Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2024 06:17

General

  • Target

    Payment Advice.xls

  • Size

    242KB

  • MD5

    8257b2f37dd713ed1f056204cdf84e6e

  • SHA1

    f3d26a25afe7b1a17193f251e8c4ae6f0b021d7e

  • SHA256

    c02e7064462448b811e6f409fdb38c843ea88825ce6c4051a3da8a1bdcf0a207

  • SHA512

    f48253fbf1e77085ce4a4768df0614e8564cae224a8ca9191f85cab89190e0f99bfff0d1dd1bc8af47b30259df325f3a23eeae57e33433498a0de2a6e8041a2a

  • SSDEEP

    6144:lW8qVHtEKHBMixiMK6G+ZFrTABinx0japxld+Syh:E8IHtEopozwjTPnSjaLv

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Payment Advice.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3436
    • C:\Windows\System32\mshta.exe
      C:\Windows\System32\mshta.exe -Embedding
      2⤵
      • Process spawned unexpected child process
      PID:2164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2164-41-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/2164-55-0x00007FF7534B0000-0x00007FF7534B8000-memory.dmp

    Filesize

    32KB

  • memory/2164-54-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/2164-46-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/2164-45-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/2164-44-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/2164-42-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/3436-7-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/3436-1-0x00007FFF69AED000-0x00007FFF69AEE000-memory.dmp

    Filesize

    4KB

  • memory/3436-9-0x00007FFF279D0000-0x00007FFF279E0000-memory.dmp

    Filesize

    64KB

  • memory/3436-10-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/3436-12-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/3436-14-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/3436-13-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/3436-11-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/3436-15-0x00007FFF279D0000-0x00007FFF279E0000-memory.dmp

    Filesize

    64KB

  • memory/3436-17-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/3436-16-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/3436-8-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/3436-6-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/3436-3-0x00007FFF29AD0000-0x00007FFF29AE0000-memory.dmp

    Filesize

    64KB

  • memory/3436-0-0x00007FFF29AD0000-0x00007FFF29AE0000-memory.dmp

    Filesize

    64KB

  • memory/3436-5-0x00007FFF29AD0000-0x00007FFF29AE0000-memory.dmp

    Filesize

    64KB

  • memory/3436-48-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/3436-49-0x00007FFF69AED000-0x00007FFF69AEE000-memory.dmp

    Filesize

    4KB

  • memory/3436-50-0x00007FFF69A50000-0x00007FFF69C45000-memory.dmp

    Filesize

    2.0MB

  • memory/3436-4-0x00007FFF29AD0000-0x00007FFF29AE0000-memory.dmp

    Filesize

    64KB

  • memory/3436-2-0x00007FFF29AD0000-0x00007FFF29AE0000-memory.dmp

    Filesize

    64KB