Analysis
-
max time kernel
61s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 17:45
Behavioral task
behavioral1
Sample
b713e6a79b56f1e25b6522d46c4827d494af9ead0db671ffb8b4853969fc090f.xlsm
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b713e6a79b56f1e25b6522d46c4827d494af9ead0db671ffb8b4853969fc090f.xlsm
Resource
win10v2004-20241007-en
General
-
Target
b713e6a79b56f1e25b6522d46c4827d494af9ead0db671ffb8b4853969fc090f.xlsm
-
Size
46KB
-
MD5
8e743641a4ec5482dbb19c4a393ffcde
-
SHA1
6f1f66582f94659b25f50be1d51240635418001a
-
SHA256
b713e6a79b56f1e25b6522d46c4827d494af9ead0db671ffb8b4853969fc090f
-
SHA512
73cad643fd916f9018ce7ced44897ec6007e0847ff3b3e452b8b7f81882f81ac686f06eccbb9d5fa34f96137e624378ab500e630e9e11447406936e3a6c86534
-
SSDEEP
768:KyMo9DOevZCwrvtE9WzdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Uh0VP9HW:jMo9D88tT5fTR4Lh1NisFYBc3cr+UqVk
Malware Config
Extracted
http://aquapark.hotelrestoranaqua.com/wp-includes/a1eCjuFRWXku/
https://baksen.org/chat/8wYoYwWXH4eidiUOAs/
https://truetvkerala.com/wp-admin/iocOOm7I/
https://lavanya-aesthetic.com/cgi-bin/PjtfI2BlnvUtlMV2vTR/
http://kopkomerc.rs/wp-includes/css/ErPamucLecQSqd/
http://restoran.hotelrestoranaqua.com/wp-includes/67I/
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2544 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2544 EXCEL.EXE 2544 EXCEL.EXE 2544 EXCEL.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\b713e6a79b56f1e25b6522d46c4827d494af9ead0db671ffb8b4853969fc090f.xlsm1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2544