Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 13:40
Behavioral task
behavioral1
Sample
aff6ded528108840b660508b6d541aaf0cbef920b6fd53e1180e81b26d1b71a2.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aff6ded528108840b660508b6d541aaf0cbef920b6fd53e1180e81b26d1b71a2.xlsm
Resource
win10v2004-20241007-en
General
-
Target
aff6ded528108840b660508b6d541aaf0cbef920b6fd53e1180e81b26d1b71a2.xlsm
-
Size
103KB
-
MD5
e782c44c88d2a48a39ba80a6e0112409
-
SHA1
7216360c15ed2d8d97591cd8687d36417e4fceee
-
SHA256
aff6ded528108840b660508b6d541aaf0cbef920b6fd53e1180e81b26d1b71a2
-
SHA512
8f2b46cdd8004ae28c82bbca8dfd2ec0c0245b36fcb3a0af0b8770daac7544cb3dd5b03a36ccb25d75e903bb8f9fe6b5a882875b44be0f32cf45ce5b77df4671
-
SSDEEP
3072:XHhRUVXHqu8hahYIfiQOVOveshVf4KwJQikmGox:3hRYXHrbtO8eOaDPk1ox
Malware Config
Extracted
http://landorestates.com/wordpress/NELf96wr/
https://www.rockwoodsaloon.com/wp-admin/A706GTXNufQSWXG52/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2476 832 rundll32.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 832 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 832 EXCEL.EXE 832 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 832 EXCEL.EXE 832 EXCEL.EXE 832 EXCEL.EXE 832 EXCEL.EXE 832 EXCEL.EXE 832 EXCEL.EXE 832 EXCEL.EXE 832 EXCEL.EXE 832 EXCEL.EXE 832 EXCEL.EXE 832 EXCEL.EXE 832 EXCEL.EXE 832 EXCEL.EXE 832 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 832 wrote to memory of 2476 832 EXCEL.EXE 86 PID 832 wrote to memory of 2476 832 EXCEL.EXE 86 PID 832 wrote to memory of 2476 832 EXCEL.EXE 86
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\aff6ded528108840b660508b6d541aaf0cbef920b6fd53e1180e81b26d1b71a2.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWow64\rundll32.exeC:\Windows\SysWow64\rundll32.exe ..\wlw.ocx,D"&"l"&"lR"&"egister"&"Serve"&"r2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD57a5b59887430eaa5d3aa3c8f8bed26ea
SHA13f092dc2e93f716ccc21fc73ff2d6686db428174
SHA256bf31a1784b3425504d0efdc083b99ab264e6b0f287a36a017b2c2a1a3c635342
SHA512a49ca3cf6ed6c06b185973cc662ef5417eec557a89e36ce305eff30c2e08df7ee3c804b585909df016d8ea3f25046e8d02ca1cb1b316b9e1b26171049d8aeae4