Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 16:24
Behavioral task
behavioral1
Sample
ff97c98d8df6b30abc71d3ee84bda58f48b330579554822adb57d058e9f0a6ec.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ff97c98d8df6b30abc71d3ee84bda58f48b330579554822adb57d058e9f0a6ec.xls
Resource
win10v2004-20241007-en
General
-
Target
ff97c98d8df6b30abc71d3ee84bda58f48b330579554822adb57d058e9f0a6ec.xls
-
Size
46KB
-
MD5
a8114bda868bab2d3ca70b6fd78d20e3
-
SHA1
35b0399b61a87515d333d7ca0728eea27329757f
-
SHA256
ff97c98d8df6b30abc71d3ee84bda58f48b330579554822adb57d058e9f0a6ec
-
SHA512
2ca2f8d6bbb55ae3a456d2783c4d8bd8113aba017ae7c2669e9f7b4285051e3bcfbe8925e8dd880edec66fa6542b506a3f935fdf0128763197f9af81845314b6
-
SSDEEP
768:pDMPKpb8rGYrMPe3q7Q0XV5xtezE8vpI8UM+VQTUs77quK7KtGu6A:pYKpb8rGYrMPe3q7Q0XV5xtezE8vG8UG
Malware Config
Extracted
https://zktecovn.com/wp-admin/xxfnYY4zwOpFOgu3g1t/
http://zacharywythe.com/pb_index_bak/SkEGB2c/
http://zonainformatica.es/aspnet_client/pVcppgi00Dk/
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2656 2304 regsvr32.exe 30 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 3012 2304 regsvr32.exe 30 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2380 2304 regsvr32.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2304 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2656 2304 EXCEL.EXE 32 PID 2304 wrote to memory of 2656 2304 EXCEL.EXE 32 PID 2304 wrote to memory of 2656 2304 EXCEL.EXE 32 PID 2304 wrote to memory of 2656 2304 EXCEL.EXE 32 PID 2304 wrote to memory of 2656 2304 EXCEL.EXE 32 PID 2304 wrote to memory of 2656 2304 EXCEL.EXE 32 PID 2304 wrote to memory of 2656 2304 EXCEL.EXE 32 PID 2304 wrote to memory of 3012 2304 EXCEL.EXE 33 PID 2304 wrote to memory of 3012 2304 EXCEL.EXE 33 PID 2304 wrote to memory of 3012 2304 EXCEL.EXE 33 PID 2304 wrote to memory of 3012 2304 EXCEL.EXE 33 PID 2304 wrote to memory of 3012 2304 EXCEL.EXE 33 PID 2304 wrote to memory of 3012 2304 EXCEL.EXE 33 PID 2304 wrote to memory of 3012 2304 EXCEL.EXE 33 PID 2304 wrote to memory of 2380 2304 EXCEL.EXE 34 PID 2304 wrote to memory of 2380 2304 EXCEL.EXE 34 PID 2304 wrote to memory of 2380 2304 EXCEL.EXE 34 PID 2304 wrote to memory of 2380 2304 EXCEL.EXE 34 PID 2304 wrote to memory of 2380 2304 EXCEL.EXE 34 PID 2304 wrote to memory of 2380 2304 EXCEL.EXE 34 PID 2304 wrote to memory of 2380 2304 EXCEL.EXE 34
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\ff97c98d8df6b30abc71d3ee84bda58f48b330579554822adb57d058e9f0a6ec.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\wdusx1.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2656
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\wdusx2.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\wdusx3.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2380
-