Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 14:31
Behavioral task
behavioral1
Sample
График_отпусков_Мосэнерго_2025.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
График_отпусков_Мосэнерго_2025.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
График_отпусков_Мосэнерго_2025.xls
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
График_отпусков_Мосэнерго_2025.xls
Resource
win10v2004-20241007-en
General
-
Target
График_отпусков_Мосэнерго_2025.vbs
-
Size
376B
-
MD5
74cc658a2ffe8c81e012cd64ffa7c671
-
SHA1
9a9d18e5851e54b3ac4ff2e81db35e111469bf3f
-
SHA256
81af5eccd733b7043d623256f01047cf4216408c090580c4f41146899c50bdd1
-
SHA512
063e9b977ad1043a7648d43a32eb76515e3d97a6156d4208e0feecb570367e4233ed41a757def8be927fe5856bcde513d6bf1f52e3437e84d253b098ff2a80bd
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 26 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2224 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2224 EXCEL.EXE 208 Microsoft.Mashup.Container.NetFX40.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2224 EXCEL.EXE Token: 33 2224 EXCEL.EXE Token: SeIncBasePriorityPrivilege 2224 EXCEL.EXE Token: SeDebugPrivilege 208 Microsoft.Mashup.Container.NetFX40.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2224 EXCEL.EXE 2224 EXCEL.EXE 2224 EXCEL.EXE 2224 EXCEL.EXE 2224 EXCEL.EXE 2224 EXCEL.EXE 2224 EXCEL.EXE 2224 EXCEL.EXE 2224 EXCEL.EXE 2224 EXCEL.EXE 2224 EXCEL.EXE 2224 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2224 wrote to memory of 208 2224 EXCEL.EXE 90 PID 2224 wrote to memory of 208 2224 EXCEL.EXE 90
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\График_отпусков_Мосэнерго_2025.vbs"1⤵PID:3240
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files\Microsoft Office\Root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe"C:\Program Files\Microsoft Office\Root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe" 6004 6008 9dbc6f0f-e1be-4d1e-a833-8543e98808f9 12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208
-