Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 17:23
Behavioral task
behavioral1
Sample
41ac95d706ffd4a11464c18e29b2b7adb9b5f4677bed19c2eeabc406c1ffbda0.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
41ac95d706ffd4a11464c18e29b2b7adb9b5f4677bed19c2eeabc406c1ffbda0.xlsm
Resource
win10v2004-20241007-en
General
-
Target
41ac95d706ffd4a11464c18e29b2b7adb9b5f4677bed19c2eeabc406c1ffbda0.xlsm
-
Size
38KB
-
MD5
a890d2eeb4660c01f81d3b3eaf5f114d
-
SHA1
02554e41b38e3bf51bb5f2240e8c93df370d0560
-
SHA256
41ac95d706ffd4a11464c18e29b2b7adb9b5f4677bed19c2eeabc406c1ffbda0
-
SHA512
26872964dfea935f8654c4b30b24394602f53caa7be4c9764cc13267400256c7aa0b9023661123599a65dfed26e40cdd441ce3dbf3d960faf435c0b17fbf0685
-
SSDEEP
768:psnACdQR84jOZpqcVbZYpoRuBlIiOKMArOooooooooooooooooooooooooooFVIX:CA6gvOZZ1ZYpoQ/pMAeVIyP54T
Malware Config
Extracted
https://landingpageis.com/alfacgiapi/IhZmV1LIJwi6O/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 820 1960 regsvr32.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1960 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1960 EXCEL.EXE 1960 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1960 EXCEL.EXE 1960 EXCEL.EXE 1960 EXCEL.EXE 1960 EXCEL.EXE 1960 EXCEL.EXE 1960 EXCEL.EXE 1960 EXCEL.EXE 1960 EXCEL.EXE 1960 EXCEL.EXE 1960 EXCEL.EXE 1960 EXCEL.EXE 1960 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1960 wrote to memory of 820 1960 EXCEL.EXE 89 PID 1960 wrote to memory of 820 1960 EXCEL.EXE 89 PID 1960 wrote to memory of 820 1960 EXCEL.EXE 89
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\41ac95d706ffd4a11464c18e29b2b7adb9b5f4677bed19c2eeabc406c1ffbda0.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe -s ..\roil.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize686B
MD5887995259562a6d1694b8b85edb62543
SHA1d744a10325e1fea72a0871d1aaa64101bba4c556
SHA256d0a4e45095081abfa2d1337304f24791f312a472d8b679ce3e1ef58601419655
SHA512e4743dbe734e4ccf33de9922490837b43ab2dee7e84a774dfedd1fea7332d8061f0028c5015ec54b5ee6e9ac5cd1ba52b0d520fd57a6efabfdc2563bc159d716
-
Filesize
1KB
MD5adde8701a54a8eabca8e51a468b275ba
SHA148015733acc6dfcfcc8af3d564e575310ac15d82
SHA256adc9d75ff472fbc0471b499998dfea1ad441570f64bc2d43a093045791dc5340
SHA512cda1e2167f0a7b6a50106338188f1e8010c3adeb133cce7d99987520550d2efa9a77dc77011e96cec2ae2b441d185b6ce03474a2c40dd7562e8e87a3036621e5