Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 13:11
Behavioral task
behavioral1
Sample
f74b0b76d3ff62dffef104124548f669dfeb0e83898286d3f026e0563a17c554.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f74b0b76d3ff62dffef104124548f669dfeb0e83898286d3f026e0563a17c554.xlsm
Resource
win10v2004-20241007-en
General
-
Target
f74b0b76d3ff62dffef104124548f669dfeb0e83898286d3f026e0563a17c554.xlsm
-
Size
91KB
-
MD5
cf7ccabc9c093034b810ede876af9384
-
SHA1
47fac97941c070e95db6e25d38bcae4634ab3fce
-
SHA256
f74b0b76d3ff62dffef104124548f669dfeb0e83898286d3f026e0563a17c554
-
SHA512
54418ac7f590caa1a25ab956bf588ce7feeae80eb0a253e5e19686397b9f4ea2d9e4452a000ae6303c09285fcd9223a0f9233b14db121c4f5fb86142b37f9acb
-
SSDEEP
1536:xNrCX2N5nyV+ns1BVi/IEh2hx0Lx3bKhllGGx0vKCEjdQjqEk+xX0sw:x142byVEoBo6hKb4llGsQjbxBw
Malware Config
Extracted
https://themillionairesweb.com/wp-admin/MD/
https://akhrailway.com/cgi-bin/b5c9CX4IK2GgN6C/
https://cmbavocat.fr/wp-admin/uKCcU1bqvbSvE/
http://idvlab.com.br/wp-admin/FIWBL/
https://institutionsevigne.org/wp-includes/pvDqUHqjYEqoQ6R/
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 576 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 576 EXCEL.EXE 576 EXCEL.EXE 576 EXCEL.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\f74b0b76d3ff62dffef104124548f669dfeb0e83898286d3f026e0563a17c554.xlsm1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:576