Analysis
-
max time kernel
133s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 13:07
Behavioral task
behavioral1
Sample
b2bca23e6a498ac26af5b12533adc2b5650f277e99bd4327355f0708fb863036.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b2bca23e6a498ac26af5b12533adc2b5650f277e99bd4327355f0708fb863036.xls
Resource
win10v2004-20241007-en
General
-
Target
b2bca23e6a498ac26af5b12533adc2b5650f277e99bd4327355f0708fb863036.xls
-
Size
70KB
-
MD5
26c57028eced8e9163734c1b964ffab5
-
SHA1
a42fd40e565eb19121b2e5bcc6973cb54488e8d2
-
SHA256
b2bca23e6a498ac26af5b12533adc2b5650f277e99bd4327355f0708fb863036
-
SHA512
05f1fb406278d0cc6d843bd5d60a3155931691a9ad65d0f3a2892ed70ffb3fac9747e8c3fe66bf4a10f5870a8c25a9bca967f31f1ffe36c645de68507b91753c
-
SSDEEP
1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+KJ+hDcnTLiQrRTZws8Eo:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM2
Malware Config
Extracted
https://sacvasanth.com/public/lyP2lh1hlJr/
https://webguruindia.com/theme/wTbEyLVvMNB3j/
http://stockmorehouse.com/Casa_Grande/AS4VPkTsOqWDGGO/
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3304 4016 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2664 4016 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 320 4016 regsvr32.exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4016 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4016 EXCEL.EXE 4016 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4016 wrote to memory of 3304 4016 EXCEL.EXE 86 PID 4016 wrote to memory of 3304 4016 EXCEL.EXE 86 PID 4016 wrote to memory of 2664 4016 EXCEL.EXE 87 PID 4016 wrote to memory of 2664 4016 EXCEL.EXE 87 PID 4016 wrote to memory of 320 4016 EXCEL.EXE 88 PID 4016 wrote to memory of 320 4016 EXCEL.EXE 88
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b2bca23e6a498ac26af5b12533adc2b5650f277e99bd4327355f0708fb863036.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa1.ocx2⤵
- Process spawned unexpected child process
PID:3304
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa2.ocx2⤵
- Process spawned unexpected child process
PID:2664
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa3.ocx2⤵
- Process spawned unexpected child process
PID:320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize667B
MD527c983c51cbc61cc157106a6aa7a3ffd
SHA19f0fc12003cbefc41433ec02504228bb921ac990
SHA256e633ab582f14b715b204e36a2dafb9fb2c8e57bd54c709c123535482cd0b12b9
SHA5127a667392f3b302ba0c16d185154d7618c004921ce1d6bcc1b555f0768d674a2cc00c57a44e6866992e673c10cd17ee4eb884c88eb5482e89f9caf6d694d207a9