Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 19:05
Behavioral task
behavioral1
Sample
abd0ee709a4da53f98077949878ab7bf87a5aba28065527f3580c46d4cb52690.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
abd0ee709a4da53f98077949878ab7bf87a5aba28065527f3580c46d4cb52690.xls
Resource
win10v2004-20241007-en
General
-
Target
abd0ee709a4da53f98077949878ab7bf87a5aba28065527f3580c46d4cb52690.xls
-
Size
71KB
-
MD5
536dedd72bbc959b9c6c741f18d0c668
-
SHA1
11950368583f1fd376ac478700a0354cdb550991
-
SHA256
abd0ee709a4da53f98077949878ab7bf87a5aba28065527f3580c46d4cb52690
-
SHA512
20c66ed1fb5a87380b9a6a0d2ce55baba7f24ff617c593f863ef26898e0dd8c854fd1d839e8b3e064eb2ed0fe93c9c8715ea0e1a9255fb35744767ac90fd98cb
-
SSDEEP
1536:DhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+gH+hDcnTLiQrRTZws8EYy:FKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMj
Malware Config
Extracted
https://papillonweb.fr/wp-content/G8z08q0mj/
http://brennanasia.com/images/6IwPBHbnUvfgugV1b/
https://estacioesportivavilanovailageltru.cat/tmp/IgSyqwgJmE/
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1180 2656 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1516 2656 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1748 2656 regsvr32.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2656 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2656 EXCEL.EXE 2656 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2656 wrote to memory of 1180 2656 EXCEL.EXE 89 PID 2656 wrote to memory of 1180 2656 EXCEL.EXE 89 PID 2656 wrote to memory of 1516 2656 EXCEL.EXE 90 PID 2656 wrote to memory of 1516 2656 EXCEL.EXE 90 PID 2656 wrote to memory of 1748 2656 EXCEL.EXE 98 PID 2656 wrote to memory of 1748 2656 EXCEL.EXE 98
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\abd0ee709a4da53f98077949878ab7bf87a5aba28065527f3580c46d4cb52690.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\usoiy1.ocx2⤵
- Process spawned unexpected child process
PID:1180
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\usoiy2.ocx2⤵
- Process spawned unexpected child process
PID:1516
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\usoiy3.ocx2⤵
- Process spawned unexpected child process
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5dd018dc20cf263c9c6675cf75e108c68
SHA14fd62267cba4fad9d5b41edefa1d1a6956180c53
SHA25692684a341886e73fc177647495995b6855fd6e1588955acce092d2fc44ca6552
SHA512007bb718a2a396e059e966a169d6d425c64f9ce730d2d85d45ff0c4d6a73535c6b24ad4b68bfca94ba06fdcc2bd01f84bd7f8da4c784bbababd2054e411f32b7
-
Filesize
111KB
MD5a32ddff026d0c45aec7bf4c84fb00e6f
SHA1377fa6800165a19b9f2b760ba1b970ab3c09d3ae
SHA25679a01b0fa26cfd15bd528c57d32d2bb6e6a984f2b0f4d95d7b24dfcf1dcb89e9
SHA512de15e922e1bf7c43e73050acaedaa1b9c7978cf3ac29ccd24ce114617a93cd6d6fa035f9226bd32fa2c72892ffb8fdf92665b322e90ffeb82d85f306ee30cf9e
-
Filesize
56KB
MD5f34e4b7f769306519143947d83c03039
SHA1fb2af13bc0f9361decfce757beb46981c3d8b174
SHA256840cae86366b6237e49e8079658f8d6c6aa520a63e0c7b3958c57dc315f42462
SHA51230b689710e0ae951de8c44736e55a81751c0623dae07c0b207e0e90fb288857f11a6219848aed38a71612b5da36f1d7f7d38d0be07b17fe9a6b432aa16be014d