Analysis
-
max time kernel
133s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 04:49
Behavioral task
behavioral1
Sample
3c7fc2390f3824378a3810fed0d4b03cb92ad0a86767d93fe3254d0ce085a5b8.xlsm
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3c7fc2390f3824378a3810fed0d4b03cb92ad0a86767d93fe3254d0ce085a5b8.xlsm
Resource
win10v2004-20241007-en
General
-
Target
3c7fc2390f3824378a3810fed0d4b03cb92ad0a86767d93fe3254d0ce085a5b8.xlsm
-
Size
40KB
-
MD5
35a076de00c462a21a3ce41cd6f8e157
-
SHA1
469238c912cc7ad7516ebdda19684e9da75d277c
-
SHA256
3c7fc2390f3824378a3810fed0d4b03cb92ad0a86767d93fe3254d0ce085a5b8
-
SHA512
f970e43c8a55181993d9771ee4ce1bb9f040bf2de3853286c66a45925465bb958f82d531165b14399351a2214f64398d06edfd53af106734f6a73aff8483a5fa
-
SSDEEP
768:a/omdH+DOevZCwttqyKfcrND59V+L9Rw4eWrXcTqZ0VP2HLp:2omdH+DoylND59V4jwmXc2CVCF
Malware Config
Extracted
http://vipteck.com/wp-content/M/
https://shofarshoshanna.com/t0ssm/roE/
https://santacruzam.com/wp-admin/FeDgNEP/
https://thearkrealmproject.com/wp-admin/wxB4Wp3KyEMCsZva/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 860 5088 regsvr32.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5088 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5088 EXCEL.EXE 5088 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 5088 EXCEL.EXE 5088 EXCEL.EXE 5088 EXCEL.EXE 5088 EXCEL.EXE 5088 EXCEL.EXE 5088 EXCEL.EXE 5088 EXCEL.EXE 5088 EXCEL.EXE 5088 EXCEL.EXE 5088 EXCEL.EXE 5088 EXCEL.EXE 5088 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5088 wrote to memory of 860 5088 EXCEL.EXE 91 PID 5088 wrote to memory of 860 5088 EXCEL.EXE 91 PID 5088 wrote to memory of 860 5088 EXCEL.EXE 91
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3c7fc2390f3824378a3810fed0d4b03cb92ad0a86767d93fe3254d0ce085a5b8.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe /s ..\aew.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD54db303dfaded9a8115a8af37911d636b
SHA1c78f2aabb51733af1b5ddc9b69c3489c0f7c0cb5
SHA25653314fcac21ecfdeb9cb8611f6b65b307791fd5415ee5e13ef6d353889c955ef
SHA51266c52f6a7c2ea01afdd8c4aeb4bdf69dd9fb777a18da783a06363c6168c8c84dd6d28c3ccf19c0a8ca3906efec51f5bb40c159b99207d5081b4f956572928a90
-
Filesize
112KB
MD54b4c3dc5813a86003f4762a58e347cd9
SHA1d47b14ff66159a05ad49f30ac7208df60edf1584
SHA25659b20285cf78d3eb38ce019672bac5a6aab660c15c33d6d2a64aac5825755814
SHA512dafeb8545e7dd70ae89fc076ae40429efdbeb340d25fc6d7f0a7d9808e1473252e9377fd056c85398a596c1199e0946cc3eaffd8de0e2ceaf47909980c579a00