Analysis
-
max time kernel
133s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 12:34
Behavioral task
behavioral1
Sample
4b60f16267cccc012996728c348d161d8bf6fcfa0f4a0ec5e4ac7f66e4561751.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4b60f16267cccc012996728c348d161d8bf6fcfa0f4a0ec5e4ac7f66e4561751.xlsm
Resource
win10v2004-20241007-en
General
-
Target
4b60f16267cccc012996728c348d161d8bf6fcfa0f4a0ec5e4ac7f66e4561751.xlsm
-
Size
102KB
-
MD5
2e99b5266f0e8c18d6f467a91173f79f
-
SHA1
5754d735aa4b2630224f825dd80aa0d08f5ec827
-
SHA256
4b60f16267cccc012996728c348d161d8bf6fcfa0f4a0ec5e4ac7f66e4561751
-
SHA512
27eb43b1410c90c1fc80c4d396d23363827e0f4359cfc8dbfd59f36cd06b93b470f4fe20d16f31aa51c4927561003465aa3884fa10c93027e2a0ba9cebb4b9b4
-
SSDEEP
1536:6HpqqHip20B+axURtKckrr9qZGrhD1GW+wZk4lHpuaI4qMCh:MBHiHHxutKckrpqZGh+wrlJuaIjV
Malware Config
Extracted
http://luoicauthang.com/css/m6RaglUnYVXJ7mw2W/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 5028 1404 rundll32.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1404 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1404 EXCEL.EXE 1404 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE 1404 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1404 wrote to memory of 5028 1404 EXCEL.EXE 91 PID 1404 wrote to memory of 5028 1404 EXCEL.EXE 91 PID 1404 wrote to memory of 5028 1404 EXCEL.EXE 91
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4b60f16267cccc012996728c348d161d8bf6fcfa0f4a0ec5e4ac7f66e4561751.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWow64\rundll32.exeC:\Windows\SysWow64\rundll32.exe ..\bestb.ocx,D"&"l"&"l"&"R"&"eg"&"i"&"s"&"t"&"e"&"rS"&"e"&"rver2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:5028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD514072a475717656d436b57cfb498a18b
SHA14b0c345bac4d1dc684436186bb3e5a0f19963b5e
SHA2568b73e1d059b282599e39b854ad61410f396448debbb7f1f58e6b19b38864da71
SHA5128ce6be738a3a626ddfd238172ba6250d23751698c805c51a98bf6031f9e5e6a086a127866eaf2d1ab8ebd1eef92c196c0e2fc312b5aa3f393001d56e4d2922fd
-
Filesize
24KB
MD52f977d5872cb7eb7a560eb0b0a540baf
SHA1c8e2d0134632884763d3922bdae5d1245207259c
SHA2563b8a21beff2c38dad1d682f7876cf1233fd7a8325b99292400828b6d9c4b3c38
SHA51215f89220c95de08df80eeabf3acbfed6490e43df568d3869bf39677819ff017f68a64c986c2bd86aa39b13ad96317f84fcdb6a51e2f1bdb54c3992862b309b69