Analysis
-
max time kernel
133s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 13:53
Behavioral task
behavioral1
Sample
13b563633a962e3b3bca3e78cad6d17fdbfda0fb5c7f2967261c3aeee79c36be.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13b563633a962e3b3bca3e78cad6d17fdbfda0fb5c7f2967261c3aeee79c36be.xls
Resource
win10v2004-20241007-en
General
-
Target
13b563633a962e3b3bca3e78cad6d17fdbfda0fb5c7f2967261c3aeee79c36be.xls
-
Size
70KB
-
MD5
89aa4e927e1273ca9b1e9bce640a0a9f
-
SHA1
3a7988e5821533014dafb61ff6f80ecff5d53f58
-
SHA256
13b563633a962e3b3bca3e78cad6d17fdbfda0fb5c7f2967261c3aeee79c36be
-
SHA512
fb77c6e8290e9734d62ea7a14de0ae111c19343d3709d1b895ed00be0d6526ca0984258322fd667df5f7c1a4c73804f29d54e8de529d47f96df3f14e7f9f9a99
-
SSDEEP
1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+e+hDcnTLiQrRTZws8Egk:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMx
Malware Config
Extracted
https://strachanclark.com/images/3gc4qCpSFYbBMDEC/
https://synapse-archive.com/images/bKaMr/
https://sumuvesa.com/wp-includes/rgL/
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4680 3240 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4000 3240 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2608 3240 regsvr32.exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3240 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3240 EXCEL.EXE 3240 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3240 EXCEL.EXE 3240 EXCEL.EXE 3240 EXCEL.EXE 3240 EXCEL.EXE 3240 EXCEL.EXE 3240 EXCEL.EXE 3240 EXCEL.EXE 3240 EXCEL.EXE 3240 EXCEL.EXE 3240 EXCEL.EXE 3240 EXCEL.EXE 3240 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3240 wrote to memory of 4680 3240 EXCEL.EXE 85 PID 3240 wrote to memory of 4680 3240 EXCEL.EXE 85 PID 3240 wrote to memory of 4000 3240 EXCEL.EXE 89 PID 3240 wrote to memory of 4000 3240 EXCEL.EXE 89 PID 3240 wrote to memory of 2608 3240 EXCEL.EXE 91 PID 3240 wrote to memory of 2608 3240 EXCEL.EXE 91
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\13b563633a962e3b3bca3e78cad6d17fdbfda0fb5c7f2967261c3aeee79c36be.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa1.ocx2⤵
- Process spawned unexpected child process
PID:4680
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa2.ocx2⤵
- Process spawned unexpected child process
PID:4000
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa3.ocx2⤵
- Process spawned unexpected child process
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD586dc140d8b07ee207d8864cc2a962355
SHA19e559600303e3d904c4636436d762eacd9a6fd14
SHA256b5d026fc3ee286d2f33eb45fdf6cbe690677b2e06cd29b52bc6d991514ac24ee
SHA512c7781552157ebb21dbd9a7f73fac9b842fba338c8e44d3ed0e5866f3fd2a01e9e3d246c54279683265b33c564d1ccd9dc676f2f67fb1ce7d80d4ff5a96192a70