a47ec6ac0fa32206fdf008

  • memory/2204-15-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-17-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-5-0x00007FFC9E7D0000-0x00007FFC9E7E0000-memory.dmp

    Filesize

    64KB

  • memory/2204-2-0x00007FFC9E7D0000-0x00007FFC9E7E0000-memory.dmp

    Filesize

    64KB

  • memory/2204-4-0x00007FFC9E7D0000-0x00007FFC9E7E0000-memory.dmp

    Filesize

    64KB

  • memory/2204-6-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-8-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-11-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-10-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-9-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-12-0x00007FFC9BE70000-0x00007FFC9BE80000-memory.dmp

    Filesize

    64KB

  • memory/2204-7-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-0-0x00007FFC9E7D0000-0x00007FFC9E7E0000-memory.dmp

    Filesize

    64KB

  • memory/2204-13-0x00007FFC9BE70000-0x00007FFC9BE80000-memory.dmp

    Filesize

    64KB

  • memory/2204-19-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-14-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-18-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-20-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-16-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-3-0x00007FFC9E7D0000-0x00007FFC9E7E0000-memory.dmp

    Filesize

    64KB

  • memory/2204-1-0x00007FFCDE7ED000-0x00007FFCDE7EE000-memory.dmp

    Filesize

    4KB

  • memory/2204-47-0x00007FFCDE7ED000-0x00007FFCDE7EE000-memory.dmp

    Filesize

    4KB

  • memory/2204-46-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB

  • memory/4168-44-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB

  • memory/4168-43-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB

  • memory/4168-38-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB

  • memory/4168-52-0x00007FF7DFF10000-0x00007FF7DFF18000-memory.dmp

    Filesize

    32KB

  • memory/4168-51-0x00007FFCDE750000-0x00007FFCDE945000-memory.dmp

    Filesize

    2.0MB