Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 22:00
Behavioral task
behavioral1
Sample
ca828200b8e5b740b9f2a497954fbcdd8f6d0287c875eb670bed508c29f7374a.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ca828200b8e5b740b9f2a497954fbcdd8f6d0287c875eb670bed508c29f7374a.xls
Resource
win10v2004-20240802-en
General
-
Target
ca828200b8e5b740b9f2a497954fbcdd8f6d0287c875eb670bed508c29f7374a.xls
-
Size
126KB
-
MD5
9f5cb57e7c236901f7c5e3d21431f283
-
SHA1
6d1d0c782ee64f1ea3f7ba94bfa05f3b87aa4c6d
-
SHA256
ca828200b8e5b740b9f2a497954fbcdd8f6d0287c875eb670bed508c29f7374a
-
SHA512
73a0b2aad5c7642d5540256d1bb4324742ded6a3a70bf8573a344487f741590cde943908e83b083592d563c6bd28cc467015e4ebeeb86f33f6be902bd38bfaad
-
SSDEEP
3072:ssKpbdrHYrMue8q7QPX+5xtekEdi8/dgt3Syz+nzQIceCRlCK:TKpbdrHYrMue8q7QPX+5xtFEdi8/dgtb
Malware Config
Extracted
http://drvishalchestclinic.com/wp-includes/SqqCZQ6y2uyFF/
http://funestotal.com/5aclo1em/21U/
http://g-wizcomputers.com/party/61W0ovBu86/
http://primefind.com/1mall-uk/h5/
http://la-csi.com/mt-admin/BB7/
https://pancook.com/newsite/H6xxeLefX1I2vgJFM1Y/
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2364 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2364 EXCEL.EXE 2364 EXCEL.EXE 2364 EXCEL.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\ca828200b8e5b740b9f2a497954fbcdd8f6d0287c875eb670bed508c29f7374a.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2364