Analysis

  • max time kernel
    59s
  • max time network
    33s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/12/2024, 21:53

General

  • Target

    4fb9fe1d6aef3566205ec593349d9523c6a60101513a8b0a6a9665cec282d63f.xls

  • Size

    42KB

  • MD5

    6f01662ba35628594a94940a1d11987e

  • SHA1

    fb16c6fa665e2e609ec5a7e56fa1aa1850f29809

  • SHA256

    4fb9fe1d6aef3566205ec593349d9523c6a60101513a8b0a6a9665cec282d63f

  • SHA512

    ab260a52705adcc2121212e2a169fa953bd296b6acdf9b8bd6bce0e72c17a8e52657c4ea0cd460fdfcc7dc730aeae089ef1ca612cd8befd643a09054ce9b370b

  • SSDEEP

    768:dPXk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJrVbQvU0TQmSoxF9ovmNje:VXk3hbdlylKsgqopeJBWhZFGkE+cL2NY

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4fb9fe1d6aef3566205ec593349d9523c6a60101513a8b0a6a9665cec282d63f.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Windows\explorer.exe
      explorer.exe C:\Users\Public\yQ6coHPG.vbs
      2⤵
      • Process spawned unexpected child process
      PID:1140
    • C:\Windows\explorer.exe
      explorer.exe C:\Users\Public\yQ6coHPG.vbs
      2⤵
      • Process spawned unexpected child process
      PID:3876
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3232
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Public\yQ6coHPG.vbs"
      2⤵
        PID:740
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Public\yQ6coHPG.vbs"
        2⤵
          PID:3516

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Public\JURsD.txt

              Filesize

              3B

              MD5

              21438ef4b9ad4fc266b6129a2f60de29

              SHA1

              5eb8e2242eeb4f5432beeec8b873f1ab0a6b71fd

              SHA256

              13bf7b3039c63bf5a50491fa3cfd8eb4e699d1ba1436315aef9cbe5711530354

              SHA512

              37436ced85e5cd638973e716d6713257d692f9dd2e1975d5511ae3856a7b3b9f0d9e497315a058b516ab31d652ea9950938c77c1ad435ea8d4b49d73427d1237

            • C:\Users\Public\yQ6coHPG.vbs

              Filesize

              356B

              MD5

              42a438a7b2fbc302c9fb5d72a668b0a4

              SHA1

              d665df7886af0d7990f0976cb9ade7c1585135e8

              SHA256

              a6586cc164198f825103dce5dcc9289317574e3a92165a24f7c4ae78d09c5949

              SHA512

              2dec97db982e594c8c29814a0a1e16f90bbcb10d84e523fe6eedbdb49e4d109f29f35fb5846ac726da2c3d110e8ecffb600d377ecc8120cfde354639ac005b47

            • C:\Users\Public\yQ6coHPG.vbs

              Filesize

              667B

              MD5

              7ac01573697bec6240bd9acc9a7913e0

              SHA1

              5192dc639878f65686f039d248fd26cc05951d00

              SHA256

              b4996aa139d3de4cb1c3c0834660652559760a730071b082077a359477387d0b

              SHA512

              3cadff754fc91a5df33bc7a85cfc65a99fe601526a36674c53043b4fb4a0b511b6b9b205b3d661b661bd3c6af48923bac8c7286ed256519999a26687cc0ce3fe

            • memory/2312-10-0x00007FFB38E70000-0x00007FFB39065000-memory.dmp

              Filesize

              2.0MB

            • memory/2312-13-0x00007FFB38E70000-0x00007FFB39065000-memory.dmp

              Filesize

              2.0MB

            • memory/2312-5-0x00007FFB38E70000-0x00007FFB39065000-memory.dmp

              Filesize

              2.0MB

            • memory/2312-7-0x00007FFAF8EF0000-0x00007FFAF8F00000-memory.dmp

              Filesize

              64KB

            • memory/2312-4-0x00007FFAF8EF0000-0x00007FFAF8F00000-memory.dmp

              Filesize

              64KB

            • memory/2312-11-0x00007FFB38E70000-0x00007FFB39065000-memory.dmp

              Filesize

              2.0MB

            • memory/2312-12-0x00007FFB38E70000-0x00007FFB39065000-memory.dmp

              Filesize

              2.0MB

            • memory/2312-0-0x00007FFAF8EF0000-0x00007FFAF8F00000-memory.dmp

              Filesize

              64KB

            • memory/2312-14-0x00007FFAF6590000-0x00007FFAF65A0000-memory.dmp

              Filesize

              64KB

            • memory/2312-6-0x00007FFB38E70000-0x00007FFB39065000-memory.dmp

              Filesize

              2.0MB

            • memory/2312-9-0x00007FFB38E70000-0x00007FFB39065000-memory.dmp

              Filesize

              2.0MB

            • memory/2312-8-0x00007FFB38E70000-0x00007FFB39065000-memory.dmp

              Filesize

              2.0MB

            • memory/2312-15-0x00007FFAF6590000-0x00007FFAF65A0000-memory.dmp

              Filesize

              64KB

            • memory/2312-2-0x00007FFAF8EF0000-0x00007FFAF8F00000-memory.dmp

              Filesize

              64KB

            • memory/2312-3-0x00007FFAF8EF0000-0x00007FFAF8F00000-memory.dmp

              Filesize

              64KB

            • memory/2312-1-0x00007FFB38F0D000-0x00007FFB38F0E000-memory.dmp

              Filesize

              4KB

            • memory/2312-32-0x00007FFB38E70000-0x00007FFB39065000-memory.dmp

              Filesize

              2.0MB

            • memory/2312-33-0x00007FFB38F0D000-0x00007FFB38F0E000-memory.dmp

              Filesize

              4KB

            • memory/2312-34-0x00007FFB38E70000-0x00007FFB39065000-memory.dmp

              Filesize

              2.0MB

            • memory/2312-35-0x00007FFB38E70000-0x00007FFB39065000-memory.dmp

              Filesize

              2.0MB