Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:28
Behavioral task
behavioral1
Sample
39c3fbad47c272f40d89d6113ce42bf74c6e40f59ab63c35cbac9ce7a5d3c2f3.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39c3fbad47c272f40d89d6113ce42bf74c6e40f59ab63c35cbac9ce7a5d3c2f3.xlsm
Resource
win10v2004-20241007-en
General
-
Target
39c3fbad47c272f40d89d6113ce42bf74c6e40f59ab63c35cbac9ce7a5d3c2f3.xlsm
-
Size
46KB
-
MD5
2c0c37e5d97eeb948f044256bd02fe94
-
SHA1
fbdf763070f142b66e449fa7dfe238c7bbd7e91e
-
SHA256
39c3fbad47c272f40d89d6113ce42bf74c6e40f59ab63c35cbac9ce7a5d3c2f3
-
SHA512
24dd8de6078ce71c315aaf7a39fcccd8fe394ee022608c0e39b7b650091f5be589106b0e72029640bc1caddb5bb069f0792c6b246cc41f2628514fb2f17f96d6
-
SSDEEP
768:bf4oTBvDOevZCwrvtjizdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Uh0VU2Vy0:z4olvDetT5fTR4Lh1NisFYBc3cr+UqV3
Malware Config
Extracted
https://patriciamirapsicologa.com/wp-includes/UfQQtX1LEVwNJPCx/
https://gavalisamajsevasangh.com/abcd-trey/q4hH2T12X/
https://yatrataxi.com/folwu/LC5yH9Ai0l/
https://thelastpeopleonearth-dayz.com/wp-content/V2mmGey/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2700 2100 regsvr32.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2100 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2100 EXCEL.EXE 2100 EXCEL.EXE 2100 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2700 2100 EXCEL.EXE 32 PID 2100 wrote to memory of 2700 2100 EXCEL.EXE 32 PID 2100 wrote to memory of 2700 2100 EXCEL.EXE 32 PID 2100 wrote to memory of 2700 2100 EXCEL.EXE 32 PID 2100 wrote to memory of 2700 2100 EXCEL.EXE 32 PID 2100 wrote to memory of 2700 2100 EXCEL.EXE 32 PID 2100 wrote to memory of 2700 2100 EXCEL.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\39c3fbad47c272f40d89d6113ce42bf74c6e40f59ab63c35cbac9ce7a5d3c2f3.xlsm1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe /s ..\enu.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5eaa47c643d99d57c286e7db1e20cde4a
SHA19499703abe808c8cd67a7d27fa74066d444424e7
SHA25696352b4c75c01a5651f4e25078156b01817f12541bd115ddc1591f9d8591b14a
SHA512b0f44caee3701eebb10bfc333adc14fce98487087756e9996e5bc404b9d469c95d9eb398aa27104fc0cbcdb4917ad7b04d2f1d52e9de0a69d03d0c4a964ae5e3