Analysis
-
max time kernel
133s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 13:39
Behavioral task
behavioral1
Sample
b36458a6bcdf273b3eb5bfdaa61600052f7d84a944c8037fa98f845872545675.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b36458a6bcdf273b3eb5bfdaa61600052f7d84a944c8037fa98f845872545675.xls
Resource
win10v2004-20241007-en
General
-
Target
b36458a6bcdf273b3eb5bfdaa61600052f7d84a944c8037fa98f845872545675.xls
-
Size
96KB
-
MD5
bad7820b01e7a32a474d21edf5386394
-
SHA1
375a2008df9abd782181c07cb381de5ac7605881
-
SHA256
b36458a6bcdf273b3eb5bfdaa61600052f7d84a944c8037fa98f845872545675
-
SHA512
1d60d48f834e9be0e135c98b22df0d845c91991739dd8b3f2269cf9b05ab2a6c7282b6312a98d7300020e266bea6659fc2d4f16fb78a658e04bf598f33c664d7
-
SSDEEP
1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg2HuS4hcTO97v7UYdEJm0:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgQ
Malware Config
Extracted
https://atperson.com/campusvirtual/EOgFGo17w/
https://eliteturismo.com/phpmailer-old/dafdBxQONtk5Uf9dxll/
http://atici.net/c/JDFDBMIz/
http://domesticuif.co.za/libraries/nbnH9dpd/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1824 448 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 724 448 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 620 448 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2708 448 regsvr32.exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 448 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 448 EXCEL.EXE 448 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 448 wrote to memory of 1824 448 EXCEL.EXE 86 PID 448 wrote to memory of 1824 448 EXCEL.EXE 86 PID 448 wrote to memory of 724 448 EXCEL.EXE 89 PID 448 wrote to memory of 724 448 EXCEL.EXE 89 PID 448 wrote to memory of 620 448 EXCEL.EXE 91 PID 448 wrote to memory of 620 448 EXCEL.EXE 91 PID 448 wrote to memory of 2708 448 EXCEL.EXE 92 PID 448 wrote to memory of 2708 448 EXCEL.EXE 92
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b36458a6bcdf273b3eb5bfdaa61600052f7d84a944c8037fa98f845872545675.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci1.ocx2⤵
- Process spawned unexpected child process
PID:1824
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci2.ocx2⤵
- Process spawned unexpected child process
PID:724
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci3.ocx2⤵
- Process spawned unexpected child process
PID:620
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci4.ocx2⤵
- Process spawned unexpected child process
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD51c58dc9c97ff39d578c4b9b4271895e7
SHA198d82734937ec6d9b3a8ca04a03a23781c92b4af
SHA256c876af5c608e886cbc3b51231b68109efd1ab6eda2078e42b87d4ab106d1a4ae
SHA5122c83299448eadb39d56348089dbd30456e8b3f00e9a95a171aaf7ae6ae8724f625ee2f441f88c312a49d5e0389fe11418acf7ce39bd6a28c2da0b6a82cf41a82