Analysis

  • max time kernel
    133s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/03/2025, 11:50

General

  • Target

    南沙万顷沙镇水窦工程量清单/南沙万顷沙镇水窦/10#水窦/表3—5 单位工程招标控制价汇总表.xls

  • Size

    85KB

  • MD5

    70314a065296a82e233001ada0ab559f

  • SHA1

    7fe7c0500580062b0ccbb6774ceebce1ad088d67

  • SHA256

    a06acb8782ea7129e3ecf74c3dc982c73c4e041e51a702dec4c7ceeb8b728e66

  • SHA512

    abd1efbc567d66d92129e618bb767d52ceda59ba2542ba6ad4eb7ccff62f847177ac732a62134b8cfced80d5a5def66aac358fb4534558fa985d044b877d32bc

  • SSDEEP

    1536:cpMWVqWVbrzQ7ITkVFtI9NA23NP2iY7nJdJoOd7cJwXw62te:lWVbrzQ7ITkju1t2rAJwXwnte

Malware Config

Signatures

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • Deletes itself 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\南沙万顷沙镇水窦工程量清单\南沙万顷沙镇水窦\10#水窦\表3—5 单位工程招标控制价汇总表.xls"
    1⤵
    • Deletes itself
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5696
      • C:\Windows\system32\attrib.exe
        attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
        3⤵
        • Views/modifies file attributes
        PID:2996
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
        PID:3016
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
        2⤵
          PID:4464

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\南沙万顷沙镇水窦工程量清单\南沙万顷沙镇水窦\10#水窦\表3—5 单位工程招标控制价汇总表.xls

        Filesize

        117KB

        MD5

        4bcdf5930705ff78bafef6724cc12643

        SHA1

        a74ce4901bf1a43e6398bebe1dd3f3cf39bab3c9

        SHA256

        03b48d3b6cebef4777cedb4a4cc0cfe0a633943e3102aa97fa6ff937a8023110

        SHA512

        b216c06f69d8fe7ca1c8af2006f1067bd9c693fb47cf729e748a200f44c89e8cf4cf86d6cff006d1e7a1a2a5cf4e75952f2af8ea00f842dd9ec32d46b8fb012e

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

        Filesize

        664B

        MD5

        20b09b8dcf32b6ab814acc9217e4ed71

        SHA1

        1e5fa7a9759c4196f08c970570ba146b5b11f26d

        SHA256

        295668a34fb7858115eaafccab0cd4a8ca362b9c4b40de2615f178c3c9ce48f3

        SHA512

        f08c78feca89868e2a0037f704007811ef01a18eec57bba90f1bc4333f16f044ff6349f3e1a610db7f32cce32d4ceadadf8543623b9d1541a8d48dafa4ad3c47

      • memory/2588-7-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-6-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-19-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-22-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-23-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-21-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-20-0x00007FFAC3850000-0x00007FFAC3860000-memory.dmp

        Filesize

        64KB

      • memory/2588-18-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-17-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-15-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-14-0x00007FFAC3850000-0x00007FFAC3860000-memory.dmp

        Filesize

        64KB

      • memory/2588-12-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-11-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-10-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-9-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-8-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-16-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-0-0x00007FFB05C2D000-0x00007FFB05C2E000-memory.dmp

        Filesize

        4KB

      • memory/2588-4-0x00007FFAC5C10000-0x00007FFAC5C20000-memory.dmp

        Filesize

        64KB

      • memory/2588-67-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-69-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-70-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-13-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-68-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-55-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-54-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-44-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-46-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-3-0x00007FFAC5C10000-0x00007FFAC5C20000-memory.dmp

        Filesize

        64KB

      • memory/2588-2-0x00007FFAC5C10000-0x00007FFAC5C20000-memory.dmp

        Filesize

        64KB

      • memory/2588-1-0x00007FFAC5C10000-0x00007FFAC5C20000-memory.dmp

        Filesize

        64KB

      • memory/2588-110-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-109-0x00007FFB05C2D000-0x00007FFB05C2E000-memory.dmp

        Filesize

        4KB

      • memory/2588-111-0x00007FFB05B90000-0x00007FFB05D85000-memory.dmp

        Filesize

        2.0MB

      • memory/2588-5-0x00007FFAC5C10000-0x00007FFAC5C20000-memory.dmp

        Filesize

        64KB