Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 20:22
Behavioral task
behavioral1
Sample
6331.case-11830.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6331.case-11830.xls
Resource
win10v2004-20240508-en
General
-
Target
6331.case-11830.xls
-
Size
146KB
-
MD5
c0b97d7ef4029e093271c362794fccb7
-
SHA1
df568590ec942e44923d76793c92e8418e40a55f
-
SHA256
3409c35ec3fc7cb56d75a790fd4693fdd7935e426676d72df67d234007f593e1
-
SHA512
0e9bb2a3831a8a1d96e15631a8b20c39986fa207d7f229537c3c537fe7b46a3b7a4546f3f3289b7e9333d9cf0b07e7616e7895a823cb77c9ddd93216568d720c
-
SSDEEP
3072:Vk3hOdsylKlgxopeiBNhZFGzE+cL2kdAvDiKHjEtpbDZEOrkeGPfJ0s3Tq48L/iy:Vk3hOdsylKlgxopeiBNhZF+E+W2kdAvk
Malware Config
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2672 1832 explorer.exe 27 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2996 1832 explorer.exe 27 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1832 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1832 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1832 EXCEL.EXE 1832 EXCEL.EXE 1832 EXCEL.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2672 1832 EXCEL.EXE 28 PID 1832 wrote to memory of 2672 1832 EXCEL.EXE 28 PID 1832 wrote to memory of 2672 1832 EXCEL.EXE 28 PID 1832 wrote to memory of 2672 1832 EXCEL.EXE 28 PID 2736 wrote to memory of 2468 2736 explorer.exe 30 PID 2736 wrote to memory of 2468 2736 explorer.exe 30 PID 2736 wrote to memory of 2468 2736 explorer.exe 30 PID 1832 wrote to memory of 2996 1832 EXCEL.EXE 31 PID 1832 wrote to memory of 2996 1832 EXCEL.EXE 31 PID 1832 wrote to memory of 2996 1832 EXCEL.EXE 31 PID 1832 wrote to memory of 2996 1832 EXCEL.EXE 31 PID 2628 wrote to memory of 2472 2628 explorer.exe 33 PID 2628 wrote to memory of 2472 2628 explorer.exe 33 PID 2628 wrote to memory of 2472 2628 explorer.exe 33
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\6331.case-11830.xls1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe C:\Users\Admin\AppData\Local\Temp\pQRrErz.vbs2⤵
- Process spawned unexpected child process
PID:2672
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe C:\Users\Admin\AppData\Local\Temp\AcWROBlN.vbs2⤵
- Process spawned unexpected child process
PID:2996
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\pQRrErz.vbs"2⤵PID:2468
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\AcWROBlN.vbs"2⤵PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
721B
MD5615b8b8121bf66bd099fcdc65df12ead
SHA105bad3328fc421244ea321e58a3ce7dcc04ef14b
SHA256bd5ec9558ddf0c24701e640af810ed767b4979b1b75b17f85437582485eef5e2
SHA512523066a2129d353aebfbb5c65529f4a835d58428c6dfa494212889118310f9fcd1973fee2aaacb005b6667b2b9f545970959611a467a0765a98e3d88405a16fc
-
Filesize
315B
MD5cfb9a4c1aee86d97074eae82ee87e917
SHA1b04623afa5e81eae8a0b205ce4349dbed3fb4004
SHA25602c2eb3ce251cbec0035017aff09448562f765c2d782065df5f85d226f17b35f
SHA512184ff9fae5f3bd9d76ceb7c21fb20eaf993a77ab47a1d615f5ae8fe61db19009cd394ee3edc5d952be6d8e2f48fc1e2935d4359ad5af6221ac04acfad97986e0
-
Filesize
3B
MD521438ef4b9ad4fc266b6129a2f60de29
SHA15eb8e2242eeb4f5432beeec8b873f1ab0a6b71fd
SHA25613bf7b3039c63bf5a50491fa3cfd8eb4e699d1ba1436315aef9cbe5711530354
SHA51237436ced85e5cd638973e716d6713257d692f9dd2e1975d5511ae3856a7b3b9f0d9e497315a058b516ab31d652ea9950938c77c1ad435ea8d4b49d73427d1237