Analysis
-
max time kernel
133s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 11:20
Behavioral task
behavioral1
Sample
8787c0145dd3f55caf719d92b71057e3f061a47860510991563021812b47fc74.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8787c0145dd3f55caf719d92b71057e3f061a47860510991563021812b47fc74.xls
Resource
win10v2004-20241007-en
General
-
Target
8787c0145dd3f55caf719d92b71057e3f061a47860510991563021812b47fc74.xls
-
Size
63KB
-
MD5
7c22e6aa4e01118efdb1ddf5220e60b1
-
SHA1
7cd971156c45b8671f374b73cbd6cf9af1a48c0f
-
SHA256
8787c0145dd3f55caf719d92b71057e3f061a47860510991563021812b47fc74
-
SHA512
620e47c5b12d66ec7a10b47095ae5be87d09a098dcadb708bdcdfe7380605e5dd998e790e086a8b80dc9989e7e2d7fe64e9dbb16b9fc365f20c741a9eb5d9774
-
SSDEEP
1536:dpKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg9HuS4VcTO9/r7UYdEJe5o1/:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgP
Malware Config
Extracted
https://www.careofu.com/PHPExcel/sQ78BedribNJZbGYj/
https://cedeco.es/js/n74fS/
http://balticcontrolbd.com/cgi-bin/Gu0xno0kIssGJF8/
https://fikti.bem.gunadarma.ac.id/SDM/qNeMUe2RvxdvuRlf/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2364 2836 regsvr32.exe 84 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2864 2836 regsvr32.exe 84 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1952 2836 regsvr32.exe 84 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4724 2836 regsvr32.exe 84 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2836 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2836 EXCEL.EXE 2836 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2836 EXCEL.EXE 2836 EXCEL.EXE 2836 EXCEL.EXE 2836 EXCEL.EXE 2836 EXCEL.EXE 2836 EXCEL.EXE 2836 EXCEL.EXE 2836 EXCEL.EXE 2836 EXCEL.EXE 2836 EXCEL.EXE 2836 EXCEL.EXE 2836 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2364 2836 EXCEL.EXE 90 PID 2836 wrote to memory of 2364 2836 EXCEL.EXE 90 PID 2836 wrote to memory of 2864 2836 EXCEL.EXE 100 PID 2836 wrote to memory of 2864 2836 EXCEL.EXE 100 PID 2836 wrote to memory of 1952 2836 EXCEL.EXE 101 PID 2836 wrote to memory of 1952 2836 EXCEL.EXE 101 PID 2836 wrote to memory of 4724 2836 EXCEL.EXE 102 PID 2836 wrote to memory of 4724 2836 EXCEL.EXE 102
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\8787c0145dd3f55caf719d92b71057e3f061a47860510991563021812b47fc74.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\hhwe1.ocx2⤵
- Process spawned unexpected child process
PID:2364
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\hhwe2.ocx2⤵
- Process spawned unexpected child process
PID:2864
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\hhwe3.ocx2⤵
- Process spawned unexpected child process
PID:1952
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\hhwe4.ocx2⤵
- Process spawned unexpected child process
PID:4724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5cd3a9f3a2451a36af1b4226f25ea0894
SHA1e438200a63eea4cd50617493e5d8aa72c31ef5ff
SHA256a90a26bce5297b28f50e57d05ddec5164255154e1735d03649fd0b8655a5eb32
SHA5128420bd5b16f4740c264951bbfee3b26a08703c42bfbe75708d8ecd196304c0d7150dec1bcace3ddf40a39bc886e6497f381ea4536d03b2b3b491f8d17261043a