Analysis
-
max time kernel
133s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 13:47
Behavioral task
behavioral1
Sample
4ee08d69dcae59d5a9cde45d578824ffcf0c682ecf861c2d8309dfdb97b67804.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4ee08d69dcae59d5a9cde45d578824ffcf0c682ecf861c2d8309dfdb97b67804.xls
Resource
win10v2004-20241007-en
General
-
Target
4ee08d69dcae59d5a9cde45d578824ffcf0c682ecf861c2d8309dfdb97b67804.xls
-
Size
71KB
-
MD5
d92fb98fc381d911198cba2d5048ed78
-
SHA1
c472384e12698de568c0ae2b93158a27ed971b76
-
SHA256
4ee08d69dcae59d5a9cde45d578824ffcf0c682ecf861c2d8309dfdb97b67804
-
SHA512
bc264396486a617f3b5f1180fa9add370cd3df6bcf6061bf19ff369c7589e102bcde3b95480118e264a3c4749b77673bd918c8bba1d174f365488dd60cecd5fb
-
SSDEEP
1536:jhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+gT+hDcnTLiQrRTZws8EQ:lKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMK
Malware Config
Extracted
https://sweetzone.co/js/XVK/
https://tassa.mx/edos/1hHlIQO/
http://assaref.ma/old_assaref/A2B3P/
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1904 396 regsvr32.exe 84 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1052 396 regsvr32.exe 84 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3008 396 regsvr32.exe 84 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 396 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 396 EXCEL.EXE 396 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 396 wrote to memory of 1904 396 EXCEL.EXE 88 PID 396 wrote to memory of 1904 396 EXCEL.EXE 88 PID 396 wrote to memory of 1052 396 EXCEL.EXE 89 PID 396 wrote to memory of 1052 396 EXCEL.EXE 89 PID 396 wrote to memory of 3008 396 EXCEL.EXE 90 PID 396 wrote to memory of 3008 396 EXCEL.EXE 90
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4ee08d69dcae59d5a9cde45d578824ffcf0c682ecf861c2d8309dfdb97b67804.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\dxgxe1.ocx2⤵
- Process spawned unexpected child process
PID:1904
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\dxgxe2.ocx2⤵
- Process spawned unexpected child process
PID:1052
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\dxgxe3.ocx2⤵
- Process spawned unexpected child process
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5d24996f935ddb8582f2ed68c52080851
SHA1f3f80937bd359057f717b1c447b590ed301172a4
SHA256b02568d4b269a3868a584ea81a87492a8436ad820fe4cb0644941b198eb426ac
SHA51242b8943cd62956bfd883efe0cc88e6ef54444ca9f6586349dfa34238180a1617e8a83daba82c93e5560ebd7b2288076d240b86fd5f5797d1b8b4740eadb263a9