Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 12:41
Behavioral task
behavioral1
Sample
a964cf185f84f6b3a71317a5a98d97500dd8d8ba62de281dd2fc468c37a33e82.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a964cf185f84f6b3a71317a5a98d97500dd8d8ba62de281dd2fc468c37a33e82.xls
Resource
win10v2004-20241007-en
General
-
Target
a964cf185f84f6b3a71317a5a98d97500dd8d8ba62de281dd2fc468c37a33e82.xls
-
Size
70KB
-
MD5
7d3fccce6c25a8db6579065552df05ea
-
SHA1
594d6c80f1eeff4c8794ae690f79335d1b292124
-
SHA256
a964cf185f84f6b3a71317a5a98d97500dd8d8ba62de281dd2fc468c37a33e82
-
SHA512
5bb63e6921e707da71246c4d432d492c7c9f88699623c6997864663db0d93fd37e1116b94226e502a0b5ca4ff807c3e59375a36adca1c6ecc3a70cba6c29eca3
-
SSDEEP
1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+e+hDcnTLiQrRTZws8Eg0:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMh
Malware Config
Extracted
https://strachanclark.com/images/3gc4qCpSFYbBMDEC/
https://synapse-archive.com/images/bKaMr/
https://sumuvesa.com/wp-includes/rgL/
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3676 1476 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3456 1476 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1336 1476 regsvr32.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1476 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1476 EXCEL.EXE 1476 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1476 wrote to memory of 3676 1476 EXCEL.EXE 87 PID 1476 wrote to memory of 3676 1476 EXCEL.EXE 87 PID 1476 wrote to memory of 3456 1476 EXCEL.EXE 88 PID 1476 wrote to memory of 3456 1476 EXCEL.EXE 88 PID 1476 wrote to memory of 1336 1476 EXCEL.EXE 91 PID 1476 wrote to memory of 1336 1476 EXCEL.EXE 91
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a964cf185f84f6b3a71317a5a98d97500dd8d8ba62de281dd2fc468c37a33e82.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa1.ocx2⤵
- Process spawned unexpected child process
PID:3676
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa2.ocx2⤵
- Process spawned unexpected child process
PID:3456
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa3.ocx2⤵
- Process spawned unexpected child process
PID:1336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5b9314c3b5ee0cd87c2cdba420ea6bef0
SHA1b79439ed60ab494c71d4472e06e9e029deea20a5
SHA256e4fbce0de6acd8060758914961a26d109a7d96c45c7530fdfcd133eceed7d7a5
SHA512534b8ca6baf9ae1ae4a77338148a7c78d5cfa878df5484d9478b13f8b032a59705403daea8514cf3df5638d58d43162169072345ae7c77d8348f3c22580d39f3