Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows10_x64 -
resource
win10-20220223-en -
submitted
28-02-2022 12:17
Behavioral task
behavioral1
Sample
0d93a4f12d6e52dd86f8194dc522bdf7b6c4724898e929e12943c15cef4f3aa9.xlsm
Resource
win10-en-20211208
Behavioral task
behavioral2
Sample
0d93a4f12d6e52dd86f8194dc522bdf7b6c4724898e929e12943c15cef4f3aa9.xlsm
Resource
win10-20220223-en
General
-
Target
0d93a4f12d6e52dd86f8194dc522bdf7b6c4724898e929e12943c15cef4f3aa9.xlsm
-
Size
102KB
-
MD5
e01658f40196c8810a4b654d10212ade
-
SHA1
caed09b776174509351dfe57e87325cacee7c69d
-
SHA256
0d93a4f12d6e52dd86f8194dc522bdf7b6c4724898e929e12943c15cef4f3aa9
-
SHA512
5e502a8d00aa91155e4725323b9f7b073537565a1b185e8a8cce12259b6c7300aebabd8ef776280cecb85b451999742a5bde4ad1a460f12fec0d9c7e7158a666
Malware Config
Extracted
http://singsamut.ac.th/00-----26phj/ws1iGhQ/ws1iGhQ/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 400 2564 rundll32.exe 41 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2564 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2564 EXCEL.EXE 2564 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2564 wrote to memory of 400 2564 EXCEL.EXE 43 PID 2564 wrote to memory of 400 2564 EXCEL.EXE 43 PID 2564 wrote to memory of 400 2564 EXCEL.EXE 43
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0d93a4f12d6e52dd86f8194dc522bdf7b6c4724898e929e12943c15cef4f3aa9.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWow64\rundll32.exeC:\Windows\SysWow64\rundll32.exe ..\bestb.ocx,D"&"l"&"l"&"R"&"eg"&"i"&"s"&"t"&"e"&"rS"&"e"&"rver2⤵
- Process spawned unexpected child process
PID:400
-