Analysis
-
max time kernel
133s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 19:40
Behavioral task
behavioral1
Sample
7563569b2c5bfe5126ef2970e72e0f70f1c6afbff771c399f1d66ce22cdd6dc0.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7563569b2c5bfe5126ef2970e72e0f70f1c6afbff771c399f1d66ce22cdd6dc0.xls
Resource
win10v2004-20241007-en
General
-
Target
7563569b2c5bfe5126ef2970e72e0f70f1c6afbff771c399f1d66ce22cdd6dc0.xls
-
Size
67KB
-
MD5
741131c307b34deb0610f69f7f478500
-
SHA1
0ef4db6a3b266064dbae5e90bcb7ba764d69afc7
-
SHA256
7563569b2c5bfe5126ef2970e72e0f70f1c6afbff771c399f1d66ce22cdd6dc0
-
SHA512
13dfa544dc9410ac8d1c742af3563b08440a7b21ac88f209e258bd641b7c6e4ab7c7b9d4bda7332330cde6b9bf39506dad0868cc6fe69fa53b7794d6c0f8cee8
-
SSDEEP
1536:nVKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+u9s1a6YG2jzQ0viPvDNHhGtw:VKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMY
Malware Config
Extracted
https://www.melisetotoaksesuar.com/catalog/controller/account/dqfKI/
http://elamurray.com/athletics-carnival-2018/3UTZYr9D9f/
http://masyuk.com/581voyze/MlX/
http://jr-software-web.net/aaabackupsqldb/11hYk3bHJ/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3668 1360 regsvr32.exe 83 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4488 1360 regsvr32.exe 83 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1816 1360 regsvr32.exe 83 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2564 1360 regsvr32.exe 83 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1360 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1360 EXCEL.EXE 1360 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1360 wrote to memory of 3668 1360 EXCEL.EXE 92 PID 1360 wrote to memory of 3668 1360 EXCEL.EXE 92 PID 1360 wrote to memory of 4488 1360 EXCEL.EXE 93 PID 1360 wrote to memory of 4488 1360 EXCEL.EXE 93 PID 1360 wrote to memory of 1816 1360 EXCEL.EXE 94 PID 1360 wrote to memory of 1816 1360 EXCEL.EXE 94 PID 1360 wrote to memory of 2564 1360 EXCEL.EXE 97 PID 1360 wrote to memory of 2564 1360 EXCEL.EXE 97
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\7563569b2c5bfe5126ef2970e72e0f70f1c6afbff771c399f1d66ce22cdd6dc0.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx2⤵
- Process spawned unexpected child process
PID:3668
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx2⤵
- Process spawned unexpected child process
PID:4488
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx2⤵
- Process spawned unexpected child process
PID:1816
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx2⤵
- Process spawned unexpected child process
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
612KB
MD58745f4ff0d12a66421211ba9667c2302
SHA1204f9d0c63277375491adf6703dcf8341e563ed7
SHA2568d18a0bcb7963d571b6ce72a22dea53bf107aa6f5de3b5ea3eb176eac49f721b
SHA5121bda92e6e477dfa57a00e8b8784c5bd2b1de44df5b4c04ff7ec6e751c8853b16e64ba02e616c545fc85e482e5ec378b0c8dd0d5d14ad2e84101f56958a71f13e