Analysis
-
max time kernel
133s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 15:09
Behavioral task
behavioral1
Sample
405464d6ca86144e95b0c03bfcea1c3aaf82f020d305bbef1f3f1a2edca33157.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
405464d6ca86144e95b0c03bfcea1c3aaf82f020d305bbef1f3f1a2edca33157.xlsm
Resource
win10v2004-20241007-en
General
-
Target
405464d6ca86144e95b0c03bfcea1c3aaf82f020d305bbef1f3f1a2edca33157.xlsm
-
Size
20KB
-
MD5
fab7493514ddc7ada50c8e721bf39134
-
SHA1
96ed7dec90b93424cb518778adbbbbab5571cb53
-
SHA256
405464d6ca86144e95b0c03bfcea1c3aaf82f020d305bbef1f3f1a2edca33157
-
SHA512
5e919e5e0d0678ce89af409c5f5defe0af82a3a52003c21ec01b097be3709c4614eb3e7eb2023f36ed19caaf103a9e927f100b38421fa88ff743bbd33feb7240
-
SSDEEP
384:a/Vb1GNjU5o4CGzPd6ZIw8R3Kb5CzgObff9kC+xbX7zJBq1:atINAo4FLkCBn9kC+xbLzJy
Malware Config
Extracted
http://antaoco.com/wp-admin/5WaIjOuHnUj/
http://amakpost.com/assets/IaeePiSroWtpfZ8uURa/
http://anat-bar.co.il/cgi-bin/UNS6bRMcF4pOTf/
http://andrewpharma.com/wp-includes/WqgKtKrYJM/
http://amkltd.co.uk/amk/IPuhx/
http://gees.com.pl/geessw/2YmxITo6/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3056 3012 regsvr32.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3012 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3012 EXCEL.EXE 3012 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3012 EXCEL.EXE 3012 EXCEL.EXE 3012 EXCEL.EXE 3012 EXCEL.EXE 3012 EXCEL.EXE 3012 EXCEL.EXE 3012 EXCEL.EXE 3012 EXCEL.EXE 3012 EXCEL.EXE 3012 EXCEL.EXE 3012 EXCEL.EXE 3012 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3056 3012 EXCEL.EXE 90 PID 3012 wrote to memory of 3056 3012 EXCEL.EXE 90 PID 3012 wrote to memory of 3056 3012 EXCEL.EXE 90
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\405464d6ca86144e95b0c03bfcea1c3aaf82f020d305bbef1f3f1a2edca33157.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe -s ..\kytk.dll2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5e2d9617ef78b894a4af7c601ea30b733
SHA11fc05b81498bb150172ea7f93be9ec8a416cc023
SHA256962d746a5f688c8963db369a38d6cd5390c55d139c14850874963f9943c757f2
SHA512b72700585e36b841734cca23130131cc000cd56f14a2739dd57fa51b4e922686fa527aca7139651f2de14fed43b6c1c73f45136342217e116df2e1aed392b527
-
Filesize
106KB
MD5f148a6cfb5030f7ee526652aea4fe549
SHA1c72da5f478ecc29db7ebe739859187f24fa4b0f8
SHA25628243c8da5e1441d3e033e67f3c031b43a52974f473cdbf4e7838de241843cac
SHA51244f09a4dc975e9c6c7bd0e4164921b38440a70a5fe3f7907309ccdc721cd977b78c0f770f008eb27015af3edcb2a4d5fc6c6a7f02596cd25e977b140d080163f