Analysis
-
max time kernel
133s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 22:12
Behavioral task
behavioral1
Sample
5cc68c2f1eff8312f9f6b0fa2de5568cdb3a53dbc28af045d20add45b07306a6.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5cc68c2f1eff8312f9f6b0fa2de5568cdb3a53dbc28af045d20add45b07306a6.xls
Resource
win10v2004-20241007-en
General
-
Target
5cc68c2f1eff8312f9f6b0fa2de5568cdb3a53dbc28af045d20add45b07306a6.xls
-
Size
95KB
-
MD5
2777ae5b274350736854aba8dc99d622
-
SHA1
2610d5c95954ec6a8c74c40899c1a886532bc43e
-
SHA256
5cc68c2f1eff8312f9f6b0fa2de5568cdb3a53dbc28af045d20add45b07306a6
-
SHA512
abb27b8064c2d2e6ce82b8f81c357826463095ca882aa81aaae0ab99aba2d9a28c28898f10027e459a4c64a93fd6c61395ff03a993877efe81d026d3437b43ac
-
SSDEEP
1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJml:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgI
Malware Config
Extracted
https://fikti.bem.gunadarma.ac.id/SDM/YH8OJ1Zz8miBX/
http://ebuysa.co.za/yt-assets/yZ30/
http://3dstudioa.com.br/files/1ubPAB/
http://boardmart.co.za/images/DvMHPbTLn/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exedescription pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3992 1404 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 5116 1404 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1480 1404 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2348 1404 regsvr32.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 1404 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid Process 1404 EXCEL.EXE 1404 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid Process 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
EXCEL.EXEdescription pid Process procid_target PID 1404 wrote to memory of 3992 1404 EXCEL.EXE 87 PID 1404 wrote to memory of 3992 1404 EXCEL.EXE 87 PID 1404 wrote to memory of 5116 1404 EXCEL.EXE 94 PID 1404 wrote to memory of 5116 1404 EXCEL.EXE 94 PID 1404 wrote to memory of 1480 1404 EXCEL.EXE 96 PID 1404 wrote to memory of 1480 1404 EXCEL.EXE 96 PID 1404 wrote to memory of 2348 1404 EXCEL.EXE 98 PID 1404 wrote to memory of 2348 1404 EXCEL.EXE 98
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\5cc68c2f1eff8312f9f6b0fa2de5568cdb3a53dbc28af045d20add45b07306a6.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci1.ocx2⤵
- Process spawned unexpected child process
PID:3992
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci2.ocx2⤵
- Process spawned unexpected child process
PID:5116
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci3.ocx2⤵
- Process spawned unexpected child process
PID:1480
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci4.ocx2⤵
- Process spawned unexpected child process
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5442625ffb5afaceb4c23497a3b25dd71
SHA1f1a1618fbcbabcb4b95ba2c62569de00fe8d730c
SHA2560601d3f7ffa5d8278fc4de16c64f8350280ecd7d5c10d307e1937fd717ef6032
SHA512d86e7234a56d6810e731636a5f467898a4fa58be98a3d496f14398392f1651ac16640b18a18415395a9e2cf4f15dbe2a3ee1fc0931397a36b6ae75de03f6dcd1