Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:50
Behavioral task
behavioral1
Sample
f9ca3a19f94ed50caa490d9afa1212246115e3fc5e3e95eab00270add20fa7b7.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9ca3a19f94ed50caa490d9afa1212246115e3fc5e3e95eab00270add20fa7b7.xls
Resource
win10v2004-20241007-en
General
-
Target
f9ca3a19f94ed50caa490d9afa1212246115e3fc5e3e95eab00270add20fa7b7.xls
-
Size
70KB
-
MD5
14529a11c13620d0673251c53ccbbf27
-
SHA1
9df0a2c633c89fa9888172866da126814093a6ce
-
SHA256
f9ca3a19f94ed50caa490d9afa1212246115e3fc5e3e95eab00270add20fa7b7
-
SHA512
be3d05502b12f1caf0953dab74951ebcbd1484bfad2b94dd4aac84e41ef000b53bd1915dbf364ee0f03948846c2fbc480d7bd020270b773c7b3f502045bd61ff
-
SSDEEP
1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+/+hDcnTLiQrRTZws8EbK:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM1
Malware Config
Extracted
https://prprofile.com/wp-admin/CIqrvgYsvBiBlIM/
https://retardantedefuegoperu.com/slider/rFhAa78/
http://survei.absensi.net/cc-content/YCcjkOA3ijYNu46Y/
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3748 316 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3752 316 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1412 316 regsvr32.exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 316 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 316 EXCEL.EXE 316 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 316 EXCEL.EXE 316 EXCEL.EXE 316 EXCEL.EXE 316 EXCEL.EXE 316 EXCEL.EXE 316 EXCEL.EXE 316 EXCEL.EXE 316 EXCEL.EXE 316 EXCEL.EXE 316 EXCEL.EXE 316 EXCEL.EXE 316 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 316 wrote to memory of 3748 316 EXCEL.EXE 87 PID 316 wrote to memory of 3748 316 EXCEL.EXE 87 PID 316 wrote to memory of 3752 316 EXCEL.EXE 88 PID 316 wrote to memory of 3752 316 EXCEL.EXE 88 PID 316 wrote to memory of 1412 316 EXCEL.EXE 90 PID 316 wrote to memory of 1412 316 EXCEL.EXE 90
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f9ca3a19f94ed50caa490d9afa1212246115e3fc5e3e95eab00270add20fa7b7.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa1.ocx2⤵
- Process spawned unexpected child process
PID:3748
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa2.ocx2⤵
- Process spawned unexpected child process
PID:3752
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa3.ocx2⤵
- Process spawned unexpected child process
PID:1412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5011816350d031493131bd34babcd1c37
SHA11afa54ac94302904d16e79389967987e1df2379c
SHA2569befa538494ff15d4abc7e2104a79df300ad8d4efdd463e43854993a8d41222d
SHA512d3bef42316e8f3e788f4a8e97e89aedf4b3279f92b3ded48d14736876bfbeadf08e5306a078da529714a9b9e514ba381f22eadbf8fdce6ceaf988ab7cfaac103