Analysis
-
max time kernel
133s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 16:32
Behavioral task
behavioral1
Sample
e04be054f98f2f07de342aa5522df6a18fff7044f1727461da769da5470b2fd0.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e04be054f98f2f07de342aa5522df6a18fff7044f1727461da769da5470b2fd0.xls
Resource
win10v2004-20241007-en
General
-
Target
e04be054f98f2f07de342aa5522df6a18fff7044f1727461da769da5470b2fd0.xls
-
Size
45KB
-
MD5
255f7b25c43db07d7be08ff8c49298b6
-
SHA1
39f1722e426ef062e8cb3b4920dd2bbdb23017c7
-
SHA256
e04be054f98f2f07de342aa5522df6a18fff7044f1727461da769da5470b2fd0
-
SHA512
f01abe9c9a4d485ec13a9e4091c21fc15eb7e696736ad02e50070bb2582dda3d42fed8051aca4fdc3834efd8b8c31d4328a17a09002605e618783b7ab2a54165
-
SSDEEP
768:bkPKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgAPVdtWgojJcFDqCRt6vuVUeJlp:bsKpb8rGYrMPe3q7Q0XV5xtezEsi8/dR
Malware Config
Extracted
https://fpd.cl/cgi-bin/83E0xgTMc/
https://el-energiaki.gr/wp-content/plugins/really-simple-ssl/testssl/serverport443/WUV5PJA/
https://www.manchesterslt.co.uk/a-to-z-of-slt/Ntrci3Ry/
http://contactworks.nl/layouts/fFxKZabh/
http://baykusoglu.com.tr/wp-admin/Y3sRBcOfZ34wg2sO/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2076 2108 regsvr32.exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2108 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2108 EXCEL.EXE 2108 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2108 EXCEL.EXE 2108 EXCEL.EXE 2108 EXCEL.EXE 2108 EXCEL.EXE 2108 EXCEL.EXE 2108 EXCEL.EXE 2108 EXCEL.EXE 2108 EXCEL.EXE 2108 EXCEL.EXE 2108 EXCEL.EXE 2108 EXCEL.EXE 2108 EXCEL.EXE 2108 EXCEL.EXE 2108 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2076 2108 EXCEL.EXE 89 PID 2108 wrote to memory of 2076 2108 EXCEL.EXE 89
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e04be054f98f2f07de342aa5522df6a18fff7044f1727461da769da5470b2fd0.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe ..\xdwno.ocx2⤵
- Process spawned unexpected child process
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD570ce69441ad1fef071663c97e8c83362
SHA114554537dfb8e45a23d5e502057a6863ec1d6aaf
SHA25631ac237064458aa211a94835b27e154cc4620af3ae88589901a28947001b2d46
SHA5127caadeb7652a66fe1aa7f347697f4a1dc44a3d7ad7532456e0e6d17d7beaa7115e294cb9cd41a3d792712d2469c67a0ad7c545a0ecdf0eb1a7a9de563266bcc2
-
Filesize
25KB
MD58cd3c109905ddb9afe61a50b08309b04
SHA1e102c758a1df661078e4f94daa92547aeb438126
SHA256f531beb78f404dce76f46154b9a79744d3b6341f30cc42edd2b83ab69c154d20
SHA5129720ca0830540ea301f907568e6607d32766b95a08e2589f9d27c4cecaba78b044c19bfbfa755614da715a7bb7586836d8453c34f2852f5222584fb61be80b57