Analysis
-
max time kernel
133s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 22:04
Behavioral task
behavioral1
Sample
3dcf128678fc790168be4009699ba48a3dec04d811db15b82e796f343f6e5fc5.xls
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
3dcf128678fc790168be4009699ba48a3dec04d811db15b82e796f343f6e5fc5.xls
Resource
win10v2004-20241007-en
General
-
Target
3dcf128678fc790168be4009699ba48a3dec04d811db15b82e796f343f6e5fc5.xls
-
Size
95KB
-
MD5
86aad18fb24ff4ceb852b2245ab406f1
-
SHA1
024bb509e47995593c973b90e8836c3653cd6d16
-
SHA256
3dcf128678fc790168be4009699ba48a3dec04d811db15b82e796f343f6e5fc5
-
SHA512
671b6020a0c70e033744ac2be7eb176a77af80c723cab844e0ef52c618ec31a7a2c66df6a89b608320a7955a7b04028d32d1fbc67cb3dceab7dfbafec48cb58d
-
SSDEEP
1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJmA:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgO
Malware Config
Extracted
https://cointrade.world/receipts/0LjXVwpQrhw/
http://www.garantihaliyikama.com/wp-admin/jp64lssPHEe2ii/
http://haircutbar.com/cgi-bin/BC3WAQ8zJY4ALXA4/
http://airhobi.com/system/WLvH1ygkOYQO/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exedescription pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2848 32 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4040 32 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2920 32 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4480 32 regsvr32.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 32 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid Process 32 EXCEL.EXE 32 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid Process 32 EXCEL.EXE 32 EXCEL.EXE 32 EXCEL.EXE 32 EXCEL.EXE 32 EXCEL.EXE 32 EXCEL.EXE 32 EXCEL.EXE 32 EXCEL.EXE 32 EXCEL.EXE 32 EXCEL.EXE 32 EXCEL.EXE 32 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
EXCEL.EXEdescription pid Process procid_target PID 32 wrote to memory of 2848 32 EXCEL.EXE 85 PID 32 wrote to memory of 2848 32 EXCEL.EXE 85 PID 32 wrote to memory of 4040 32 EXCEL.EXE 88 PID 32 wrote to memory of 4040 32 EXCEL.EXE 88 PID 32 wrote to memory of 2920 32 EXCEL.EXE 89 PID 32 wrote to memory of 2920 32 EXCEL.EXE 89 PID 32 wrote to memory of 4480 32 EXCEL.EXE 90 PID 32 wrote to memory of 4480 32 EXCEL.EXE 90
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3dcf128678fc790168be4009699ba48a3dec04d811db15b82e796f343f6e5fc5.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci1.ocx2⤵
- Process spawned unexpected child process
PID:2848
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci2.ocx2⤵
- Process spawned unexpected child process
PID:4040
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci3.ocx2⤵
- Process spawned unexpected child process
PID:2920
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci4.ocx2⤵
- Process spawned unexpected child process
PID:4480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD59806e7dc445bfddc55cdf80f2082c795
SHA14f599b52efa7dc71d170b143941daf49a846703b
SHA256f4d8c730eb20b23111d64db729a7046fd2979162cd5f5ffaffc1efa84042afcb
SHA5124147a59e2945afa76c0c2c801ec6829de2fc96c95f8f698eb8152194488ff5ebdaa6929139135730547d0492e0f823a281a7c15bbbfe03a38bbcc4fe55a67590