Analysis
-
max time kernel
133s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 12:39
Behavioral task
behavioral1
Sample
900554ea88fc0a7e0130660897ce1c8112b68a09ea4c382edb350c63cb29686b.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
900554ea88fc0a7e0130660897ce1c8112b68a09ea4c382edb350c63cb29686b.xls
Resource
win10v2004-20241007-en
General
-
Target
900554ea88fc0a7e0130660897ce1c8112b68a09ea4c382edb350c63cb29686b.xls
-
Size
101KB
-
MD5
9ec6cbc4dfce17fc65e8041bd72d8807
-
SHA1
6319b10b1144582b5e95fbd5a99bde74ca61e4af
-
SHA256
900554ea88fc0a7e0130660897ce1c8112b68a09ea4c382edb350c63cb29686b
-
SHA512
5ea1a50eae000bdd40904d0c98ce135533d3433b25ce1382650b43be56779e259ffcf67ad2a6741d7e617fe5397a64fa7ca888a9c2fdda431cd5d3b8730e5b81
-
SSDEEP
3072:RKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+/bOZzbqkn6RND9fxuss8OG:RKpb8rGYrMPe3q7Q0XV5xtuE8vG8UM+/
Malware Config
Extracted
https://decorusfinancial.com/wp-content/7dODakeZZ83fJi/
https://e-kinerja.ntbprov.go.id/aset/sAeaEvaSxGhvnsuFE/
http://facts-jo.com/init/jLQY2FpesnIGi0qHqz/
http://fashionbyprincessmelodicaah.com/4185PINT/jwh2cwjFHLZL/
http://easiercommunications.com/wp-content/yqNxi8IKbRIt7akB/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3752 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3752 EXCEL.EXE 3752 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\900554ea88fc0a7e0130660897ce1c8112b68a09ea4c382edb350c63cb29686b.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5a95667e143775fbba4298ee1dac2b48c
SHA1c70deeb9fbf39c800991b1362057b2f35cb81469
SHA2562381c138d31b92548ba6d28e2191762653db6325e40743a9158630a0e171cfe0
SHA51201abd9a885926bc1c01defe679c633d91eab6d783dc45febc8e29ac34409159e42b327fa055b6779542b75eaef898b50405d8dc7c18633a38c0015a2050215f9