Analysis
-
max time kernel
133s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 12:59
Behavioral task
behavioral1
Sample
9c23fb6806d5464d82f097c52faf6f67c9f5189ba34f3c110233616f35c5652c.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9c23fb6806d5464d82f097c52faf6f67c9f5189ba34f3c110233616f35c5652c.xlsm
Resource
win10v2004-20241007-en
General
-
Target
9c23fb6806d5464d82f097c52faf6f67c9f5189ba34f3c110233616f35c5652c.xlsm
-
Size
74KB
-
MD5
d38dcefaf5c77ffb99202ce4a1046716
-
SHA1
2d2487cd94807b29d0f5290b0fed0864a47ca26b
-
SHA256
9c23fb6806d5464d82f097c52faf6f67c9f5189ba34f3c110233616f35c5652c
-
SHA512
47647fa880a14940faf14d187cd79d4e5fd29e06cf94311b59db1af437101ef8de0bb41659b860995ef8ea4260c003f60f239ad7e83b8a50c29c8c8a0f572394
-
SSDEEP
1536:iuSto0NSVUINwtzLT7OMuuAe0yOcfpXZGsM9VIzEA:ctzSmICpH7OZuvZGsMo
Malware Config
Extracted
https://thesparklezbox.com/wp-admin/kFkWN/
https://herbtytox.com/wp-admin/dq/
http://www.asyadegirmen.com/Template/nEMRY55nQgF/
https://westthamesphysio.com/blog/D8AAkEyZ7u/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3156 5032 regsvr32.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5032 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5032 EXCEL.EXE 5032 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 5032 EXCEL.EXE 5032 EXCEL.EXE 5032 EXCEL.EXE 5032 EXCEL.EXE 5032 EXCEL.EXE 5032 EXCEL.EXE 5032 EXCEL.EXE 5032 EXCEL.EXE 5032 EXCEL.EXE 5032 EXCEL.EXE 5032 EXCEL.EXE 5032 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5032 wrote to memory of 3156 5032 EXCEL.EXE 93 PID 5032 wrote to memory of 3156 5032 EXCEL.EXE 93 PID 5032 wrote to memory of 3156 5032 EXCEL.EXE 93
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9c23fb6806d5464d82f097c52faf6f67c9f5189ba34f3c110233616f35c5652c.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe -s ..\rds.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:3156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize671B
MD56c0e5a607d4307c3e1f6ae05b41d4c87
SHA1f96238c8608d2d2b12c8b0f0f33869c0a8f28be5
SHA256dace42338c07977c1cf267f4b675c7c91c92637489397879e04102874f7ed66e
SHA512279e5dda7f79799b2eca2e025863e15c6fcbf748d1044e3310a259bdfa0393e5a1ce2ab08cc4e1b005a45b75abe9bb7785e540404d6d9eba04cc39cf6bef1a9a
-
Filesize
966B
MD51a8978d9d37041fe0089728cd6c23233
SHA1f0485019f25ee50bb77f23081a8964e28e56cfb2
SHA25687a97454942b85b5afc9cb9733bb7ce96cdf3422f6bfc95823f8edf6b2e2c607
SHA5129ea43ede1eab73d3ac65bc3e9c13836c51d768daf5e300a0f57a26c0ca9cb2655455e5731664a92c969520dc05f7c71292d6a947405e06c2b1f88a399cd8d42b