Analysis
-
max time kernel
133s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 07:56
Behavioral task
behavioral1
Sample
699b70644f54d0a8b1bd3127ef6770c6c19f0de82087ad76108a0d68055c2ba1.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
699b70644f54d0a8b1bd3127ef6770c6c19f0de82087ad76108a0d68055c2ba1.xls
Resource
win10v2004-20241007-en
General
-
Target
699b70644f54d0a8b1bd3127ef6770c6c19f0de82087ad76108a0d68055c2ba1.xls
-
Size
91KB
-
MD5
d686700342ca2e512f2c0db4f2c091fe
-
SHA1
7311c4dda1d12ec68e491ab8b62b7500c78cb778
-
SHA256
699b70644f54d0a8b1bd3127ef6770c6c19f0de82087ad76108a0d68055c2ba1
-
SHA512
34b30785dc117b4a1b2230f2b5af1b745c0f5ce736fc31ca84e1bcc9b24191dbbe72662196d2b328cb533e161c9a435d42a3ff469b9a125c291a97eaf1c727ee
-
SSDEEP
1536:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEbCXuZH4gb4CEn9J4ZwEM:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgJ
Malware Config
Extracted
http://www.muyehuayi.com/cmp/8asA99KPsyA/v6lUsWbLen/
http://concivilpa.com.py/wp-admin/i3CQu9dzDrMW/
https://wijsneusmedia.nl/cgi-bin/kFB/
http://www.angloextrema.com.br/assets/oEt1yYckHKlnNIq/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2000 400 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1296 400 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3200 400 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 664 400 regsvr32.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 400 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 400 EXCEL.EXE 400 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 400 EXCEL.EXE 400 EXCEL.EXE 400 EXCEL.EXE 400 EXCEL.EXE 400 EXCEL.EXE 400 EXCEL.EXE 400 EXCEL.EXE 400 EXCEL.EXE 400 EXCEL.EXE 400 EXCEL.EXE 400 EXCEL.EXE 400 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 400 wrote to memory of 2000 400 EXCEL.EXE 87 PID 400 wrote to memory of 2000 400 EXCEL.EXE 87 PID 400 wrote to memory of 1296 400 EXCEL.EXE 88 PID 400 wrote to memory of 1296 400 EXCEL.EXE 88 PID 400 wrote to memory of 3200 400 EXCEL.EXE 91 PID 400 wrote to memory of 3200 400 EXCEL.EXE 91 PID 400 wrote to memory of 664 400 EXCEL.EXE 94 PID 400 wrote to memory of 664 400 EXCEL.EXE 94
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\699b70644f54d0a8b1bd3127ef6770c6c19f0de82087ad76108a0d68055c2ba1.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx2⤵
- Process spawned unexpected child process
PID:2000
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx2⤵
- Process spawned unexpected child process
PID:1296
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx2⤵
- Process spawned unexpected child process
PID:3200
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx2⤵
- Process spawned unexpected child process
PID:664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD588f54ab3f0a2211bbe451a91be517401
SHA165b82ef1fd194f33122b4a5bc3e388ff59305efd
SHA2568fa195ec1566469d921df00e6f0a20d9200eda533f454eca603fbfcf6927255c
SHA512a2844436b40d2df268232817ef3bb7d369680619269543c861f63eef2636450cc9e5b026e8a6b682fc6a32f722c9b2aecc90ef28521e7cb4e377a391b3886165