Analysis
-
max time kernel
133s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 14:59
Behavioral task
behavioral1
Sample
0a6f06b1263bf707a19fd0c77c34daec67fd79d02b42aa5726fd56bd92d24093.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0a6f06b1263bf707a19fd0c77c34daec67fd79d02b42aa5726fd56bd92d24093.xlsm
Resource
win10v2004-20241007-en
General
-
Target
0a6f06b1263bf707a19fd0c77c34daec67fd79d02b42aa5726fd56bd92d24093.xlsm
-
Size
74KB
-
MD5
eaa6e4c2dab5ae9f529ec28ac1cc8a8d
-
SHA1
bef868f62062dc9d8c8a2b8317bc7e7a5801c287
-
SHA256
0a6f06b1263bf707a19fd0c77c34daec67fd79d02b42aa5726fd56bd92d24093
-
SHA512
b24cf593c2dc7bcd955096ee7662dc5166272e53fae0adb7fadb148ad3d9b59f32eae743b6e5d7fa94f58da8e1978e4927626a6bf3611af8aabbca87b66fd606
-
SSDEEP
1536:WuSto0NSVUINwtzLT7OMuuAe0yOcfpXZGsM9VIzEA:wtzSmICpH7OZuvZGsMo
Malware Config
Extracted
https://thesparklezbox.com/wp-admin/kFkWN/
https://herbtytox.com/wp-admin/dq/
http://www.asyadegirmen.com/Template/nEMRY55nQgF/
https://westthamesphysio.com/blog/D8AAkEyZ7u/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2184 1316 regsvr32.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1316 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1316 EXCEL.EXE 1316 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2184 1316 EXCEL.EXE 90 PID 1316 wrote to memory of 2184 1316 EXCEL.EXE 90 PID 1316 wrote to memory of 2184 1316 EXCEL.EXE 90
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0a6f06b1263bf707a19fd0c77c34daec67fd79d02b42aa5726fd56bd92d24093.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe -s ..\rds.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5e71c3a9d806ee674da17d74cd2130b56
SHA1792aff9d0628bf2730168e62eb9ded100a71c0f4
SHA2561fde79b818706c47f94dc46394ad0ed09bf4607a91cf839ed60677bc2728a42c
SHA512b364b799f428740b01b03df9c91d80178fbef722b8b85e5077d94f028fa4f519128798ffd3369a61d1d920c67ed5b216672842f878fae19e1a85973194691751
-
Filesize
966B
MD51a8978d9d37041fe0089728cd6c23233
SHA1f0485019f25ee50bb77f23081a8964e28e56cfb2
SHA25687a97454942b85b5afc9cb9733bb7ce96cdf3422f6bfc95823f8edf6b2e2c607
SHA5129ea43ede1eab73d3ac65bc3e9c13836c51d768daf5e300a0f57a26c0ca9cb2655455e5731664a92c969520dc05f7c71292d6a947405e06c2b1f88a399cd8d42b