Analysis
-
max time kernel
160s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 21:36
Behavioral task
behavioral1
Sample
2022-11-8-0be38d7e3fe5fc3a79a597ed1d254a50.xlsm
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2022-11-8-0be38d7e3fe5fc3a79a597ed1d254a50.xlsm
Resource
win10v2004-20220812-en
General
-
Target
2022-11-8-0be38d7e3fe5fc3a79a597ed1d254a50.xlsm
-
Size
228KB
-
MD5
0be38d7e3fe5fc3a79a597ed1d254a50
-
SHA1
f4eb84f6b1297f57e57780aa7fcabe6438880d40
-
SHA256
da644b867f32f4c76681fd2a7838d843f447f06f87a5ea98786031f0caf169cc
-
SHA512
e589d28f3394e198fd8cebf453952973c6967922b171d4f997499d78dd297ee62567418ce621b84848aa1d9d7e4258bd12b287de198a456b70450775b94f81b2
-
SSDEEP
6144:9w2WMrfxxjhBMMrxBRXZ5Dz3M1qa8L4cyO:9w2LDHf9PH5XUqRLTyO
Malware Config
Extracted
httph.com/nutabalong/CfyFMHWntM3t/
https://amorecuidados.com.br/wp-admin/baPRbSWvbBq/
http://bet-invest.com/mail/nui/
https://www.manchesterot.co.uk/about-us/KEfGo/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2292 620 regsvr32.exe 79 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3580 620 regsvr32.exe 79 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1492 620 regsvr32.exe 79 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2060 620 regsvr32.exe 79 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 620 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 620 EXCEL.EXE 620 EXCEL.EXE 620 EXCEL.EXE 620 EXCEL.EXE 620 EXCEL.EXE 620 EXCEL.EXE 620 EXCEL.EXE 620 EXCEL.EXE 620 EXCEL.EXE 620 EXCEL.EXE 620 EXCEL.EXE 620 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 620 wrote to memory of 2292 620 EXCEL.EXE 83 PID 620 wrote to memory of 2292 620 EXCEL.EXE 83 PID 620 wrote to memory of 3580 620 EXCEL.EXE 84 PID 620 wrote to memory of 3580 620 EXCEL.EXE 84 PID 620 wrote to memory of 1492 620 EXCEL.EXE 88 PID 620 wrote to memory of 1492 620 EXCEL.EXE 88 PID 620 wrote to memory of 2060 620 EXCEL.EXE 89 PID 620 wrote to memory of 2060 620 EXCEL.EXE 89
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2022-11-8-0be38d7e3fe5fc3a79a597ed1d254a50.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
PID:2292
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
PID:3580
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
PID:1492
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
PID:2060
-