Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 11:23
Behavioral task
behavioral1
Sample
2be41114d60b0b89778e8b2b64d1ff74555e1c716c7b892a2979a72d0d4cdf43.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2be41114d60b0b89778e8b2b64d1ff74555e1c716c7b892a2979a72d0d4cdf43.xls
Resource
win10v2004-20241007-en
General
-
Target
2be41114d60b0b89778e8b2b64d1ff74555e1c716c7b892a2979a72d0d4cdf43.xls
-
Size
61KB
-
MD5
1f5163b769a9dbb6dde10d2bdcd8391f
-
SHA1
4474be132a8f9d9f8af2abda9368faeb1b6b8221
-
SHA256
2be41114d60b0b89778e8b2b64d1ff74555e1c716c7b892a2979a72d0d4cdf43
-
SHA512
94cdcfb6e4594295d8aa35579ba70fceed65c6a926e54c0cc09c4ea25b222ba7e8b329aaae65e55c8bee56798929e02a8f0be6e0d1a918f90df0a467cf11aac3
-
SSDEEP
1536:sp+KpbdrHYrMue8q7QPX+5xtekEdi8/dgJ5+4kKF3XOCmGanK8oWIq:sIKpbdrHYrMue8q7QPX+5xtekEdi8/dP
Malware Config
Extracted
http://littlesweet.co.uk/wp-admin/vko/
https://stratuswebsolutions.co.nz/wp-content/wyEEj5jH8xq50rp1/
http://wvfsbrasil.com.br/Acrasieae/LIYNOqCthfZuCWQz3/
https://lydt.cc/wp-includes/6sfYo/
http://lpm.fk.ub.ac.id/Fox-C/faKwS6p6/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5004 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5004 EXCEL.EXE 5004 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2be41114d60b0b89778e8b2b64d1ff74555e1c716c7b892a2979a72d0d4cdf43.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD55fbad5f234379d32f2637e20dac2942e
SHA1c1b6fe91aed8c4dd5782298d8c5e92c4d803b6e4
SHA256c56613dc859f91938d37662d1c4cc3fcc00fad95b716a106866c79301484f0be
SHA51227629d1a09b12b1c6bb219a4e90303c5b50b0ffd7d26d07365b24c6649bdc203f5a96498617326deeaed14e5c6f4d63536fbbcd291deb72b1469cd35340076ad