Analysis
-
max time kernel
133s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 09:57
Behavioral task
behavioral1
Sample
0d69b94763a940e589bc6a4b26393d205d8533ca1b46b63b7479eff2ad626738.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d69b94763a940e589bc6a4b26393d205d8533ca1b46b63b7479eff2ad626738.xlsm
Resource
win10v2004-20241007-en
General
-
Target
0d69b94763a940e589bc6a4b26393d205d8533ca1b46b63b7479eff2ad626738.xlsm
-
Size
46KB
-
MD5
787a60a36c7551ece11a6ba31fb18506
-
SHA1
8b5b648488d13d7afd5407ff1589297408c8ff15
-
SHA256
0d69b94763a940e589bc6a4b26393d205d8533ca1b46b63b7479eff2ad626738
-
SHA512
42bb6886d4c0413e9fada23b82ed86a82bfdf71ab4ce6cda04f2a40047bd4175b6f2352256b838519bca8e0ff494237a8f85bf82ed384517464e620e15be465b
-
SSDEEP
768:AwLvfWDOevZCwrvtrDPzdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Uh0VfskoM:xWDzftT5fTR4Lh1NisFYBc3cr+UqVfD9
Malware Config
Extracted
http://congresoapp2021.com/u07di/wkdehSgS/
http://forocavialpa.com/wp-admin/bnFI6WhjZkffrb/
http://s1.techopesolutions.com/semicanal/g7jRfFqphhUQ5oh/
http://tournhatrang.asia/cgi-bin/2gnqrN/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3232 3684 regsvr32.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3684 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3684 EXCEL.EXE 3684 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3684 wrote to memory of 3232 3684 EXCEL.EXE 85 PID 3684 wrote to memory of 3232 3684 EXCEL.EXE 85 PID 3684 wrote to memory of 3232 3684 EXCEL.EXE 85
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0d69b94763a940e589bc6a4b26393d205d8533ca1b46b63b7479eff2ad626738.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe /s ..\cre.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:3232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize659B
MD5e7653ae157739daf2e683dab136205d0
SHA1d19920bea3639e48e0593f55e0b385b59a7db077
SHA2567ad0952af39363e17cb6e83f6cf62d92b77db3f3b90b29d8c6be24f2f44f0dc8
SHA5120f7a95db2bdee33b03aa1ac123ffc2ed9437fa6ac664396f028a3e06e453d07b19f39c475f754c176cf1bf3e2b84cbdba2345f6449582fda48bd2c93494b1c27
-
Filesize
1KB
MD5ea0b27cbc3168deef8b5f50f0e59c3ec
SHA1417f65b9c345245dfb26964c5fe897da7a9b1b2b
SHA256bab855b572acbb0f09998876d288c53078286e6e5ab4be124543f2965fb90dfb
SHA512b0133f0f6045e07c8ec99b41085417bed23a139effbfb5fcd4e8198b1786e98ee86227c4cc5075b2fa0b9b90909aa4db4a65a7f7bfd68054bee5457bf25b98cb