Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 18:35
Behavioral task
behavioral1
Sample
e8adc700903428e870035e5ba75d99418078f1ca365ebfe05ee636682e62e5ac.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e8adc700903428e870035e5ba75d99418078f1ca365ebfe05ee636682e62e5ac.xls
Resource
win10v2004-20241007-en
General
-
Target
e8adc700903428e870035e5ba75d99418078f1ca365ebfe05ee636682e62e5ac.xls
-
Size
70KB
-
MD5
d67a9a8885789e8d836c4f1166c190fa
-
SHA1
ad11a7e7bdff145821c7422360aba4d2587f4fc4
-
SHA256
e8adc700903428e870035e5ba75d99418078f1ca365ebfe05ee636682e62e5ac
-
SHA512
1b04ae5dd453059bb5c5ad57c641ce031be1704f9fe2d4426e745609a85db059600bb7ffa1b30cd59221ea28d0e837a846631dbc49d7d74a8dd96c597b32baad
-
SSDEEP
1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+e+hDcnTLiQrRTZws8Eg0:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMh
Malware Config
Extracted
https://strachanclark.com/images/3gc4qCpSFYbBMDEC/
https://synapse-archive.com/images/bKaMr/
https://sumuvesa.com/wp-includes/rgL/
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 796 2520 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3756 2520 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 404 2520 regsvr32.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2520 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2520 EXCEL.EXE 2520 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2520 wrote to memory of 796 2520 EXCEL.EXE 85 PID 2520 wrote to memory of 796 2520 EXCEL.EXE 85 PID 2520 wrote to memory of 3756 2520 EXCEL.EXE 86 PID 2520 wrote to memory of 3756 2520 EXCEL.EXE 86 PID 2520 wrote to memory of 404 2520 EXCEL.EXE 98 PID 2520 wrote to memory of 404 2520 EXCEL.EXE 98
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e8adc700903428e870035e5ba75d99418078f1ca365ebfe05ee636682e62e5ac.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa1.ocx2⤵
- Process spawned unexpected child process
PID:796
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa2.ocx2⤵
- Process spawned unexpected child process
PID:3756
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa3.ocx2⤵
- Process spawned unexpected child process
PID:404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5410a04043bbd24195e541197f1af0559
SHA1e5001868560aca57654402c0a4deac35e3c74bee
SHA2565e7649f143746f0f9915b42d72a848b528775faebe494cd940bffabcb6398537
SHA512b4db369c2bd418cc57e9cefdf915183c611548bc0affad44150f998df83eecaa4e3a2158861a1f668e63f20816e5615b7f8d029a0dc07cdd21e19a4c24c5d4ee