Analysis
-
max time kernel
133s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 22:11
Behavioral task
behavioral1
Sample
ca522d9cf74cbce1b26dc5fa09e144581aa698e9acffd5cd35672a940c8e41d3.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ca522d9cf74cbce1b26dc5fa09e144581aa698e9acffd5cd35672a940c8e41d3.xlsm
Resource
win10v2004-20241007-en
General
-
Target
ca522d9cf74cbce1b26dc5fa09e144581aa698e9acffd5cd35672a940c8e41d3.xlsm
-
Size
32KB
-
MD5
106114b7bcca39c90e8b96a9ee4eacf1
-
SHA1
65785d4bc5347d6b9335e951cf269640f6541cf1
-
SHA256
ca522d9cf74cbce1b26dc5fa09e144581aa698e9acffd5cd35672a940c8e41d3
-
SHA512
800fbafb764b2c04e3e2b02b4ce6b8e771e399b63d6c5bbd6f0336510dcda8cc4fb6b84beac487071b9d7cb38fd1f709569f16fbe10a190f0c0dc4a72199f5a7
-
SSDEEP
768:cjf8WFhN7beEizXT2LxdFfPdkqstJVE6D:2EsTXrgXUndkq8E6D
Malware Config
Extracted
https://www.alejandrovillar.com/MSL/eKDWjpa4OHRxpysOTFe/
https://alejandrastamateas.com/web/ZxA3zHwsH3r/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exedescription pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1992 1988 regsvr32.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 1988 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid Process 1988 EXCEL.EXE 1988 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid Process 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
EXCEL.EXEdescription pid Process procid_target PID 1988 wrote to memory of 1992 1988 EXCEL.EXE 87 PID 1988 wrote to memory of 1992 1988 EXCEL.EXE 87 PID 1988 wrote to memory of 1992 1988 EXCEL.EXE 87
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ca522d9cf74cbce1b26dc5fa09e144581aa698e9acffd5cd35672a940c8e41d3.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe -s ..\rfs.dll2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD585ec4734091aacc85a60ef44ba8ac4a9
SHA1f392683af835c77b7b19363c4491fd3efb7c5eda
SHA256ea1858b1548945ddc80ce3df2098039a85437dd98d5478a358be3ba72958e05b
SHA5129c46d9f91a7ac1043c9978c24a1ddcfa830e587fa0cb55a047c139018e99a2fb4b8af6b735e4c21311867577b65f9633ce4ec4161fe88fe1f5f7a06f1d4d136e
-
Filesize
202KB
MD5539f9cf69b3477bbade872f9cb2c20da
SHA17739ad0149b311693d4d4e70020ad9f15dbf9c31
SHA25614c16bddc40f6d3afa927344d84c04117832fe52d562dc4c9e153abfe6410f01
SHA5124b80165fe14089298a826cd034a86039291a798f82984e8bd6966761937ea3595834ed4813140d9b8d8d36bce8be726e1bf14edae0c868738dcd79dde07bd8dd