Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 12:51
Behavioral task
behavioral1
Sample
1cf53ae230e964db0952b9c5945fe5bd09cb4b03c1f40eeb0a2532d8781f3d5a.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1cf53ae230e964db0952b9c5945fe5bd09cb4b03c1f40eeb0a2532d8781f3d5a.xls
Resource
win10v2004-20241007-en
General
-
Target
1cf53ae230e964db0952b9c5945fe5bd09cb4b03c1f40eeb0a2532d8781f3d5a.xls
-
Size
91KB
-
MD5
fa89fa3148ea65e327e5337f0dd10412
-
SHA1
d0481edf95da12453f4184020d8599dac1a1f33a
-
SHA256
1cf53ae230e964db0952b9c5945fe5bd09cb4b03c1f40eeb0a2532d8781f3d5a
-
SHA512
53115a2aa34c8a282fd7eb588c51d728eec5246dfbcec85541131973d90014ad6b5097eee611ebfa0ca25af2e33369f66711112476629dd6006ba784de96fe0c
-
SSDEEP
1536:eKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgqbCXuZH4gb4CEn9J4Z3z3:eKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgG
Malware Config
Extracted
https://www.conceptagency.net/css/b8eaKN/
https://bencevendeghaz.hu/2zjoi/cwfKJOzA/
http://45.32.114.141/xilte/Uqm6Eysf3Hkjwh/
http://ruitaiwz.com/wp-admin/MXlp5IsUKwT1k0DtzT/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2972 4656 regsvr32.exe 84 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3220 4656 regsvr32.exe 84 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3576 4656 regsvr32.exe 84 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 888 4656 regsvr32.exe 84 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4656 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4656 EXCEL.EXE 4656 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4656 EXCEL.EXE 4656 EXCEL.EXE 4656 EXCEL.EXE 4656 EXCEL.EXE 4656 EXCEL.EXE 4656 EXCEL.EXE 4656 EXCEL.EXE 4656 EXCEL.EXE 4656 EXCEL.EXE 4656 EXCEL.EXE 4656 EXCEL.EXE 4656 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4656 wrote to memory of 2972 4656 EXCEL.EXE 89 PID 4656 wrote to memory of 2972 4656 EXCEL.EXE 89 PID 4656 wrote to memory of 3220 4656 EXCEL.EXE 92 PID 4656 wrote to memory of 3220 4656 EXCEL.EXE 92 PID 4656 wrote to memory of 3576 4656 EXCEL.EXE 93 PID 4656 wrote to memory of 3576 4656 EXCEL.EXE 93 PID 4656 wrote to memory of 888 4656 EXCEL.EXE 97 PID 4656 wrote to memory of 888 4656 EXCEL.EXE 97
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\1cf53ae230e964db0952b9c5945fe5bd09cb4b03c1f40eeb0a2532d8781f3d5a.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx2⤵
- Process spawned unexpected child process
PID:2972
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx2⤵
- Process spawned unexpected child process
PID:3220
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx2⤵
- Process spawned unexpected child process
PID:3576
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx2⤵
- Process spawned unexpected child process
PID:888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5716e31b6f686e3198770635c35ce8114
SHA1c043b9fda9c64d43ad6fe9960f676dbb5c0cd3db
SHA256460d05efb0f497b14aa06abd276bd20a809b3f00d4da07144018322431b2e38f
SHA512733b4878247d2e802f4950b1d34521a7184dd4daaf64a8ae2c2512e1c80c7bbd1e8433560912ca22d788b533a95dd0cdafa89934407a9fee33842b9e94849646
-
Filesize
26B
MD5a413a6b0b4dd25a2a341cf13becce672
SHA15c18a31678ccb7d09ada7242a6d4ed6164b2ebac
SHA2562e2f8ccc18ba3718965719e20d1f561c7a872a1ea50214ad3ba0ed0fe5fd19e3
SHA512aa70031875406f0f167f995097ca6116ffeaea941aeabc88a2e136f22d81402b7aea510bcd0846d0b3bae949830210c8f731cc98d8d4b0cdb12be7eaa01b81e9
-
Filesize
1KB
MD50fe9c99ff4ebce2a6a3a02cf4fbcf457
SHA1433cffab2af2e7ecc8b3eaf086f4f6b56b37a66b
SHA256d171faf76ded3ee0cf148f8fd44d074e0244c8ea9fb8a066fa2b177bb948d02d
SHA512fb6c88d61380886cee52982c98224e00625f82aed545da0b6f74a23bca92d21ae7a64130517f2e1d882de1e59fd03feacfb2997c80f8a0602e9a5c5c0486bd71