Analysis
-
max time kernel
133s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 11:49
Behavioral task
behavioral1
Sample
a483632338b37efa305cc82d86fc8666604220d0e70c369122f4643feb21a5aa.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a483632338b37efa305cc82d86fc8666604220d0e70c369122f4643feb21a5aa.xls
Resource
win10v2004-20241007-en
General
-
Target
a483632338b37efa305cc82d86fc8666604220d0e70c369122f4643feb21a5aa.xls
-
Size
70KB
-
MD5
04b610f54ed4150e53c244d95b5d59ed
-
SHA1
a7ada5a84acd9c50b329f470ca1f1a4a6d511b4d
-
SHA256
a483632338b37efa305cc82d86fc8666604220d0e70c369122f4643feb21a5aa
-
SHA512
c066f7003376c42b2b0e517a3b130782f501568c54b3c6f196fcf6acd563b2fb18d704698e7e28760d8c2858965746439fa8827befdb3034b8e6a94b571da912
-
SSDEEP
1536:5+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dgAYW/ESKQHS1yXJFadK0VB:kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgv
Malware Config
Extracted
http://farschid.de/verkaufsberater_service/OZRw36a2y1CH2clUzY/
http://77homolog.com.br/dev-jealves/GP55wbYNXnp6/
http://geowf.ge/templates/pJRea3Iu3wG/
http://h63402x4.beget.tech/bin/wl0ENiE3BhELXV6V/
http://ecoarch.com.tw/cgi-bin/E/
https://galaxy-catering.com.vn/galxy/Fg1vvhlYJ/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1868 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1868 EXCEL.EXE 1868 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a483632338b37efa305cc82d86fc8666604220d0e70c369122f4643feb21a5aa.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD56c4375ed8f674f78f8de3afe9a761d0a
SHA1e0cbb65dc9607e0528503860cf82c831429ee035
SHA256308b8c4986b0f4364fdf4fb259921dd72c723e65f8e2aeca414a3b6a030f4488
SHA512adeaa6f67f067318e30be0b633ddac5400e6a86907650aca953b737ab901454bc22a8bc8a5061b61c94be2ed074aa4fbc1e626931c7cd000cf78b8b5e1f5ef31