Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 05:10
Behavioral task
behavioral1
Sample
d5fa44d671a53d0d782e5cedddd8f5a2f4026ef022b4259c45b8f4fd36770767.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d5fa44d671a53d0d782e5cedddd8f5a2f4026ef022b4259c45b8f4fd36770767.xls
Resource
win10v2004-20241007-en
General
-
Target
d5fa44d671a53d0d782e5cedddd8f5a2f4026ef022b4259c45b8f4fd36770767.xls
-
Size
91KB
-
MD5
0572c2c8b87e26442b1f4f556a085850
-
SHA1
0e454bc800c10cda1798d0f2862e85b816f73d30
-
SHA256
d5fa44d671a53d0d782e5cedddd8f5a2f4026ef022b4259c45b8f4fd36770767
-
SHA512
304d0d586ed0a95a0a3e0812c69f57e19510181109be7942bcf0b4164bfa5eeb5ed03b87c1bc60055593be1329e11f2237f20e142d5d905a0c1c0d78ea2d0b47
-
SSDEEP
1536:eKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgqbCXuZH4gb4CEn9J4Z3z3:eKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgG
Malware Config
Extracted
https://www.conceptagency.net/css/b8eaKN/
https://bencevendeghaz.hu/2zjoi/cwfKJOzA/
http://45.32.114.141/xilte/Uqm6Eysf3Hkjwh/
http://ruitaiwz.com/wp-admin/MXlp5IsUKwT1k0DtzT/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1040 3368 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2996 3368 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4128 3368 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2120 3368 regsvr32.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3368 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3368 EXCEL.EXE 3368 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3368 EXCEL.EXE 3368 EXCEL.EXE 3368 EXCEL.EXE 3368 EXCEL.EXE 3368 EXCEL.EXE 3368 EXCEL.EXE 3368 EXCEL.EXE 3368 EXCEL.EXE 3368 EXCEL.EXE 3368 EXCEL.EXE 3368 EXCEL.EXE 3368 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3368 wrote to memory of 1040 3368 EXCEL.EXE 89 PID 3368 wrote to memory of 1040 3368 EXCEL.EXE 89 PID 3368 wrote to memory of 2996 3368 EXCEL.EXE 90 PID 3368 wrote to memory of 2996 3368 EXCEL.EXE 90 PID 3368 wrote to memory of 4128 3368 EXCEL.EXE 93 PID 3368 wrote to memory of 4128 3368 EXCEL.EXE 93 PID 3368 wrote to memory of 2120 3368 EXCEL.EXE 96 PID 3368 wrote to memory of 2120 3368 EXCEL.EXE 96
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d5fa44d671a53d0d782e5cedddd8f5a2f4026ef022b4259c45b8f4fd36770767.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx2⤵
- Process spawned unexpected child process
PID:1040
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx2⤵
- Process spawned unexpected child process
PID:2996
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx2⤵
- Process spawned unexpected child process
PID:4128
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx2⤵
- Process spawned unexpected child process
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD55e78443aa182286ce1e38fa96d15a44d
SHA1c4397d1f7ef359bccd2d3e0198e4c116164ad668
SHA2569347d9879b34503747f2f54716154bdab56c22c913174c5f6655f0cd65867445
SHA512a122294728de7e7a34558b12cee8c51548b5385327836c6b639623237490a6d8d761b0a3e597007f462833c63b1c598a104c855ea758acd395dc9c34a64f6326
-
Filesize
26B
MD5a413a6b0b4dd25a2a341cf13becce672
SHA15c18a31678ccb7d09ada7242a6d4ed6164b2ebac
SHA2562e2f8ccc18ba3718965719e20d1f561c7a872a1ea50214ad3ba0ed0fe5fd19e3
SHA512aa70031875406f0f167f995097ca6116ffeaea941aeabc88a2e136f22d81402b7aea510bcd0846d0b3bae949830210c8f731cc98d8d4b0cdb12be7eaa01b81e9
-
Filesize
1KB
MD54f2d6fb06aa69e88e0e37fa4710aa6d5
SHA1b5c70a0aa8fee368d44a92202a9be4dbfb2b5ba4
SHA25696bd687d69295177c5062554be02cc2cedfadea2e9137eb0af54077b3d8b5bb9
SHA512d284c7c11df72baffc78eb943e581d1980ffec2de20ca6aeeee98b623bdef03f11e11401b84402cba5d64392a6edf4e95e22af68d41e4a2e1dd1f00102bc9caf