Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 08:29
Static task
static1
Behavioral task
behavioral1
Sample
cc01815d54a289d110af781b87dea4c4625d068f6a4f13aaa39d25fd723c136d.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cc01815d54a289d110af781b87dea4c4625d068f6a4f13aaa39d25fd723c136d.xls
Resource
win10v2004-20241007-en
General
-
Target
cc01815d54a289d110af781b87dea4c4625d068f6a4f13aaa39d25fd723c136d.xls
-
Size
1.1MB
-
MD5
65fbcc8da027e55f200e662f94037339
-
SHA1
a45ff70dd8f364f4d3f0d4be15430fd288bdbbf7
-
SHA256
cc01815d54a289d110af781b87dea4c4625d068f6a4f13aaa39d25fd723c136d
-
SHA512
bcf76e0ad9dc6a4056b5815fb1dd424dd7f0c175debc15fc878a3fc9f2a8c29df5bc00156ab378cac77ec4a9c7b8e8e2d688d97236b0966d1ffba013359b68d6
-
SSDEEP
24576:5uq9PLiijE2Z5Z2amLKuhoF84LJQohXvFClUd7nZDiTtOZc:5uEPLiij7Z5ZKLGFjLJQohXvFTNnb6
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2060 4236 mshta.exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4236 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4236 EXCEL.EXE 4236 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4236 wrote to memory of 2060 4236 EXCEL.EXE 85 PID 4236 wrote to memory of 2060 4236 EXCEL.EXE 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cc01815d54a289d110af781b87dea4c4625d068f6a4f13aaa39d25fd723c136d.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\System32\mshta.exeC:\Windows\System32\mshta.exe -Embedding2⤵
- Process spawned unexpected child process
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD52f5270e1e16976234082b4d0776334ed
SHA1ee14ca443e2d9dcf871c4acfacef0a33b102f44f
SHA2568805fbd642d3eff3973de553638eadc09206700dde465aba93339aacd5654681
SHA5123a961d411336d54f65de6b96f01ae0dd1bb50390fd75da0f3b826776575638e2688a39d1a9debb479f6a390069b3245106413f8ce9064ab3dfebc7e19e563415