Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 23:52
Behavioral task
behavioral1
Sample
c993916bdf6c9185eddd5af5c1560ddddd8f30e988f6068acc9d0e412c7f9406.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c993916bdf6c9185eddd5af5c1560ddddd8f30e988f6068acc9d0e412c7f9406.xls
Resource
win10v2004-20241007-en
General
-
Target
c993916bdf6c9185eddd5af5c1560ddddd8f30e988f6068acc9d0e412c7f9406.xls
-
Size
95KB
-
MD5
e6dcacf406448d613c9aee37d89b8682
-
SHA1
ab60afdb3021230dde3467098cda72a2b761e44a
-
SHA256
c993916bdf6c9185eddd5af5c1560ddddd8f30e988f6068acc9d0e412c7f9406
-
SHA512
cadcfe630ef1af437b7d6162b50d165530af482ecc293b9d3a3f000e003abaf415bd4fb3d10d52cd5e83faa04c7f404a551076ebc60d5b5799bff6a52b5857db
-
SSDEEP
1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCs+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgm
Malware Config
Extracted
http://francite.net/images/XI7zS0X1nY/
https://cointrade.world/receipts/Sa6fYJpecEVqiRf05/
http://gedebey-tvradio.info/wp-includes/nOmdPyUpDB/
http://haircutbar.com/cgi-bin/SpJT9OKPmUpJfkGqv/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4484 2844 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3012 2844 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2276 2844 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3672 2844 regsvr32.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2844 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2844 EXCEL.EXE 2844 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2844 EXCEL.EXE 2844 EXCEL.EXE 2844 EXCEL.EXE 2844 EXCEL.EXE 2844 EXCEL.EXE 2844 EXCEL.EXE 2844 EXCEL.EXE 2844 EXCEL.EXE 2844 EXCEL.EXE 2844 EXCEL.EXE 2844 EXCEL.EXE 2844 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2844 wrote to memory of 4484 2844 EXCEL.EXE 87 PID 2844 wrote to memory of 4484 2844 EXCEL.EXE 87 PID 2844 wrote to memory of 3012 2844 EXCEL.EXE 88 PID 2844 wrote to memory of 3012 2844 EXCEL.EXE 88 PID 2844 wrote to memory of 2276 2844 EXCEL.EXE 89 PID 2844 wrote to memory of 2276 2844 EXCEL.EXE 89 PID 2844 wrote to memory of 3672 2844 EXCEL.EXE 90 PID 2844 wrote to memory of 3672 2844 EXCEL.EXE 90
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\c993916bdf6c9185eddd5af5c1560ddddd8f30e988f6068acc9d0e412c7f9406.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci1.ocx2⤵
- Process spawned unexpected child process
PID:4484
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci2.ocx2⤵
- Process spawned unexpected child process
PID:3012
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci3.ocx2⤵
- Process spawned unexpected child process
PID:2276
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci4.ocx2⤵
- Process spawned unexpected child process
PID:3672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5816545f3f6704006dafbba201129a2b8
SHA1e2be339447f20057bfc5a37471fb40cd1458e893
SHA2560d77d69f91c465bb4831d2d40d629b1ff67c08d259ae333f30abae048f3253ca
SHA5128f0b2a564284dd01a11d4a26c80d5f3c9efc887dd28b6eef493bd326160cb4d14131e292f7e5b2b1f368838958d7068eff87ece6f362c9f211ce59f96b9043e5