Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 16:25
Behavioral task
behavioral1
Sample
d996924de3cfd2d5a8c0040acd061fc1e41bf3be9823d713989992155a15bb4e.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d996924de3cfd2d5a8c0040acd061fc1e41bf3be9823d713989992155a15bb4e.xlsm
Resource
win10v2004-20241007-en
General
-
Target
d996924de3cfd2d5a8c0040acd061fc1e41bf3be9823d713989992155a15bb4e.xlsm
-
Size
46KB
-
MD5
ece3d76a6a0219a033a6999ada585822
-
SHA1
6a250838cb1d7564839a50905e35f7353fabbc7c
-
SHA256
d996924de3cfd2d5a8c0040acd061fc1e41bf3be9823d713989992155a15bb4e
-
SHA512
44f0ed600f85fcef33bcc4a92834c0432b90c7522c1882af0b88c087055fde30aa75f1e27330f40fbddafe8fb2a9896236d6046a3e795bbace019a77aec2af7a
-
SSDEEP
768:Pf4oTBvDOevZCwrvtjizdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Uh0VU2Vy0:34olvDetT5fTR4Lh1NisFYBc3cr+UqV3
Malware Config
Extracted
https://patriciamirapsicologa.com/wp-includes/UfQQtX1LEVwNJPCx/
https://gavalisamajsevasangh.com/abcd-trey/q4hH2T12X/
https://yatrataxi.com/folwu/LC5yH9Ai0l/
https://thelastpeopleonearth-dayz.com/wp-content/V2mmGey/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2760 1840 regsvr32.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1840 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1840 EXCEL.EXE 1840 EXCEL.EXE 1840 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1840 wrote to memory of 2760 1840 EXCEL.EXE 32 PID 1840 wrote to memory of 2760 1840 EXCEL.EXE 32 PID 1840 wrote to memory of 2760 1840 EXCEL.EXE 32 PID 1840 wrote to memory of 2760 1840 EXCEL.EXE 32 PID 1840 wrote to memory of 2760 1840 EXCEL.EXE 32 PID 1840 wrote to memory of 2760 1840 EXCEL.EXE 32 PID 1840 wrote to memory of 2760 1840 EXCEL.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\d996924de3cfd2d5a8c0040acd061fc1e41bf3be9823d713989992155a15bb4e.xlsm1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe /s ..\enu.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD56d6296d0aec196f0eee66fb069ebfd92
SHA100e912dafeac0d990b3a5b13c5c1effab01286bd
SHA25627b522582417323906c3f72f0957427a63b5193489ca4192f87e79d209ef4833
SHA512e133ee2929dce1e7479ba2d80307e20158046ec33e56f73ecaac3c257e4b286172d748770ca7b37a0430592668a375240423c86adb7c9736a4d6464199b09cbd