Analysis
-
max time kernel
133s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 18:14
Behavioral task
behavioral1
Sample
201417f7cbaa4eaacac2c74854ea2b5a7e683ca636e499bd6cb4895d198176db.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
201417f7cbaa4eaacac2c74854ea2b5a7e683ca636e499bd6cb4895d198176db.xlsm
Resource
win10v2004-20241007-en
General
-
Target
201417f7cbaa4eaacac2c74854ea2b5a7e683ca636e499bd6cb4895d198176db.xlsm
-
Size
74KB
-
MD5
7f83c0b2ef2a5dc0300d7eec9b986ddc
-
SHA1
d6be7205d8e582a8f91d49979a49f9344bb24c0f
-
SHA256
201417f7cbaa4eaacac2c74854ea2b5a7e683ca636e499bd6cb4895d198176db
-
SHA512
4835a09656a0498765dd9cfd9e7c9fbbf926495fc6e1ba69106d12739f725f1442aa18619b86f612e1791dcc2c65eb6ef6c68d15799111d598ea3e07811e5d66
-
SSDEEP
1536:4qSto0NSVUINwtzLT7OMuuAe0yOcfpXZGsM9VIzB3g:43tzSmICpH7OZuvZGsMl
Malware Config
Extracted
http://part-co.org/wp-admin/u4NPmsvZ3EWBa8tYlZv/
https://protokol.mx/Archivos/HgTqbLkgrgLAvunV/
http://letea.eu/wp-content/CgaqeucmpVT2NEK/
http://ponizinny.nl/wp-admin/KdLO9n/
http://sport-foto.nu/wp-content/Jqf9mfIPcA/
http://www.citybridgesc.at/Ergebnisse/K7mPH42tTl7slZgWH/
http://life.lst.dx.am/img/WNIWv/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1548 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1548 EXCEL.EXE 1548 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1548 EXCEL.EXE 1548 EXCEL.EXE 1548 EXCEL.EXE 1548 EXCEL.EXE 1548 EXCEL.EXE 1548 EXCEL.EXE 1548 EXCEL.EXE 1548 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\201417f7cbaa4eaacac2c74854ea2b5a7e683ca636e499bd6cb4895d198176db.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD582ce3058778bca8518df46961d368b78
SHA13a2e3253ffed6738ebd09a0cf2204f6109b842bb
SHA25679ed51a876309a8d787d121ab4e07d96b9093908685fd742527529e7051d3a82
SHA512f31497e990c2cfdf23d9b88bf69f16c8ad892021db8bc7d0d6c6057e4ec916dc699173f530faba02d4069b4f7b4f94f5cb3b9e904674c46e2e1056979e2c2cec