Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:52
Behavioral task
behavioral1
Sample
314bbb466cb64b7256469dc2b32577d020cf6c13b518c1d7994d7db49ff757e9.xlsm
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
314bbb466cb64b7256469dc2b32577d020cf6c13b518c1d7994d7db49ff757e9.xlsm
Resource
win10v2004-20241007-en
General
-
Target
314bbb466cb64b7256469dc2b32577d020cf6c13b518c1d7994d7db49ff757e9.xlsm
-
Size
20KB
-
MD5
f5d2dc6a47dd9b02ed9efdf9298450c0
-
SHA1
e96fc2cc23727da84a70ef5d4e0068af4cd5a560
-
SHA256
314bbb466cb64b7256469dc2b32577d020cf6c13b518c1d7994d7db49ff757e9
-
SHA512
154f5cd2ddbb01264ca145290e95064ff892090bcb606f5f14434c694fd7d916e2053c7119adffd1d25eae8d17dc07206fea2a32c8b74a9362f3b84a4213678d
-
SSDEEP
384:15Jm7qVb1GNjyo4CGzPd6ZIwBKb5CzgObff9kC+xbX7Qi9rc5:15J7IN+o4FLNCBn9kC+xbLQf
Malware Config
Extracted
https://benconry.com/wp-includes/eUXuRrm1G6bRZ/
http://actividades.laforetlanguages.com/wp-admin/PXMxDnqZrr/
http://atbiotique.com/images/ESistuSH6DbQFkxTz/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3120 1516 regsvr32.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1516 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1516 EXCEL.EXE 1516 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1516 wrote to memory of 3120 1516 EXCEL.EXE 87 PID 1516 wrote to memory of 3120 1516 EXCEL.EXE 87 PID 1516 wrote to memory of 3120 1516 EXCEL.EXE 87
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\314bbb466cb64b7256469dc2b32577d020cf6c13b518c1d7994d7db49ff757e9.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe -s ..\kytk.dll2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:3120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5326fe1d0061728aea8e84c1cc1a74f7f
SHA1abd5c858559fe92f5ddae4a54370a861eaa3acc7
SHA25601dc899db7c4d5452952a415994cf235045496d5dad38375f969469eee5bba03
SHA512b7a27bd98095a3c499f89987c6563f583b14b6bc47ea7ab29a0bebdef8b61fe52821166cc9224d64483da1e7e901de0978290c18506736ab66245fa784ebec1d
-
Filesize
6KB
MD5c16ce81d99df3f8fcc14dee6884354cf
SHA17cbafe67db47973d52415430fcf7da87c0a6e9bf
SHA25646edae29f49b47f8cd66b3ac609ad698a9a832c83710d2c536d0e63efe292770
SHA512d8a7be3fff25e30f2c7362980b8018fdbaf87995918988a5ececd34fb2cd07580ce6c3318d8ac339483888796b721e2948b3937b712d11143221d76cd8cf6fc1