Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
Order_948575494759.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Order_948575494759.xls
Resource
win10v2004-20241007-en
General
-
Target
Order_948575494759.xls
-
Size
1.1MB
-
MD5
6bcc53dc843155e886f469778b4216f1
-
SHA1
ca277194f41d84c108389a788d7281e7566ed9f0
-
SHA256
379fe2ae5a34b2349fe492b4318c589416c5cc8f1e54eb1502455863da17395e
-
SHA512
cd6da13c89795461e4b804be52500b9db81887d18cadb0dd431cc49850db189f4e6dbb9731810d3ae55c7145ee46ee5fdc9e9606dfc73b08c2d9e5a9169abc28
-
SSDEEP
12288:y8zJmzHJEUiOIBUzMTSSD3DERnLRmF8DhEPpxpsAQx1Zj+jLEPHbrpW8osAz85qW:MBanbARM8At8Z+j6RsSIUAI
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1836 936 mshta.exe 82 -
Detected phishing page
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 936 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 936 EXCEL.EXE 936 EXCEL.EXE 936 EXCEL.EXE 936 EXCEL.EXE 936 EXCEL.EXE 936 EXCEL.EXE 936 EXCEL.EXE 936 EXCEL.EXE 936 EXCEL.EXE 936 EXCEL.EXE 936 EXCEL.EXE 936 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 936 wrote to memory of 1836 936 EXCEL.EXE 87 PID 936 wrote to memory of 1836 936 EXCEL.EXE 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Order_948575494759.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\System32\mshta.exeC:\Windows\System32\mshta.exe -Embedding2⤵
- Process spawned unexpected child process
PID:1836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD58d36ce587a35294b2382abf6cc079c7a
SHA1819af38636f1b01d8b29f2c0da042a23c3b80539
SHA2561725897f7c2526d7a51d8839574451e60939d0d4bb180c925e50f168b20599e1
SHA512bee941f61e40415120efd4da9e36330e81738092c211fc8b099524390a758574f74d2bfd49a8b4f780836e002eb435be50c14f97c4456b0d52950885d4a08a2a