Analysis
-
max time kernel
128s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 13:11
Behavioral task
behavioral1
Sample
f74b0b76d3ff62dffef104124548f669dfeb0e83898286d3f026e0563a17c554.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f74b0b76d3ff62dffef104124548f669dfeb0e83898286d3f026e0563a17c554.xlsm
Resource
win10v2004-20241007-en
General
-
Target
f74b0b76d3ff62dffef104124548f669dfeb0e83898286d3f026e0563a17c554.xlsm
-
Size
91KB
-
MD5
cf7ccabc9c093034b810ede876af9384
-
SHA1
47fac97941c070e95db6e25d38bcae4634ab3fce
-
SHA256
f74b0b76d3ff62dffef104124548f669dfeb0e83898286d3f026e0563a17c554
-
SHA512
54418ac7f590caa1a25ab956bf588ce7feeae80eb0a253e5e19686397b9f4ea2d9e4452a000ae6303c09285fcd9223a0f9233b14db121c4f5fb86142b37f9acb
-
SSDEEP
1536:xNrCX2N5nyV+ns1BVi/IEh2hx0Lx3bKhllGGx0vKCEjdQjqEk+xX0sw:x142byVEoBo6hKb4llGsQjbxBw
Malware Config
Extracted
https://themillionairesweb.com/wp-admin/MD/
https://akhrailway.com/cgi-bin/b5c9CX4IK2GgN6C/
https://cmbavocat.fr/wp-admin/uKCcU1bqvbSvE/
http://idvlab.com.br/wp-admin/FIWBL/
https://institutionsevigne.org/wp-includes/pvDqUHqjYEqoQ6R/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3208 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3208 EXCEL.EXE 3208 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3208 EXCEL.EXE 3208 EXCEL.EXE 3208 EXCEL.EXE 3208 EXCEL.EXE 3208 EXCEL.EXE 3208 EXCEL.EXE 3208 EXCEL.EXE 3208 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f74b0b76d3ff62dffef104124548f669dfeb0e83898286d3f026e0563a17c554.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize683B
MD593a3e3d47a892f157e0cbd446a764e71
SHA1100691aa92ab0a9c5bca32cd15928ca1d51dc724
SHA2563f269907e596f6c176b3645e22765ec29bc0518362e6a17925a4794437ab4de8
SHA512331b7670969bcc3c153bc145e927dfb2ee65bbfdbab33985bd14d1d6c52b264a4c3c510b077ab37587e9679a337248f06b870bb06b44add3561351dcad3974a3