Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 22:50
Behavioral task
behavioral1
Sample
f354b73f8696c401171ba3e75b9a771ace73c34a24088b05abafefdfb77c04a8.xls
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
f354b73f8696c401171ba3e75b9a771ace73c34a24088b05abafefdfb77c04a8.xls
Resource
win10v2004-20241007-en
General
-
Target
f354b73f8696c401171ba3e75b9a771ace73c34a24088b05abafefdfb77c04a8.xls
-
Size
77KB
-
MD5
092c3315ec4ba8739afa849dc02a0d17
-
SHA1
082cdf2623237670c697ba6e43347aadb36ff2cc
-
SHA256
f354b73f8696c401171ba3e75b9a771ace73c34a24088b05abafefdfb77c04a8
-
SHA512
465d2a5d7a861aa63f5135a1db80e4dc3a66282009ba5e3d83729e663eca02723b93e42aa21dc912b987c30053fb1e0c494e3c9278fbbdca4d0ef0ebea036ad3
-
SSDEEP
1536:ASKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgW2+hD8nTLqQrRrZws8ErU:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0
Malware Config
Extracted
https://trusttransport-eg.com/wp-admin/rphDfzbs/
https://thuexevanphong.com/wp-content/F6JRN/
http://thisiselizabethj.com/wp-content/qeg16EZwSZy2/
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3664 2116 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 868 2116 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 892 2116 regsvr32.exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2116 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2116 EXCEL.EXE 2116 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2116 wrote to memory of 3664 2116 EXCEL.EXE 86 PID 2116 wrote to memory of 3664 2116 EXCEL.EXE 86 PID 2116 wrote to memory of 868 2116 EXCEL.EXE 89 PID 2116 wrote to memory of 868 2116 EXCEL.EXE 89 PID 2116 wrote to memory of 892 2116 EXCEL.EXE 91 PID 2116 wrote to memory of 892 2116 EXCEL.EXE 91
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f354b73f8696c401171ba3e75b9a771ace73c34a24088b05abafefdfb77c04a8.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 C:\Uduw\soam1.OCX2⤵
- Process spawned unexpected child process
PID:3664
-
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 C:\Uduw\soam2.OCX2⤵
- Process spawned unexpected child process
PID:868
-
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 C:\Uduw\soam3.OCX2⤵
- Process spawned unexpected child process
PID:892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD53798d7cbe6d2c36544741456872b8c27
SHA1bbb50c05af52a8cd20017ffa1f095855c97f9f5b
SHA25615246d4dbd5093b629c2bace36140be94812ffe7e531c3da6f36d9064dce815f
SHA5122eb49afa1828d787493caadd0e6f18c512470ab7fa5085299fd67489108f32f0696196f497ea69cb7542ca7a838ec0ebf470507532c74492278e390331177cb4