Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 23:19
Behavioral task
behavioral1
Sample
document-2009388069.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
document-2009388069.xls
Resource
win10v2004-20240709-en
General
-
Target
document-2009388069.xls
-
Size
315KB
-
MD5
5b0b2913a724711bcf2f01821c93d205
-
SHA1
e64aac1ffe55d90519a489f4eb60b882ea34a10d
-
SHA256
facad0c1aeb04ece3d6f82cc217cc0a2c256db16bf648cd910d7675de4384178
-
SHA512
5141aa6b630de453aa95e929afef0d6159d1a063d86cad43a9f43ca73765da3c33a5261ae0023c30ad219b59bd5a5a8e76baef2425cbe7cd097167bdac8f18e8
-
SSDEEP
6144:VcKoSsxzNDZLDZjlbR868O8KlVH3l+cq7uDphYHceXVhca+fMHLty/xcl8OR4Pio:nWr0IRHM4p+3DavLhQS
Malware Config
Extracted
https://app.itmagf.com/ds/1702.gif
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2748 1948 rundll32.exe EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1948 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
EXCEL.EXEpid process 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
EXCEL.EXEdescription pid process target process PID 1948 wrote to memory of 2748 1948 EXCEL.EXE rundll32.exe PID 1948 wrote to memory of 2748 1948 EXCEL.EXE rundll32.exe PID 1948 wrote to memory of 2748 1948 EXCEL.EXE rundll32.exe PID 1948 wrote to memory of 2748 1948 EXCEL.EXE rundll32.exe PID 1948 wrote to memory of 2748 1948 EXCEL.EXE rundll32.exe PID 1948 wrote to memory of 2748 1948 EXCEL.EXE rundll32.exe PID 1948 wrote to memory of 2748 1948 EXCEL.EXE rundll32.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\document-2009388069.xls1⤵
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\rundll32.exerundll32 ..\woifm.cjd,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:2748