Analysis
-
max time kernel
133s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 07:53
Behavioral task
behavioral1
Sample
82f3b8fc86215f5334fe72560b75c128add25e6df7d066cd1e8af8c696be1dfd.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
82f3b8fc86215f5334fe72560b75c128add25e6df7d066cd1e8af8c696be1dfd.xls
Resource
win10v2004-20241007-en
General
-
Target
82f3b8fc86215f5334fe72560b75c128add25e6df7d066cd1e8af8c696be1dfd.xls
-
Size
95KB
-
MD5
0e04ccbfd1b7263aa2058420db1f5ed8
-
SHA1
b71316cb4b1d884c32012475f6699c6421c964b2
-
SHA256
82f3b8fc86215f5334fe72560b75c128add25e6df7d066cd1e8af8c696be1dfd
-
SHA512
b1706ad919d475a82e422af0ba56e20c592508c71e0e5ff3ab4d2cf1bf3f9c50e20f8b553878dcb264996edd42983727a386d3cb3463b5678f6f8218a1d68419
-
SSDEEP
1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJm9:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgA
Malware Config
Extracted
https://fikti.bem.gunadarma.ac.id/SDM/YH8OJ1Zz8miBX/
http://ebuysa.co.za/yt-assets/yZ30/
http://3dstudioa.com.br/files/1ubPAB/
http://boardmart.co.za/images/DvMHPbTLn/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2924 3044 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 976 3044 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2828 3044 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1384 3044 regsvr32.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3044 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3044 EXCEL.EXE 3044 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2924 3044 EXCEL.EXE 92 PID 3044 wrote to memory of 2924 3044 EXCEL.EXE 92 PID 3044 wrote to memory of 976 3044 EXCEL.EXE 94 PID 3044 wrote to memory of 976 3044 EXCEL.EXE 94 PID 3044 wrote to memory of 2828 3044 EXCEL.EXE 98 PID 3044 wrote to memory of 2828 3044 EXCEL.EXE 98 PID 3044 wrote to memory of 1384 3044 EXCEL.EXE 103 PID 3044 wrote to memory of 1384 3044 EXCEL.EXE 103
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\82f3b8fc86215f5334fe72560b75c128add25e6df7d066cd1e8af8c696be1dfd.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci1.ocx2⤵
- Process spawned unexpected child process
PID:2924
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci2.ocx2⤵
- Process spawned unexpected child process
PID:976
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci3.ocx2⤵
- Process spawned unexpected child process
PID:2828
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci4.ocx2⤵
- Process spawned unexpected child process
PID:1384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD52c75fd1ae44a70f7b55de2813bc7c958
SHA157dc5dc0e8401d8476612d9e533d7358c49c3acc
SHA2563f8b1213cb1c620bb2b5c739fe0b635d8153d5fbb9bf1dc21b53c173fbe251e3
SHA51279d4ff55de83e14228cd77936600ef6dd0beafb07c2c5b30d782cfbba266d65676c761593a7ff4c650cf922455b2bd290e74322fa9c3c159427c0324136901a9