Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 22:19
Behavioral task
behavioral1
Sample
fb2c747257401566f68b9d54fb6df8cb8b8aca892c48e8e0d045922e0eb39019.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb2c747257401566f68b9d54fb6df8cb8b8aca892c48e8e0d045922e0eb39019.xlsm
Resource
win10v2004-20241007-en
General
-
Target
fb2c747257401566f68b9d54fb6df8cb8b8aca892c48e8e0d045922e0eb39019.xlsm
-
Size
21KB
-
MD5
3d8f9e4f46b15a710a5c02e45ec50b2d
-
SHA1
f6ffdf99a85d4f48c91ac0a0dea42374c7eee770
-
SHA256
fb2c747257401566f68b9d54fb6df8cb8b8aca892c48e8e0d045922e0eb39019
-
SHA512
dd033adb814a1c23a244fe93a3c03768f13d3073917ad2a33967191b8070a53cfff750b713cd512da18f94557c2f22ca92ee8f5c9f385dbe8135d99ce85f0dc5
-
SSDEEP
384:z3uAi/NjIVRS8EibbwBlw75SYrLb5CzgObff9kC+xbX74eII:XsNs/zXtFCBn9kC+xbL42
Malware Config
Extracted
https://www.almoeqatar.com/cgi-bin/3g/
http://www.ayelet.info/wp-admin/oHRoG0X9ubuNtQ/
http://www.lavameapp.com.ar/slide-images/7bzQevDGMld/
http://lista33rivera.uy/wp-content/jiBtjSaJMcM/
http://cenaf.com.co/error/TpewL/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3772 2940 regsvr32.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2940 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2940 EXCEL.EXE 2940 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2940 EXCEL.EXE 2940 EXCEL.EXE 2940 EXCEL.EXE 2940 EXCEL.EXE 2940 EXCEL.EXE 2940 EXCEL.EXE 2940 EXCEL.EXE 2940 EXCEL.EXE 2940 EXCEL.EXE 2940 EXCEL.EXE 2940 EXCEL.EXE 2940 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2940 wrote to memory of 3772 2940 EXCEL.EXE 96 PID 2940 wrote to memory of 3772 2940 EXCEL.EXE 96 PID 2940 wrote to memory of 3772 2940 EXCEL.EXE 96
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\fb2c747257401566f68b9d54fb6df8cb8b8aca892c48e8e0d045922e0eb39019.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe -s ..\rfs.dll2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:3772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5a243dea6e90ad391ed2f86213929a184
SHA148600ab9a561a64afe40129587cdb320493082d8
SHA256e9a9f058c8d61948dba736554bec51c0bec5e32cebec572e596b3d33fe5a5eef
SHA512e00813c403f356edcbc0d999e6db3b582ab22e4049e566a557dcfa1932ec2b2241f8269141ff0aac7113880c4d62dc2ee46ac85635263a94f8d1bb4a800cca29
-
Filesize
3KB
MD58713dd892ec0930f713e13141920c5ad
SHA1a3e081efb5b6c974622ac191f8412f8b4f995b6e
SHA256cfd81c97ae0c2d0a50e698d7dd7b5f7aa323ce219c7c56ab49bbab85bab2d0fb
SHA5121c76c7e9b5d4fd7f354f3c727ccbd5ee93c94cecb0654e7af757d5eb9992fa186cd03c4915cf1f8b5d1b3ab9461ddb01b51da3b0f7bea6411314ecd962306a4f