Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 09:13
Behavioral task
behavioral1
Sample
d2ece286a2ca2405bbd07639c4cd74971bde93307ecacff01dc8ee7f4ec9e7cc.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2ece286a2ca2405bbd07639c4cd74971bde93307ecacff01dc8ee7f4ec9e7cc.xls
Resource
win10v2004-20241007-en
General
-
Target
d2ece286a2ca2405bbd07639c4cd74971bde93307ecacff01dc8ee7f4ec9e7cc.xls
-
Size
96KB
-
MD5
0d3d2dbf0f673e5b5fdd426f64d41034
-
SHA1
c79d2cc2d3bfd1df1e66e3aaa5740213d30fe06a
-
SHA256
d2ece286a2ca2405bbd07639c4cd74971bde93307ecacff01dc8ee7f4ec9e7cc
-
SHA512
26397ec94ad9a937a331979a2305dc8fab5184daaba64ea017063a25827ea5d1343a1f60d0125008522b96c19f4f085e279bf2192ce993251a6528bc0b742d70
-
SSDEEP
1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJma7:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgc
Malware Config
Extracted
https://bpsjambi.id/about/CcN5IbuInPQ/
https://greenlizard.co.za/amanah/pu8xeUOpqqq/
https://akuntansi.itny.ac.id/asset/NH7qwRrn81Taa0VVqpx/
https://www.yell.ge/nav_logo/x960wo3PHaIUm/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1052 1404 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2316 1404 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2052 1404 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3512 1404 regsvr32.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1404 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1404 EXCEL.EXE 1404 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1404 wrote to memory of 1052 1404 EXCEL.EXE 87 PID 1404 wrote to memory of 1052 1404 EXCEL.EXE 87 PID 1404 wrote to memory of 2316 1404 EXCEL.EXE 93 PID 1404 wrote to memory of 2316 1404 EXCEL.EXE 93 PID 1404 wrote to memory of 2052 1404 EXCEL.EXE 95 PID 1404 wrote to memory of 2052 1404 EXCEL.EXE 95 PID 1404 wrote to memory of 3512 1404 EXCEL.EXE 96 PID 1404 wrote to memory of 3512 1404 EXCEL.EXE 96
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d2ece286a2ca2405bbd07639c4cd74971bde93307ecacff01dc8ee7f4ec9e7cc.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci1.ocx2⤵
- Process spawned unexpected child process
PID:1052
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci2.ocx2⤵
- Process spawned unexpected child process
PID:2316
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci3.ocx2⤵
- Process spawned unexpected child process
PID:2052
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci4.ocx2⤵
- Process spawned unexpected child process
PID:3512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5e0bb399e230395b31546515817f6ffea
SHA1f014e50b864c20b6488e03f42886120a0fa82172
SHA256fdee97d5ec852fcb6d264f4dd966780b27a489f6edb2315dd801b5893cfc1185
SHA5121d40c1a0614f6234c11295c7e96a8fd340f56386d29590ed071616e1cfde2de20f20631854a4264473253ef90ae445c57ff434bd47a7cd7c1bb66d0cd8c2bcd9