Analysis
-
max time kernel
61s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 19:05
Behavioral task
behavioral1
Sample
abd0ee709a4da53f98077949878ab7bf87a5aba28065527f3580c46d4cb52690.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
abd0ee709a4da53f98077949878ab7bf87a5aba28065527f3580c46d4cb52690.xls
Resource
win10v2004-20241007-en
General
-
Target
abd0ee709a4da53f98077949878ab7bf87a5aba28065527f3580c46d4cb52690.xls
-
Size
71KB
-
MD5
536dedd72bbc959b9c6c741f18d0c668
-
SHA1
11950368583f1fd376ac478700a0354cdb550991
-
SHA256
abd0ee709a4da53f98077949878ab7bf87a5aba28065527f3580c46d4cb52690
-
SHA512
20c66ed1fb5a87380b9a6a0d2ce55baba7f24ff617c593f863ef26898e0dd8c854fd1d839e8b3e064eb2ed0fe93c9c8715ea0e1a9255fb35744767ac90fd98cb
-
SSDEEP
1536:DhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+gH+hDcnTLiQrRTZws8EYy:FKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMj
Malware Config
Extracted
https://papillonweb.fr/wp-content/G8z08q0mj/
http://brennanasia.com/images/6IwPBHbnUvfgugV1b/
https://estacioesportivavilanovailageltru.cat/tmp/IgSyqwgJmE/
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2180 1736 regsvr32.exe 29 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2976 1736 regsvr32.exe 29 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2880 1736 regsvr32.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1736 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1736 EXCEL.EXE 1736 EXCEL.EXE 1736 EXCEL.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2180 1736 EXCEL.EXE 30 PID 1736 wrote to memory of 2180 1736 EXCEL.EXE 30 PID 1736 wrote to memory of 2180 1736 EXCEL.EXE 30 PID 1736 wrote to memory of 2180 1736 EXCEL.EXE 30 PID 1736 wrote to memory of 2180 1736 EXCEL.EXE 30 PID 1736 wrote to memory of 2180 1736 EXCEL.EXE 30 PID 1736 wrote to memory of 2180 1736 EXCEL.EXE 30 PID 1736 wrote to memory of 2976 1736 EXCEL.EXE 32 PID 1736 wrote to memory of 2976 1736 EXCEL.EXE 32 PID 1736 wrote to memory of 2976 1736 EXCEL.EXE 32 PID 1736 wrote to memory of 2976 1736 EXCEL.EXE 32 PID 1736 wrote to memory of 2976 1736 EXCEL.EXE 32 PID 1736 wrote to memory of 2976 1736 EXCEL.EXE 32 PID 1736 wrote to memory of 2976 1736 EXCEL.EXE 32 PID 1736 wrote to memory of 2880 1736 EXCEL.EXE 33 PID 1736 wrote to memory of 2880 1736 EXCEL.EXE 33 PID 1736 wrote to memory of 2880 1736 EXCEL.EXE 33 PID 1736 wrote to memory of 2880 1736 EXCEL.EXE 33 PID 1736 wrote to memory of 2880 1736 EXCEL.EXE 33 PID 1736 wrote to memory of 2880 1736 EXCEL.EXE 33 PID 1736 wrote to memory of 2880 1736 EXCEL.EXE 33
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\abd0ee709a4da53f98077949878ab7bf87a5aba28065527f3580c46d4cb52690.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\usoiy1.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2180
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\usoiy2.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2976
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\usoiy3.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD5a32ddff026d0c45aec7bf4c84fb00e6f
SHA1377fa6800165a19b9f2b760ba1b970ab3c09d3ae
SHA25679a01b0fa26cfd15bd528c57d32d2bb6e6a984f2b0f4d95d7b24dfcf1dcb89e9
SHA512de15e922e1bf7c43e73050acaedaa1b9c7978cf3ac29ccd24ce114617a93cd6d6fa035f9226bd32fa2c72892ffb8fdf92665b322e90ffeb82d85f306ee30cf9e
-
Filesize
56KB
MD5f3e93f7b10300556b1d1b9604fb7e7bf
SHA1da95b42a63032e759cc328eb3017ca66818ab1b5
SHA25629eb576c173760748533b4cb0e1acc87f383d7e62b665d0e9e1ac713f6dd9e75
SHA5123d27299712435718d4dd44482ac3caa6c0fb673fdf667f89c00cfd004c8c58ed3ec42aa74da81f40095308ccd2eaffc07e22820361931eb0c4973d6346b81110