Analysis
-
max time kernel
133s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 13:42
Behavioral task
behavioral1
Sample
fe8984bc30b68ea5202a8aca988433e0f899c5fe3666a3d05775bd9966d9a3bf.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe8984bc30b68ea5202a8aca988433e0f899c5fe3666a3d05775bd9966d9a3bf.xls
Resource
win10v2004-20241007-en
General
-
Target
fe8984bc30b68ea5202a8aca988433e0f899c5fe3666a3d05775bd9966d9a3bf.xls
-
Size
142KB
-
MD5
089e912e66a8f762318e1a0769bccc8d
-
SHA1
65ad8c458913bf2d6cef819218618ff92419e7dd
-
SHA256
fe8984bc30b68ea5202a8aca988433e0f899c5fe3666a3d05775bd9966d9a3bf
-
SHA512
826ca6be6745425e3cfb77f4627e3e6ea88bb41941f9d9c4479af00de3e87ceca6d40e6af929067ab42acfe8f44b77fd63068e99addbaf6fa2959f19980afe1d
-
SSDEEP
3072:kfKpbdrHYrMue8q7QPX+5xtekEdi8/dgA/c/mrWmngyYXnMJelsSKThsdskl4WjS:8KpbdrHYrMue8q7QPX+5xtFEdi8/dgAr
Malware Config
Extracted
https://www.greenvalleyschool.com/rand_images/1R9sqGnZOFKmQi/
https://www.travellers-autobarnrv.com/new/m9E2A5lQQ2noHkMP/
https://www.campusconindigital.org/moodle311/oWZgMvUttcPDFNn/
https://www.destinocuenca.com/libraries/oHuqdP31/
https://www.defsalabs.com/videos/i1Dde2yzrONF5Nmhs28j/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4608 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4608 EXCEL.EXE 4608 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4608 EXCEL.EXE 4608 EXCEL.EXE 4608 EXCEL.EXE 4608 EXCEL.EXE 4608 EXCEL.EXE 4608 EXCEL.EXE 4608 EXCEL.EXE 4608 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\fe8984bc30b68ea5202a8aca988433e0f899c5fe3666a3d05775bd9966d9a3bf.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD53e93c870ffd5b9aefa35046e98e37c2e
SHA1622e58774129a2d2e610e64afc72983d8206c1e4
SHA25643119a0f50a466ca9475a24bf77151132f30218f0f27e6ebec9d810d26b7fb8d
SHA5129ed270d208277c520cc0fd7aea37847624b3acf1bb4cfd9cfc3c95ef99dca0e7b40dd038f3eaf93f15349ccf433f92c845145867d81ae7df8e0187dac2783904