Analysis
-
max time kernel
133s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 23:21
Behavioral task
behavioral1
Sample
Change of Address.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Change of Address.xls
Resource
win10v2004-20241007-en
General
-
Target
Change of Address.xls
-
Size
91KB
-
MD5
30c683519923457efd9422b2eb3f2421
-
SHA1
be84a1176ebff85b4790a8fa10cb68c6c8d9c10b
-
SHA256
e41862e6cf7c3206fe699b624046c6d3f7ecd59fce0ddca1aadcc87b30545949
-
SHA512
542784a3fc79a5444d849b5c906765f79dd670b517db86970e9dcaca2f91893cc07f2ee85d1d702419cfa370b0e7edd9432151c30d36da028a58e01445c04192
-
SSDEEP
1536:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgzbCXuZH4gb4CEn9J4ZIgT:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg5
Malware Config
Extracted
http://wordpress.xinmoshiwang.com/list/1N5ty/
http://ftp.appleshipstores.com/admin/8rsSDMyJv31SRdz/
http://onaltiyadokuz.net/wp-snapshots/9Fvr0E6cY/
http://cepasvirtual.com.ar/moodle/Lb4gSXE/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2528 3188 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4028 3188 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1212 3188 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3040 3188 regsvr32.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3188 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3188 EXCEL.EXE 3188 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3188 EXCEL.EXE 3188 EXCEL.EXE 3188 EXCEL.EXE 3188 EXCEL.EXE 3188 EXCEL.EXE 3188 EXCEL.EXE 3188 EXCEL.EXE 3188 EXCEL.EXE 3188 EXCEL.EXE 3188 EXCEL.EXE 3188 EXCEL.EXE 3188 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3188 wrote to memory of 2528 3188 EXCEL.EXE 87 PID 3188 wrote to memory of 2528 3188 EXCEL.EXE 87 PID 3188 wrote to memory of 4028 3188 EXCEL.EXE 88 PID 3188 wrote to memory of 4028 3188 EXCEL.EXE 88 PID 3188 wrote to memory of 1212 3188 EXCEL.EXE 92 PID 3188 wrote to memory of 1212 3188 EXCEL.EXE 92 PID 3188 wrote to memory of 3040 3188 EXCEL.EXE 96 PID 3188 wrote to memory of 3040 3188 EXCEL.EXE 96
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Change of Address.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx2⤵
- Process spawned unexpected child process
PID:2528
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx2⤵
- Process spawned unexpected child process
PID:4028
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx2⤵
- Process spawned unexpected child process
PID:1212
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx2⤵
- Process spawned unexpected child process
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5e29b254cc975b35325bd907781a15e93
SHA1340462ea3233add6a4200f8bfd06fa6211625ca5
SHA256f2d55b8a1a25fb95d225bf031e8c0d170e380fae1d43efdf5fe9b51838cc5680
SHA512287133b5a7705a6f8106c9254daa6e54ebc219a2dab78d36e6a0f021cba35da42035a8b2c830dceb1136963116628f85a7c7d2faffa26bdfa0cde406c1de44f9