Analysis
-
max time kernel
46s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 21:35
Behavioral task
behavioral1
Sample
f21f29b4f71c3d5488ee1fd5c0e029cea9a54a7fe5bf80e57dc61a75034be097.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f21f29b4f71c3d5488ee1fd5c0e029cea9a54a7fe5bf80e57dc61a75034be097.xls
Resource
win10v2004-20240802-en
General
-
Target
f21f29b4f71c3d5488ee1fd5c0e029cea9a54a7fe5bf80e57dc61a75034be097.xls
-
Size
95KB
-
MD5
c754f9367be5721d7bc3a0a90e12376e
-
SHA1
01f87c9d70cd034aa627e39e76d24632710ecbff
-
SHA256
f21f29b4f71c3d5488ee1fd5c0e029cea9a54a7fe5bf80e57dc61a75034be097
-
SHA512
2151fe74fce89a6e77a99920ef3e0363ec092a1c183459c75ac620dc865c8d8cbbb3797829912d4c067ef0e1c91a47349e1fd0d9fa5fac60d65f7e19fd057348
-
SSDEEP
1536:ySto05SVUsNwtzLT/KMuuAe0+OcfpUZGsMkvV:/t/SmsCpH/KZuAZGsMo
Malware Config
Extracted
http://dougveeder.com/cgi-bin/xJ91ZttGRioQ7IUL/
https://e-fistik.com/ajax/PnA23/
http://dsinformaticos.com/_private/f36Yl/
http://dstny.net/cgi-bin/POqJKcxiIzRb/
http://fakecity.net/cache/XtIzhyLEoLI7/
http://fayeschmidt.com/cgi-bin/Q8pj6/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4652 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4652 EXCEL.EXE 4652 EXCEL.EXE 4652 EXCEL.EXE 4652 EXCEL.EXE 4652 EXCEL.EXE 4652 EXCEL.EXE 4652 EXCEL.EXE 4652 EXCEL.EXE 4652 EXCEL.EXE 4652 EXCEL.EXE 4652 EXCEL.EXE 4652 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f21f29b4f71c3d5488ee1fd5c0e029cea9a54a7fe5bf80e57dc61a75034be097.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD52e3d34c9d90484f24d2965fd6ba3d5c1
SHA1465ea56f1cb16819aaca21c57d5927037e09f356
SHA256de8eadde9e62f9002d40e8a7f28b620133d1eee8c6f1b25f40b056d2cde69c67
SHA512affacd99acbb6658d07b5461f6ca7405d716a6e660b31785bd264fc52f0a397e8596a2810e1a51a3868c8b07d19d01d85bb55fc79d41153dba252a35b84e64b9