Analysis
-
max time kernel
133s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 15:30
Behavioral task
behavioral1
Sample
e2f09fb7f5eb3bbf72cd13981454329d5cab5dc117236901f4c402ca39af947e.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2f09fb7f5eb3bbf72cd13981454329d5cab5dc117236901f4c402ca39af947e.xls
Resource
win10v2004-20241007-en
General
-
Target
e2f09fb7f5eb3bbf72cd13981454329d5cab5dc117236901f4c402ca39af947e.xls
-
Size
95KB
-
MD5
cfced6babeacb2e954002d30c762a0cc
-
SHA1
99ada5acbada547e2f5881bbe467320ad133818c
-
SHA256
e2f09fb7f5eb3bbf72cd13981454329d5cab5dc117236901f4c402ca39af947e
-
SHA512
b862349fb87731c92e39908806e9a946aee0d625848cfe9bcf93c563bb04e82dafe51e3ddb108ba1db5388f2a115fd3cf162f233a941d4e53e02cced2b40c71d
-
SSDEEP
1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCg+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgq
Malware Config
Extracted
http://francite.net/images/XI7zS0X1nY/
https://cointrade.world/receipts/Sa6fYJpecEVqiRf05/
http://gedebey-tvradio.info/wp-includes/nOmdPyUpDB/
http://haircutbar.com/cgi-bin/SpJT9OKPmUpJfkGqv/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3028 1360 regsvr32.exe 83 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3444 1360 regsvr32.exe 83 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2248 1360 regsvr32.exe 83 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3612 1360 regsvr32.exe 83 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1360 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1360 EXCEL.EXE 1360 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE 1360 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1360 wrote to memory of 3028 1360 EXCEL.EXE 87 PID 1360 wrote to memory of 3028 1360 EXCEL.EXE 87 PID 1360 wrote to memory of 3444 1360 EXCEL.EXE 89 PID 1360 wrote to memory of 3444 1360 EXCEL.EXE 89 PID 1360 wrote to memory of 2248 1360 EXCEL.EXE 90 PID 1360 wrote to memory of 2248 1360 EXCEL.EXE 90 PID 1360 wrote to memory of 3612 1360 EXCEL.EXE 91 PID 1360 wrote to memory of 3612 1360 EXCEL.EXE 91
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e2f09fb7f5eb3bbf72cd13981454329d5cab5dc117236901f4c402ca39af947e.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci1.ocx2⤵
- Process spawned unexpected child process
PID:3028
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci2.ocx2⤵
- Process spawned unexpected child process
PID:3444
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci3.ocx2⤵
- Process spawned unexpected child process
PID:2248
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci4.ocx2⤵
- Process spawned unexpected child process
PID:3612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD570fe603ef820cde667c8d33873e84a5d
SHA1a647bc00ed04e68b72990ab773c577b319adc8fb
SHA256b6e798074b730d5197a027ad9f66926f999552ef9365318c542f600774553ba7
SHA512c05efa62f4b0483726418a79459e680bbaec6ba6c5f60ff837407acdb8bbb806eb0258f9b18fba952f3cdad30976c45691bb0cf8930b7a7894fdb33cfee1ff68