Analysis
-
max time kernel
47s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 21:48
Behavioral task
behavioral1
Sample
57abba3a5175ff7eefe3e2547cc27d0ccb62282fda8443f2281dfcbe8b6b32c0.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
57abba3a5175ff7eefe3e2547cc27d0ccb62282fda8443f2281dfcbe8b6b32c0.xls
Resource
win10v2004-20240802-en
General
-
Target
57abba3a5175ff7eefe3e2547cc27d0ccb62282fda8443f2281dfcbe8b6b32c0.xls
-
Size
46KB
-
MD5
09bc237236bc1b00cb08555a8c8e7fcc
-
SHA1
6adbada8ff6967c3ff445ea39c2b4e59382a3b6a
-
SHA256
57abba3a5175ff7eefe3e2547cc27d0ccb62282fda8443f2281dfcbe8b6b32c0
-
SHA512
d86da1405e765ef1a21b9dac5b3f1d5f7f0e7d060637e27d07924e9bb215921b761200956b1a6c74b32e3e22e29d99da4a37ea5525ca7c9d5017c401dd6ed468
-
SSDEEP
768:LDMPKpb8rGYrMPe3q7Q0XV5xtezE8vpI8UM+VmQs7iqj/X20eu2p:LYKpb8rGYrMPe3q7Q0XV5xtezE8vG8U1
Malware Config
Extracted
https://www.yedirenkajans.com/eski/y91J/
http://yahir-fz.com/joy/ZnIjgkgZ18/
http://www.wahkiulogistics.com.hk/upload/AvtsILsT00O/
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1160 228 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4676 228 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4668 228 regsvr32.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 228 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 228 EXCEL.EXE 228 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE 228 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 228 wrote to memory of 1160 228 EXCEL.EXE 90 PID 228 wrote to memory of 1160 228 EXCEL.EXE 90 PID 228 wrote to memory of 4676 228 EXCEL.EXE 93 PID 228 wrote to memory of 4676 228 EXCEL.EXE 93 PID 228 wrote to memory of 4668 228 EXCEL.EXE 95 PID 228 wrote to memory of 4668 228 EXCEL.EXE 95
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\57abba3a5175ff7eefe3e2547cc27d0ccb62282fda8443f2281dfcbe8b6b32c0.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\wdusx1.ocx2⤵
- Process spawned unexpected child process
PID:1160
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\wdusx2.ocx2⤵
- Process spawned unexpected child process
PID:4676
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\wdusx3.ocx2⤵
- Process spawned unexpected child process
PID:4668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD511af75ab6b06bcc1150eeb290af1b6f1
SHA183d855ea9dc8a81bc472dc21be1f9b3450345910
SHA2563aff43e3b389df85132399be293c1d878f783dcacf3f72c4270e7399a8fa3c78
SHA5121d9a9ab9f345614f14b406fc3f27d1e1153be137e5f5ea3a001cac2e3fb2d57a505b7be7aaa96b534a700f852b8cf2175d23f3bc6a0652da2b7ccac27edbdfc5