Analysis
-
max time kernel
133s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 05:20
Behavioral task
behavioral1
Sample
fd1b54bbb4f13d431804241df3a6530ce034998776ed94e2a6e35ddb5183c7f6.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fd1b54bbb4f13d431804241df3a6530ce034998776ed94e2a6e35ddb5183c7f6.xls
Resource
win10v2004-20241007-en
General
-
Target
fd1b54bbb4f13d431804241df3a6530ce034998776ed94e2a6e35ddb5183c7f6.xls
-
Size
67KB
-
MD5
42c7f22cb69f30a590c3def5bd4fd5b7
-
SHA1
e75f18ef1d47c6d8051576a10d533487b72a75c0
-
SHA256
fd1b54bbb4f13d431804241df3a6530ce034998776ed94e2a6e35ddb5183c7f6
-
SHA512
b0ec483f2f9c51cfa1ba4c536b8cc4536a6fe66408898a5777288009f10f341388564510369ccc4c36f3524169b17a5ac9d754583696c9ee07503333c7dfd2f1
-
SSDEEP
1536:5VKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+y9s1a6YG2jzQ0viPvDNHh9ey:fKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMw
Malware Config
Extracted
http://learnviaonline.com/wp-admin/qGb/
http://kolejleri.com/wp-admin/REvup/
http://stainedglassexpress.com/classes/05SkiiW9y4DDGvb6/
http://milanstaffing.com/images/D4TRnDubF/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4612 1324 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4912 1324 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2024 1324 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1348 1324 regsvr32.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1324 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1324 EXCEL.EXE 1324 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1324 EXCEL.EXE 1324 EXCEL.EXE 1324 EXCEL.EXE 1324 EXCEL.EXE 1324 EXCEL.EXE 1324 EXCEL.EXE 1324 EXCEL.EXE 1324 EXCEL.EXE 1324 EXCEL.EXE 1324 EXCEL.EXE 1324 EXCEL.EXE 1324 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1324 wrote to memory of 4612 1324 EXCEL.EXE 87 PID 1324 wrote to memory of 4612 1324 EXCEL.EXE 87 PID 1324 wrote to memory of 4912 1324 EXCEL.EXE 89 PID 1324 wrote to memory of 4912 1324 EXCEL.EXE 89 PID 1324 wrote to memory of 2024 1324 EXCEL.EXE 90 PID 1324 wrote to memory of 2024 1324 EXCEL.EXE 90 PID 1324 wrote to memory of 1348 1324 EXCEL.EXE 91 PID 1324 wrote to memory of 1348 1324 EXCEL.EXE 91
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\fd1b54bbb4f13d431804241df3a6530ce034998776ed94e2a6e35ddb5183c7f6.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx2⤵
- Process spawned unexpected child process
PID:4612
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx2⤵
- Process spawned unexpected child process
PID:4912
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx2⤵
- Process spawned unexpected child process
PID:2024
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx2⤵
- Process spawned unexpected child process
PID:1348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5a38b0710fba2eb6d79ad2b7a1ccd5d7d
SHA109a089132e430a4ba7c1787e2c0d5fd1a8d9d485
SHA2562982bd0b75c22a58210818beb9228de3d9802c9a9b23bb0b1e17cc6136604e85
SHA512d49608bf2577f13181918465b36db78171bd26796297f63a2cc325ee1355c7a3307857286501227642d5266d4e479a75f0bd4c2ef05a5e26480f0cc272b35c14
-
Filesize
24KB
MD558d19cc5edaa8d7db774d621f0d644c0
SHA15bbbf94d19937e3446671414d63850fb437461c9
SHA25647596e13f2e4180d3cab0ad50011d25bb82db52234cd92cabb60ff8f841353cd
SHA512080330e83c6f55f1f7989f021f8c68f5e53de1fa155bff76b39b867b4693f2112982e6e1428a6a35c785769d2d9b05082b56f6e9ef6e8536e531cc46bc56a674