Analysis
-
max time kernel
59s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/12/2024, 21:53
Behavioral task
behavioral1
Sample
4fb9fe1d6aef3566205ec593349d9523c6a60101513a8b0a6a9665cec282d63f.xls
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
4fb9fe1d6aef3566205ec593349d9523c6a60101513a8b0a6a9665cec282d63f.xls
Resource
win10v2004-20241007-en
General
-
Target
4fb9fe1d6aef3566205ec593349d9523c6a60101513a8b0a6a9665cec282d63f.xls
-
Size
42KB
-
MD5
6f01662ba35628594a94940a1d11987e
-
SHA1
fb16c6fa665e2e609ec5a7e56fa1aa1850f29809
-
SHA256
4fb9fe1d6aef3566205ec593349d9523c6a60101513a8b0a6a9665cec282d63f
-
SHA512
ab260a52705adcc2121212e2a169fa953bd296b6acdf9b8bd6bce0e72c17a8e52657c4ea0cd460fdfcc7dc730aeae089ef1ca612cd8befd643a09054ce9b370b
-
SSDEEP
768:dPXk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJrVbQvU0TQmSoxF9ovmNje:VXk3hbdlylKsgqopeJBWhZFGkE+cL2NY
Malware Config
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1140 2312 explorer.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3876 2312 explorer.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2312 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2312 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2312 EXCEL.EXE 2312 EXCEL.EXE 2312 EXCEL.EXE 2312 EXCEL.EXE 2312 EXCEL.EXE 2312 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2312 wrote to memory of 1140 2312 EXCEL.EXE 87 PID 2312 wrote to memory of 1140 2312 EXCEL.EXE 87 PID 3232 wrote to memory of 740 3232 explorer.exe 89 PID 3232 wrote to memory of 740 3232 explorer.exe 89 PID 2312 wrote to memory of 3876 2312 EXCEL.EXE 90 PID 2312 wrote to memory of 3876 2312 EXCEL.EXE 90 PID 1668 wrote to memory of 3516 1668 explorer.exe 92 PID 1668 wrote to memory of 3516 1668 explorer.exe 92
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4fb9fe1d6aef3566205ec593349d9523c6a60101513a8b0a6a9665cec282d63f.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\explorer.exeexplorer.exe C:\Users\Public\yQ6coHPG.vbs2⤵
- Process spawned unexpected child process
PID:1140
-
-
C:\Windows\explorer.exeexplorer.exe C:\Users\Public\yQ6coHPG.vbs2⤵
- Process spawned unexpected child process
PID:3876
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\yQ6coHPG.vbs"2⤵PID:740
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\yQ6coHPG.vbs"2⤵PID:3516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3B
MD521438ef4b9ad4fc266b6129a2f60de29
SHA15eb8e2242eeb4f5432beeec8b873f1ab0a6b71fd
SHA25613bf7b3039c63bf5a50491fa3cfd8eb4e699d1ba1436315aef9cbe5711530354
SHA51237436ced85e5cd638973e716d6713257d692f9dd2e1975d5511ae3856a7b3b9f0d9e497315a058b516ab31d652ea9950938c77c1ad435ea8d4b49d73427d1237
-
Filesize
356B
MD542a438a7b2fbc302c9fb5d72a668b0a4
SHA1d665df7886af0d7990f0976cb9ade7c1585135e8
SHA256a6586cc164198f825103dce5dcc9289317574e3a92165a24f7c4ae78d09c5949
SHA5122dec97db982e594c8c29814a0a1e16f90bbcb10d84e523fe6eedbdb49e4d109f29f35fb5846ac726da2c3d110e8ecffb600d377ecc8120cfde354639ac005b47
-
Filesize
667B
MD57ac01573697bec6240bd9acc9a7913e0
SHA15192dc639878f65686f039d248fd26cc05951d00
SHA256b4996aa139d3de4cb1c3c0834660652559760a730071b082077a359477387d0b
SHA5123cadff754fc91a5df33bc7a85cfc65a99fe601526a36674c53043b4fb4a0b511b6b9b205b3d661b661bd3c6af48923bac8c7286ed256519999a26687cc0ce3fe