Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 17:56
Behavioral task
behavioral1
Sample
4737df28e330a5e7a77110b02c1d90f060a9072704142d93eb14bb43c7aae7c1.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4737df28e330a5e7a77110b02c1d90f060a9072704142d93eb14bb43c7aae7c1.xlsm
Resource
win10v2004-20241007-en
General
-
Target
4737df28e330a5e7a77110b02c1d90f060a9072704142d93eb14bb43c7aae7c1.xlsm
-
Size
20KB
-
MD5
2272673a9ab26a0bea6249d0407f7636
-
SHA1
94d423ae8101c679c3f721b1af8c08f488cfc24a
-
SHA256
4737df28e330a5e7a77110b02c1d90f060a9072704142d93eb14bb43c7aae7c1
-
SHA512
91e01f32be7a6e2ee14b538c6c16e6d3c564956ffc2e5edb44cb29fe55f6b674f1b4b4a4a6dec8d518e71c4f9541afe205b58da3395d36c797589a274f80908e
-
SSDEEP
384:G/Vb1GNjU5o4CGzPd6ZIw8R3Kb5CzgObff9kC+xbX7zJBq1:GtINAo4FLkCBn9kC+xbLzJy
Malware Config
Extracted
http://antaoco.com/wp-admin/5WaIjOuHnUj/
http://amakpost.com/assets/IaeePiSroWtpfZ8uURa/
http://anat-bar.co.il/cgi-bin/UNS6bRMcF4pOTf/
http://andrewpharma.com/wp-includes/WqgKtKrYJM/
http://amkltd.co.uk/amk/IPuhx/
http://gees.com.pl/geessw/2YmxITo6/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1436 3536 regsvr32.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3536 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3536 EXCEL.EXE 3536 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3536 EXCEL.EXE 3536 EXCEL.EXE 3536 EXCEL.EXE 3536 EXCEL.EXE 3536 EXCEL.EXE 3536 EXCEL.EXE 3536 EXCEL.EXE 3536 EXCEL.EXE 3536 EXCEL.EXE 3536 EXCEL.EXE 3536 EXCEL.EXE 3536 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3536 wrote to memory of 1436 3536 EXCEL.EXE 93 PID 3536 wrote to memory of 1436 3536 EXCEL.EXE 93 PID 3536 wrote to memory of 1436 3536 EXCEL.EXE 93
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4737df28e330a5e7a77110b02c1d90f060a9072704142d93eb14bb43c7aae7c1.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe -s ..\kytk.dll2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:1436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD550a03cd1fae24427fcf7d3b4036086dd
SHA131761c0a406b5cefc3e8531ef272a23e76b86fad
SHA25618bdb247e28f0b6723dda6ec0c9e1d0d0606374d1567bea29a6363247471d3ec
SHA51280f76d5bb46d00f0e122e085d7b8a47c19489ec23cd96498bf84888d04e0c1ea2f636eadfd92a604d94c72270fb02e49b17952a8fd7a95fa34cad4b9d93101ae
-
Filesize
106KB
MD5f148a6cfb5030f7ee526652aea4fe549
SHA1c72da5f478ecc29db7ebe739859187f24fa4b0f8
SHA25628243c8da5e1441d3e033e67f3c031b43a52974f473cdbf4e7838de241843cac
SHA51244f09a4dc975e9c6c7bd0e4164921b38440a70a5fe3f7907309ccdc721cd977b78c0f770f008eb27015af3edcb2a4d5fc6c6a7f02596cd25e977b140d080163f