Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 10:07
Behavioral task
behavioral1
Sample
2367489958bcab574a748c05e26b0e2e525d517f3c69915aec0ba5d25b00e5ae.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2367489958bcab574a748c05e26b0e2e525d517f3c69915aec0ba5d25b00e5ae.xls
Resource
win10v2004-20241007-en
General
-
Target
2367489958bcab574a748c05e26b0e2e525d517f3c69915aec0ba5d25b00e5ae.xls
-
Size
70KB
-
MD5
5b51a362e989e0af3e7f2e080d88770f
-
SHA1
e77c6f647c9b7fdfacd7e9177f46d4dd0ff26982
-
SHA256
2367489958bcab574a748c05e26b0e2e525d517f3c69915aec0ba5d25b00e5ae
-
SHA512
c5cf8cab5e9b96dc22e440d977afeb27506f777db1ed850c8335950adc952d9da1744d396b65c4b50463eec6bacc1a42158b60f0cd40996043f8241a01323cdd
-
SSDEEP
1536:5+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dgZYW/ESKQHS1yXJFaGqEEc:kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg9
Malware Config
Extracted
https://hepsisifa.com/wp-admin/k/
http://filmmogzivota.rs/SpryAssets/or24hhBl2Ib8704SDO/
http://ecoarch.com.tw/cgi-bin/E/
https://www.clearconstruction.co.uk/scripts/Ev5IXoBvFJkBQ0MZXb/
https://galaxy-catering.com.vn/galxy/Fg1vvhlYJ/
http://www.hangaryapi.com.tr/wp-admin/5n42ncL3nWMbJHwy7/
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3064 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3064 EXCEL.EXE 3064 EXCEL.EXE 3064 EXCEL.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\2367489958bcab574a748c05e26b0e2e525d517f3c69915aec0ba5d25b00e5ae.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3064