Analysis
-
max time kernel
133s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 14:01
Behavioral task
behavioral1
Sample
1508c5172f9a2a3bac47d878f67e10c5debb3beb58a86223ac2beb49d1a77e4c.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1508c5172f9a2a3bac47d878f67e10c5debb3beb58a86223ac2beb49d1a77e4c.xls
Resource
win10v2004-20241007-en
General
-
Target
1508c5172f9a2a3bac47d878f67e10c5debb3beb58a86223ac2beb49d1a77e4c.xls
-
Size
95KB
-
MD5
3186ea1421ef263e2851058d3570cfd3
-
SHA1
1792cae0cec27c7be0b199bab666b31629103f79
-
SHA256
1508c5172f9a2a3bac47d878f67e10c5debb3beb58a86223ac2beb49d1a77e4c
-
SHA512
e0c5e405638f345d38626af300b0ac32ca53f2ab57712b839d74ad284fd3d0030a49e699f8da645c1866301446ca8a84090038da3c6cf28bde1723459fcb1f54
-
SSDEEP
1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgBHuS4hcTO97v7UYdEJm8q:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgC
Malware Config
Extracted
https://atperson.com/campusvirtual/3aAaeSKPaURF/
https://buffetmazzi.com.br/ckfinder/i/
http://atici.net/c/MgEC/
http://www.birebiregitim.net/wp-includes/f/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3640 1700 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3684 1700 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2948 1700 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2536 1700 regsvr32.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1700 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1700 EXCEL.EXE 1700 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1700 EXCEL.EXE 1700 EXCEL.EXE 1700 EXCEL.EXE 1700 EXCEL.EXE 1700 EXCEL.EXE 1700 EXCEL.EXE 1700 EXCEL.EXE 1700 EXCEL.EXE 1700 EXCEL.EXE 1700 EXCEL.EXE 1700 EXCEL.EXE 1700 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1700 wrote to memory of 3640 1700 EXCEL.EXE 89 PID 1700 wrote to memory of 3640 1700 EXCEL.EXE 89 PID 1700 wrote to memory of 3684 1700 EXCEL.EXE 92 PID 1700 wrote to memory of 3684 1700 EXCEL.EXE 92 PID 1700 wrote to memory of 2948 1700 EXCEL.EXE 93 PID 1700 wrote to memory of 2948 1700 EXCEL.EXE 93 PID 1700 wrote to memory of 2536 1700 EXCEL.EXE 94 PID 1700 wrote to memory of 2536 1700 EXCEL.EXE 94
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\1508c5172f9a2a3bac47d878f67e10c5debb3beb58a86223ac2beb49d1a77e4c.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci1.ocx2⤵
- Process spawned unexpected child process
PID:3640
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci2.ocx2⤵
- Process spawned unexpected child process
PID:3684
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci3.ocx2⤵
- Process spawned unexpected child process
PID:2948
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci4.ocx2⤵
- Process spawned unexpected child process
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5885104547464afac0698fe21186c1f91
SHA1332f7dbec5f2505e0b20763d0a8d458a63875187
SHA256d8e61d1b722b6339e00e3ffadb9b3e334385462d0ae68a4f6a557427372b8b80
SHA5121f7c2e633b7967d6f8e2289fa87c01fcc7e9c771ad6211090aca86b8de93dd1634e19b5fcf5fe9b4dad8eabb4466ee60cd725857948d5007d03ac1919b89177f