Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:17
Behavioral task
behavioral1
Sample
7bc1973c947b9d36a72e86ea4d922c14abbfd356c67bd69b5c6644497fd3587f.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7bc1973c947b9d36a72e86ea4d922c14abbfd356c67bd69b5c6644497fd3587f.xlsm
Resource
win10v2004-20241007-en
General
-
Target
7bc1973c947b9d36a72e86ea4d922c14abbfd356c67bd69b5c6644497fd3587f.xlsm
-
Size
46KB
-
MD5
7b46d495e4e96202a1705c362e957e9f
-
SHA1
2a95df1280b7d7f9052e0e080e10700989e717c6
-
SHA256
7bc1973c947b9d36a72e86ea4d922c14abbfd356c67bd69b5c6644497fd3587f
-
SHA512
0e5f0e5977672a98d44d1332c086e93346fb238cb0519497b2f857561cc0772995563d5e7489b9df19afdd84c551146c16b4585539363bb94a580d264845a3c1
-
SSDEEP
768:31m2o0pOODOevZCwrvtTzdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Uh0Vf1V5f+:31HoadD3tT5fTR4Lh1NisFYBc3cr+Uqu
Malware Config
Extracted
http://rosywhitecleaningsolution.com/wp-admin/PqMw6fND8Bb1I4VPR10/
http://havilaholuemglobal.com/dofz29/ymIfCcEL8I5kjA6E/
http://www.floresguitarinstruction.com/wp-admin/jWlCX/
http://www.drcc.co.za/restoredcontent/nAKvnbRpazx7c/
http://aopda.org/wp-content/uploads/RDL75PME7OKHk4f/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 764 1560 regsvr32.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1560 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1560 EXCEL.EXE 1560 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1560 wrote to memory of 764 1560 EXCEL.EXE 89 PID 1560 wrote to memory of 764 1560 EXCEL.EXE 89 PID 1560 wrote to memory of 764 1560 EXCEL.EXE 89
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\7bc1973c947b9d36a72e86ea4d922c14abbfd356c67bd69b5c6644497fd3587f.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe /s ..\sei.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD51cf69a8c5308331b78df7aac042e2de9
SHA15fdadf78aa1211079a0aa3ee5130fb17ef4a7e13
SHA256244d25ddf01515c39ed0b6c0331ca501a1235373da044aaf6a16cebea64e46a9
SHA512c25ac1241e540d7c37bc42d650658ed06ffae90fbe021be6fdcf3bad0191a0506b0ce40b0e4b700e29d0992f20dabd09a1d00a0d8afbad7c6c956bb2b43eef24
-
Filesize
4KB
MD59514c99cfc73ca7c8f5024bc2e1fe031
SHA146df461d16bbea2fe07821111e4ffde089a78a6e
SHA256b8285971d7710605b7c359b61accca8c286066096b620e7cca24d4e534a6c726
SHA51231e0d5c0e5bbd0e38aa12604e975461e09ef5a12d8aef2ae562833714b9f33ba8e5edf77aa4918d939d2fc74d11a575c59fb3fa81c330f9a6c66af69ca83a237