Analysis

  • max time kernel
    133s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/03/2025, 11:50

General

  • Target

    南沙万顷沙镇水窦工程量清单/南沙万顷沙镇水窦/12#水窦/表3—8 综合单价分析表(二).xls

  • Size

    204KB

  • MD5

    a09207992bf95b6f16040bdf04cfc1f4

  • SHA1

    494c04f103db5da227a76cbcedf7c1dc8a77877e

  • SHA256

    55b4dadfc53e3677fdfec468e8e66a016023705570f74f510e855cfeb4e7c8f6

  • SHA512

    c3de73d88b51f7f3bbf4c7ada5a680d3e399a2c73d3f227f4cc32ca9a22671530aaaa2b3ffe11c66f0f546e4a03f7bf42195cfa8dd9d405b888fcadb03e536e1

  • SSDEEP

    3072:3wNfSAmhOH0tGQyvUVxahBRbsl1MMXGFfwEzhR/m2jcc0lbxOK82AJtXwee:Ufksn97MwfwEzhpC2

Malware Config

Signatures

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • Deletes itself 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\南沙万顷沙镇水窦工程量清单\南沙万顷沙镇水窦\12#水窦\表3—8 综合单价分析表(二).xls"
    1⤵
    • Deletes itself
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3888
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4864
      • C:\Windows\system32\attrib.exe
        attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
        3⤵
        • Views/modifies file attributes
        PID:2716
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
        PID:4852
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
        2⤵
          PID:5056

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\南沙万顷沙镇水窦工程量清单\南沙万顷沙镇水窦\12#水窦\表3—8 综合单价分析表(二).xls

        Filesize

        243KB

        MD5

        234afe5b12d8385bcf46a23dc6eb3fc7

        SHA1

        9a46df44fbe48de0aa3f094984a64570951adf3c

        SHA256

        3fbef255fa7965717973a75545783606b8d1c1b3964247070804b8493bd4787d

        SHA512

        110a5f6bb7c9411a18eaf33fdbcab997ec69ef628315bc266aeade511d70604a437d37366ea20cee0406f81ecd3ce7e7fa3fa203d0a7b7a61674f6f3ba5e5a77

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

        Filesize

        3KB

        MD5

        c4519e7473c336ba1f982c62fccf139a

        SHA1

        b6d3abc06a0b7efac60a35954f758d8292e8192a

        SHA256

        4c3602f2528f70c2f84910f0d306408f59a1876d444cd5c88d4670e2566a27f3

        SHA512

        d0133915ed0fc6862c35a8bafaa187f28c2e57c4f5eed743a4a7d68510849387971f7163eb332dfdbd740fc9c315ff8b5da32d9a761bd91ba1fb5a7eadae00b0

      • memory/3888-5-0x00007FFFA0C30000-0x00007FFFA0C40000-memory.dmp

        Filesize

        64KB

      • memory/3888-62-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-19-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-23-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-24-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-22-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-21-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-20-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-18-0x00007FFF9E880000-0x00007FFF9E890000-memory.dmp

        Filesize

        64KB

      • memory/3888-77-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-14-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-13-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-12-0x00007FFF9E880000-0x00007FFF9E890000-memory.dmp

        Filesize

        64KB

      • memory/3888-11-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-10-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-8-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-7-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-6-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-17-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-1-0x00007FFFA0C30000-0x00007FFFA0C40000-memory.dmp

        Filesize

        64KB

      • memory/3888-16-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-76-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-63-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-75-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-61-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-60-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-54-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-51-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-4-0x00007FFFA0C30000-0x00007FFFA0C40000-memory.dmp

        Filesize

        64KB

      • memory/3888-2-0x00007FFFA0C30000-0x00007FFFA0C40000-memory.dmp

        Filesize

        64KB

      • memory/3888-15-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-3-0x00007FFFA0C30000-0x00007FFFA0C40000-memory.dmp

        Filesize

        64KB

      • memory/3888-0-0x00007FFFE0C4D000-0x00007FFFE0C4E000-memory.dmp

        Filesize

        4KB

      • memory/3888-114-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-113-0x00007FFFE0C4D000-0x00007FFFE0C4E000-memory.dmp

        Filesize

        4KB

      • memory/3888-115-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-119-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB

      • memory/3888-9-0x00007FFFE0BB0000-0x00007FFFE0DA5000-memory.dmp

        Filesize

        2.0MB