Analysis

  • max time kernel
    133s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/03/2025, 11:50

General

  • Target

    南沙万顷沙镇水窦工程量清单/南沙万顷沙镇水窦/11#水窦/表3—10 主要材料设备价格表.xls

  • Size

    79KB

  • MD5

    015ae90f54a4befe2e78f03a371fba88

  • SHA1

    ae7ff662e973fd8717eaffd7a6a3843bf32bc820

  • SHA256

    600f1d516634f1d82ebceea80d8284d3047a02135bea61d2759eabecba432a7d

  • SHA512

    180551c51e32b53945e0846eed7e89c82a8f6a9fb39689515aa4bfca062891b33dad9dde98d0a2135f9e68620210d1f77be19a191f23fab91745e93d778268b5

  • SSDEEP

    1536:yg9bKTI3W4vXKV2jcc0lbxOqTgZuIhY7nJdJoOd7cJtXwu/U:ycC2jcc0lbxOK22AJtXwQU

Malware Config

Signatures

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • Deletes itself 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\南沙万顷沙镇水窦工程量清单\南沙万顷沙镇水窦\11#水窦\表3—10 主要材料设备价格表.xls"
    1⤵
    • Deletes itself
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5484
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4524
      • C:\Windows\system32\attrib.exe
        attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
        3⤵
        • Views/modifies file attributes
        PID:4648
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
        PID:400
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
        2⤵
          PID:4500

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\南沙万顷沙镇水窦工程量清单\南沙万顷沙镇水窦\11#水窦\表3—10 主要材料设备价格表.xls

        Filesize

        117KB

        MD5

        f1dfe8e139fa5652d35f1535a30903f5

        SHA1

        2f83aad012ed3a44930f94376940959d41fa4534

        SHA256

        1bcd17133c85c4cbfb6c0596fa09a4a9c0ef239b7475c3bd48cde6bfc6f8771c

        SHA512

        fee7dd062b963c69f3c713e5c246fc918c4254f5448dd845555dd46cba8c74e96241451566fd48f016faab027101dff03c3e894c1698bf17d66e4283606aa981

      • memory/5484-54-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-52-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-23-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-22-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-20-0x00007FFA0A9B0000-0x00007FFA0A9C0000-memory.dmp

        Filesize

        64KB

      • memory/5484-51-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-17-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-18-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-15-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-14-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-13-0x00007FFA0A9B0000-0x00007FFA0A9C0000-memory.dmp

        Filesize

        64KB

      • memory/5484-12-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-11-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-9-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-8-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-7-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-53-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-10-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-21-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-55-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-19-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-44-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-42-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-6-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-68-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-16-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-5-0x00007FFA0D030000-0x00007FFA0D040000-memory.dmp

        Filesize

        64KB

      • memory/5484-4-0x00007FFA0D030000-0x00007FFA0D040000-memory.dmp

        Filesize

        64KB

      • memory/5484-3-0x00007FFA0D030000-0x00007FFA0D040000-memory.dmp

        Filesize

        64KB

      • memory/5484-2-0x00007FFA0D030000-0x00007FFA0D040000-memory.dmp

        Filesize

        64KB

      • memory/5484-1-0x00007FFA4D04D000-0x00007FFA4D04E000-memory.dmp

        Filesize

        4KB

      • memory/5484-0-0x00007FFA0D030000-0x00007FFA0D040000-memory.dmp

        Filesize

        64KB

      • memory/5484-109-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-110-0x00007FFA4D04D000-0x00007FFA4D04E000-memory.dmp

        Filesize

        4KB

      • memory/5484-111-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-112-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB

      • memory/5484-116-0x00007FFA4CFB0000-0x00007FFA4D1A5000-memory.dmp

        Filesize

        2.0MB