Analysis
-
max time kernel
133s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 09:03
Behavioral task
behavioral1
Sample
a04fb147d885a98405b843401f5b690a025d83e3aaf24bb4cddf8fb9ff245d69.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a04fb147d885a98405b843401f5b690a025d83e3aaf24bb4cddf8fb9ff245d69.xls
Resource
win10v2004-20241007-en
General
-
Target
a04fb147d885a98405b843401f5b690a025d83e3aaf24bb4cddf8fb9ff245d69.xls
-
Size
95KB
-
MD5
00f1524e233399b927f757baa1ed432d
-
SHA1
ff1a4403e2ca601122d9ff65a4e489910a724b56
-
SHA256
a04fb147d885a98405b843401f5b690a025d83e3aaf24bb4cddf8fb9ff245d69
-
SHA512
6fd728d7a9516b188d85e42616ed3363a71b3bbcaf9edb6749670c9e6c0114293fcf2f654df34ab785be4db5ff29ddc07ffa86597a7b996ec0686a4821ce53e0
-
SSDEEP
1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSC8+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgW
Malware Config
Extracted
http://francite.net/images/XI7zS0X1nY/
https://cointrade.world/receipts/Sa6fYJpecEVqiRf05/
http://gedebey-tvradio.info/wp-includes/nOmdPyUpDB/
http://haircutbar.com/cgi-bin/SpJT9OKPmUpJfkGqv/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4888 60 regsvr32.exe 86 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1632 60 regsvr32.exe 86 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1636 60 regsvr32.exe 86 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4048 60 regsvr32.exe 86 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 60 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 60 EXCEL.EXE 60 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 60 wrote to memory of 4888 60 EXCEL.EXE 88 PID 60 wrote to memory of 4888 60 EXCEL.EXE 88 PID 60 wrote to memory of 1632 60 EXCEL.EXE 89 PID 60 wrote to memory of 1632 60 EXCEL.EXE 89 PID 60 wrote to memory of 1636 60 EXCEL.EXE 91 PID 60 wrote to memory of 1636 60 EXCEL.EXE 91 PID 60 wrote to memory of 4048 60 EXCEL.EXE 93 PID 60 wrote to memory of 4048 60 EXCEL.EXE 93
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a04fb147d885a98405b843401f5b690a025d83e3aaf24bb4cddf8fb9ff245d69.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci1.ocx2⤵
- Process spawned unexpected child process
PID:4888
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci2.ocx2⤵
- Process spawned unexpected child process
PID:1632
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci3.ocx2⤵
- Process spawned unexpected child process
PID:1636
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci4.ocx2⤵
- Process spawned unexpected child process
PID:4048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5a24da6de1bce06b1bacad0d706ef1676
SHA109d13166ea4be2ca0d1f9b17630c2ce67e313525
SHA256062c62e759c42077a6bb797b60b8b93d3ddd593f01988c191c8ec14fa7fbb5c7
SHA5129f229f1012fa250411fb16de723415a239b589064c1216be0e1d76c3d9f2ac3b690ed51db65d60329dccbe4af9ae4d346adaff84272f8e55fbb284c504406f90