Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 16:41
Behavioral task
behavioral1
Sample
7e719ee6bcf016f525c302a96135f649eed29a4f01428793ea82097f6dd622cd.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7e719ee6bcf016f525c302a96135f649eed29a4f01428793ea82097f6dd622cd.xlsm
Resource
win10v2004-20241007-en
General
-
Target
7e719ee6bcf016f525c302a96135f649eed29a4f01428793ea82097f6dd622cd.xlsm
-
Size
32KB
-
MD5
a1409d09dd35fb9a308ae78cb1bd5f7c
-
SHA1
c5b2ff0b27494854dbd5ab84f9c5d712e886a1b1
-
SHA256
7e719ee6bcf016f525c302a96135f649eed29a4f01428793ea82097f6dd622cd
-
SHA512
7f14d74dd661a9c28ef58da9d546f0988aeaad3e5610ef2486d372f9c1eb5d26d29f2169a538124667b2482b315a119cd44be987c5178e95db6cb931b148214c
-
SSDEEP
384:wjzZPFhNjqEBOA7iEibbwBLg0SCdiVXUKgUrNU/qWhZOdBNPJM+kqr9eCgh0k5lY:wjpFhNNlizXT28dFfPdkqstJmE6/
Malware Config
Extracted
https://casache.com/web/n3jxwXXwa/
https://www.blessingsource.com/blessingsource.com/rFQ0Ip6lQXXK/
http://ccalaire.com/wp-admin/d1pGRa0X/
http://cdimprintpr.com/brochure2/A9NmYDndZ/
http://careerplan.host20.uk/images/Ls/
http://ausnz.net/2010wc/odSi5tQKkCIXEWl9/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2564 2340 regsvr32.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2340 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2340 EXCEL.EXE 2340 EXCEL.EXE 2340 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2564 2340 EXCEL.EXE 32 PID 2340 wrote to memory of 2564 2340 EXCEL.EXE 32 PID 2340 wrote to memory of 2564 2340 EXCEL.EXE 32 PID 2340 wrote to memory of 2564 2340 EXCEL.EXE 32 PID 2340 wrote to memory of 2564 2340 EXCEL.EXE 32 PID 2340 wrote to memory of 2564 2340 EXCEL.EXE 32 PID 2340 wrote to memory of 2564 2340 EXCEL.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\7e719ee6bcf016f525c302a96135f649eed29a4f01428793ea82097f6dd622cd.xlsm1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe -s ..\rfs.dll2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD56667bf04ed804089964ccb12a466e30a
SHA1ac22ef61a329266426bf09e2d1414b04816332ac
SHA2566b7164d4f4612be8e9dc0e9231de04366335b63eb34f1b142348ad14c7517c4d
SHA512e39d9f94804c14e6dd51cf0b9f46902d302b3186692f1d94b623268ea1ac210c809c0b7a59ac6875f687905116ba5552f7f618c4ed7d3c7e9ddd95c0844c75b5