Analysis
-
max time kernel
133s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:52
Behavioral task
behavioral1
Sample
d45aea2c8a2edccf518b2689d97ceba1b0ae3e7d504be578be6880466f63e10a.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d45aea2c8a2edccf518b2689d97ceba1b0ae3e7d504be578be6880466f63e10a.xlsm
Resource
win10v2004-20241007-en
General
-
Target
d45aea2c8a2edccf518b2689d97ceba1b0ae3e7d504be578be6880466f63e10a.xlsm
-
Size
30KB
-
MD5
237758f934238fea9abb35fa226a9161
-
SHA1
426a7e888a7abb775843cd2b2fd203a2426efd29
-
SHA256
d45aea2c8a2edccf518b2689d97ceba1b0ae3e7d504be578be6880466f63e10a
-
SHA512
968e88dd80cbf2c2092eeaccb56c85b89275c13f226cbb21e94d4fd4d51f698c584819b948141c0a8e91700c48a39f55b39c91cb2c308c245331acb8eb173f06
-
SSDEEP
384:7842JZPFhNjtOA7icg0SCdiVH2KgUrNU/qWhZOdBNPJM+kqr9eCgh0k5M2E6v:sHFhNZliH2ydFfPdkqstJhE6v
Malware Config
Extracted
http://henrysfreshroast.com/6cc4ts0bkrOlXq/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3368 1920 regsvr32.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1920 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1920 EXCEL.EXE 1920 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1920 wrote to memory of 3368 1920 EXCEL.EXE 93 PID 1920 wrote to memory of 3368 1920 EXCEL.EXE 93 PID 1920 wrote to memory of 3368 1920 EXCEL.EXE 93
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d45aea2c8a2edccf518b2689d97ceba1b0ae3e7d504be578be6880466f63e10a.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe -s ..\rfs.dll2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:3368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD59e81e0c19e758a91235bc68f9bd6668e
SHA1e1c67cca49de82620e845f7c53d9698254ea6e25
SHA256e60dcbb4d96badbd8d6e841b9fded7ab418f06dad35de45697e3f211a0cc92d2
SHA5123c44532582b99d4f166ad8cb8adfa833cf90f206f98804ba402661b5151bcbd8238e847741f4217709740caf001fb9b632722dd53336c30c4e133ccfc6119fba
-
Filesize
56KB
MD5d5cbf3235a39c09c9d292dafdf0393a5
SHA1ae109e202e6f0965b47f38ee29b3725800939a9f
SHA256208d15c175407bc56c9e1d1a6e31290cf8c04fe1da742e4ad0dbe06960b7f1dd
SHA512202212aeb1cabe772e05ec7649b83be4a04b68b644a1621993e91e370dc0b9de268ea50f0dab3a74178ecb648d06b5173222d3ed1f0e31d04abeded020b079bd