Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 17:23
Behavioral task
behavioral1
Sample
41ac95d706ffd4a11464c18e29b2b7adb9b5f4677bed19c2eeabc406c1ffbda0.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
41ac95d706ffd4a11464c18e29b2b7adb9b5f4677bed19c2eeabc406c1ffbda0.xlsm
Resource
win10v2004-20241007-en
General
-
Target
41ac95d706ffd4a11464c18e29b2b7adb9b5f4677bed19c2eeabc406c1ffbda0.xlsm
-
Size
38KB
-
MD5
a890d2eeb4660c01f81d3b3eaf5f114d
-
SHA1
02554e41b38e3bf51bb5f2240e8c93df370d0560
-
SHA256
41ac95d706ffd4a11464c18e29b2b7adb9b5f4677bed19c2eeabc406c1ffbda0
-
SHA512
26872964dfea935f8654c4b30b24394602f53caa7be4c9764cc13267400256c7aa0b9023661123599a65dfed26e40cdd441ce3dbf3d960faf435c0b17fbf0685
-
SSDEEP
768:psnACdQR84jOZpqcVbZYpoRuBlIiOKMArOooooooooooooooooooooooooooFVIX:CA6gvOZZ1ZYpoQ/pMAeVIyP54T
Malware Config
Extracted
https://landingpageis.com/alfacgiapi/IhZmV1LIJwi6O/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2740 2184 regsvr32.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2184 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2184 EXCEL.EXE 2184 EXCEL.EXE 2184 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2740 2184 EXCEL.EXE 30 PID 2184 wrote to memory of 2740 2184 EXCEL.EXE 30 PID 2184 wrote to memory of 2740 2184 EXCEL.EXE 30 PID 2184 wrote to memory of 2740 2184 EXCEL.EXE 30 PID 2184 wrote to memory of 2740 2184 EXCEL.EXE 30 PID 2184 wrote to memory of 2740 2184 EXCEL.EXE 30 PID 2184 wrote to memory of 2740 2184 EXCEL.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\41ac95d706ffd4a11464c18e29b2b7adb9b5f4677bed19c2eeabc406c1ffbda0.xlsm1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe -s ..\roil.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57711e85f946ab08a4a4b53b16df2dea9
SHA1273aa04b8aec225358b5d63aa4487ea7d4b3615a
SHA256ab0ab26d6b5ca32a3ae70e669bb612fd47981bfb1f1604d5ebe0c625e710efe2
SHA51260d0adf9b498c0e509b66ae60ba6e2b574e74580e7f14a46cb5640ad42f3217fbb79c94a429411bed8e065450d26f8e9d07f12e886e3a2706e1badc4201c7f1c