Analysis
-
max time kernel
133s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 10:07
Behavioral task
behavioral1
Sample
2367489958bcab574a748c05e26b0e2e525d517f3c69915aec0ba5d25b00e5ae.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2367489958bcab574a748c05e26b0e2e525d517f3c69915aec0ba5d25b00e5ae.xls
Resource
win10v2004-20241007-en
General
-
Target
2367489958bcab574a748c05e26b0e2e525d517f3c69915aec0ba5d25b00e5ae.xls
-
Size
70KB
-
MD5
5b51a362e989e0af3e7f2e080d88770f
-
SHA1
e77c6f647c9b7fdfacd7e9177f46d4dd0ff26982
-
SHA256
2367489958bcab574a748c05e26b0e2e525d517f3c69915aec0ba5d25b00e5ae
-
SHA512
c5cf8cab5e9b96dc22e440d977afeb27506f777db1ed850c8335950adc952d9da1744d396b65c4b50463eec6bacc1a42158b60f0cd40996043f8241a01323cdd
-
SSDEEP
1536:5+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dgZYW/ESKQHS1yXJFaGqEEc:kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg9
Malware Config
Extracted
https://hepsisifa.com/wp-admin/k/
http://filmmogzivota.rs/SpryAssets/or24hhBl2Ib8704SDO/
http://ecoarch.com.tw/cgi-bin/E/
https://www.clearconstruction.co.uk/scripts/Ev5IXoBvFJkBQ0MZXb/
https://galaxy-catering.com.vn/galxy/Fg1vvhlYJ/
http://www.hangaryapi.com.tr/wp-admin/5n42ncL3nWMbJHwy7/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3256 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3256 EXCEL.EXE 3256 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2367489958bcab574a748c05e26b0e2e525d517f3c69915aec0ba5d25b00e5ae.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD56159e4590156b95eeaa822653fc1775a
SHA1dd8748e8f1948fb32bb94e3ac078732d8591eb5b
SHA2564f29bc9a0d6746feede53a965f2aa2c110358871e9a68bca1831d6b56076b20f
SHA512216e2c553602e9a1a316b183a289d2400380f24517abfc8d4e8a58ef69aa768200c2ff7544ca6f1947e8ff9da1b7482e85862c70b566eb8ff750c24a28127234