Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 15:51
Behavioral task
behavioral1
Sample
d45b8e601d68f028ed96dc1d1873ecc18dca7bc753aadec38d6e0ad902eeb915.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d45b8e601d68f028ed96dc1d1873ecc18dca7bc753aadec38d6e0ad902eeb915.xls
Resource
win10v2004-20241007-en
General
-
Target
d45b8e601d68f028ed96dc1d1873ecc18dca7bc753aadec38d6e0ad902eeb915.xls
-
Size
95KB
-
MD5
05f59b5fe342d77f432eb4baacf78a41
-
SHA1
81a360dec37b9c059bd49dd64b683631994c7a32
-
SHA256
d45b8e601d68f028ed96dc1d1873ecc18dca7bc753aadec38d6e0ad902eeb915
-
SHA512
3f2cf807c1de269c7c3dc6a4941639e2356adb759dd332b6b7e308c60a63f4ef2fd1bff32a6aba62b0f9ad9bbe6d2155361f4554532de3c2e1ad14a8267fbcc2
-
SSDEEP
1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJmK:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgP
Malware Config
Extracted
https://fikti.bem.gunadarma.ac.id/SDM/YH8OJ1Zz8miBX/
http://ebuysa.co.za/yt-assets/yZ30/
http://3dstudioa.com.br/files/1ubPAB/
http://boardmart.co.za/images/DvMHPbTLn/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4732 1056 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3968 1056 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4720 1056 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1784 1056 regsvr32.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1056 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1056 EXCEL.EXE 1056 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1056 wrote to memory of 4732 1056 EXCEL.EXE 90 PID 1056 wrote to memory of 4732 1056 EXCEL.EXE 90 PID 1056 wrote to memory of 3968 1056 EXCEL.EXE 92 PID 1056 wrote to memory of 3968 1056 EXCEL.EXE 92 PID 1056 wrote to memory of 4720 1056 EXCEL.EXE 95 PID 1056 wrote to memory of 4720 1056 EXCEL.EXE 95 PID 1056 wrote to memory of 1784 1056 EXCEL.EXE 100 PID 1056 wrote to memory of 1784 1056 EXCEL.EXE 100
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d45b8e601d68f028ed96dc1d1873ecc18dca7bc753aadec38d6e0ad902eeb915.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci1.ocx2⤵
- Process spawned unexpected child process
PID:4732
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci2.ocx2⤵
- Process spawned unexpected child process
PID:3968
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci3.ocx2⤵
- Process spawned unexpected child process
PID:4720
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci4.ocx2⤵
- Process spawned unexpected child process
PID:1784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD54c8c712725c60604b6c61ebc7bfab561
SHA157698812518c78acc4495fdf2fee6625de4409d7
SHA256ae674a6408210fd3c91dc56803a6fee732861fa743ecaf425e093ac243bd37b1
SHA51255ae96b070839e122d9a8c8a5040e0607681e6ea5c241307b55e4966f0b407e59b4e613f039aeafe1aa535705930a1bada935fa5c6aab313ddc3ace50bbc881a