Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:28
Behavioral task
behavioral1
Sample
39c3fbad47c272f40d89d6113ce42bf74c6e40f59ab63c35cbac9ce7a5d3c2f3.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39c3fbad47c272f40d89d6113ce42bf74c6e40f59ab63c35cbac9ce7a5d3c2f3.xlsm
Resource
win10v2004-20241007-en
General
-
Target
39c3fbad47c272f40d89d6113ce42bf74c6e40f59ab63c35cbac9ce7a5d3c2f3.xlsm
-
Size
46KB
-
MD5
2c0c37e5d97eeb948f044256bd02fe94
-
SHA1
fbdf763070f142b66e449fa7dfe238c7bbd7e91e
-
SHA256
39c3fbad47c272f40d89d6113ce42bf74c6e40f59ab63c35cbac9ce7a5d3c2f3
-
SHA512
24dd8de6078ce71c315aaf7a39fcccd8fe394ee022608c0e39b7b650091f5be589106b0e72029640bc1caddb5bb069f0792c6b246cc41f2628514fb2f17f96d6
-
SSDEEP
768:bf4oTBvDOevZCwrvtjizdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Uh0VU2Vy0:z4olvDetT5fTR4Lh1NisFYBc3cr+UqV3
Malware Config
Extracted
https://patriciamirapsicologa.com/wp-includes/UfQQtX1LEVwNJPCx/
https://gavalisamajsevasangh.com/abcd-trey/q4hH2T12X/
https://yatrataxi.com/folwu/LC5yH9Ai0l/
https://thelastpeopleonearth-dayz.com/wp-content/V2mmGey/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 808 872 regsvr32.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 872 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 872 EXCEL.EXE 872 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 872 EXCEL.EXE 872 EXCEL.EXE 872 EXCEL.EXE 872 EXCEL.EXE 872 EXCEL.EXE 872 EXCEL.EXE 872 EXCEL.EXE 872 EXCEL.EXE 872 EXCEL.EXE 872 EXCEL.EXE 872 EXCEL.EXE 872 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 872 wrote to memory of 808 872 EXCEL.EXE 94 PID 872 wrote to memory of 808 872 EXCEL.EXE 94 PID 872 wrote to memory of 808 872 EXCEL.EXE 94
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\39c3fbad47c272f40d89d6113ce42bf74c6e40f59ab63c35cbac9ce7a5d3c2f3.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe /s ..\enu.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5fb0b6105d16aeacf176c34f0908876f7
SHA1255d48a4143001fad85160ca93d9cb68cacbfe17
SHA25604e32ec2ba5856cf61faa012b9e7444191266358fc7eaf4522f0aab0dde3836d
SHA5120d3560de9c26cd39c764e2c2d9c9c82c8bd30f5fa490217549ba27b12d1f31ca45f6b5a5fecad171c210361b7da36f5613c08c40739f0f9fe2bfbd570876461f
-
Filesize
169KB
MD5e76846433a1b8fe47f40bab3f744b821
SHA133b039c48582389e80490c20d45add33ac539df1
SHA256cd283024ab3cef2feb043396e7c1116d36c22ab6f63d33ea05a9c90e9317cb94
SHA512ed988cfe0aff6a7f7e77ddb6ad91f464d90e0290c32b38f82459ea319376a93793aef68ffe4a05db3c0285a4df11e52dd4d0d093a076e814b4758bb418b8ab00