Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 22:33
Behavioral task
behavioral1
Sample
3130b51de26ed50e5b0641ca8907e426a3770a935ee14018e8be7e80043da179.xls
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
3130b51de26ed50e5b0641ca8907e426a3770a935ee14018e8be7e80043da179.xls
Resource
win10v2004-20241007-en
General
-
Target
3130b51de26ed50e5b0641ca8907e426a3770a935ee14018e8be7e80043da179.xls
-
Size
77KB
-
MD5
522611bd07375229efa38ccbc210bd80
-
SHA1
774843ab1a1bef5e92f24a8207a96e9f4a5e3adb
-
SHA256
3130b51de26ed50e5b0641ca8907e426a3770a935ee14018e8be7e80043da179
-
SHA512
77f09bbb7fb7f2914aca2c1ea08facd8e6f1509d7c596ef93306d6f4cd528d08878f50df8e4f8fd978c5ba7de20359cd948d64b3e825a32a6098e7096b76b4ef
-
SSDEEP
1536:ASKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgew+hD8nTLqQrRrZws8E6u:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg5
Malware Config
Extracted
http://natdemo.natrixsoftware.com/wp-admin/QyqiN/
http://luisangeja.com/COPYRIGHT/BJljffG6/
http://nerz.net/stats/KVIyooM/
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 5076 1352 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3692 1352 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1552 1352 regsvr32.exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1352 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1352 EXCEL.EXE 1352 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1352 wrote to memory of 5076 1352 EXCEL.EXE 86 PID 1352 wrote to memory of 5076 1352 EXCEL.EXE 86 PID 1352 wrote to memory of 3692 1352 EXCEL.EXE 87 PID 1352 wrote to memory of 3692 1352 EXCEL.EXE 87 PID 1352 wrote to memory of 1552 1352 EXCEL.EXE 91 PID 1352 wrote to memory of 1552 1352 EXCEL.EXE 91
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3130b51de26ed50e5b0641ca8907e426a3770a935ee14018e8be7e80043da179.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 C:\Uduw\soam1.OCX2⤵
- Process spawned unexpected child process
PID:5076
-
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 C:\Uduw\soam2.OCX2⤵
- Process spawned unexpected child process
PID:3692
-
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 C:\Uduw\soam3.OCX2⤵
- Process spawned unexpected child process
PID:1552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD51106d43f547e7be8028359c7afdb8b00
SHA1b7d87edec9e5435ceafb247f07a788dc1f75359a
SHA2563ece1e8989211e8e43f8ff8795899e3d59ad9e5b9f46097dfd5a9b4243adb567
SHA5121917134b55800daad14e201ff68f20dbc39d2ea22168994a057a40829e09aa6ca72d52a382ff261951228effbd6976d947ff4a3d48df918bb5c89fd89874f8c7