Analysis
-
max time kernel
0s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 19:29
Behavioral task
behavioral1
Sample
e779167e191af5c2ee1116181a42504565f6f90f10b6a1ff4c0b7d086c379c2a.xlsm
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
e779167e191af5c2ee1116181a42504565f6f90f10b6a1ff4c0b7d086c379c2a.xlsm
Resource
win10v2004-20241007-en
General
-
Target
e779167e191af5c2ee1116181a42504565f6f90f10b6a1ff4c0b7d086c379c2a.xlsm
-
Size
35KB
-
MD5
9014f88c4b89a6a945a0e04593b9cf50
-
SHA1
e296a3002c0f8c5bea7f4e6ee2232421233827a6
-
SHA256
e779167e191af5c2ee1116181a42504565f6f90f10b6a1ff4c0b7d086c379c2a
-
SHA512
238d48f070c33d19ad8afa7f3e33fc91135a65f8ab7a32a700636dcd9244add05f417187bdc571841978687a276f16938587fc4c6a93eecd11851ffbf7c8c33e
-
SSDEEP
768:KYKtm5eMn7AjOZpqcVbZYpoRuBlIiOKMArOooooooooooooooooooooooooooXLR:KYKtmg+UOZZ1ZYpoQ/pMAm
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4200 1488 regsvr32.exe 82
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e779167e191af5c2ee1116181a42504565f6f90f10b6a1ff4c0b7d086c379c2a.xlsm"1⤵PID:1488
-
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe -s ..\xdha.ocx2⤵
- Process spawned unexpected child process
PID:4200
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5440679d77904d56a4648a21a6985dc56
SHA1428e730dafd6d183282da49843f13446aa446fa0
SHA2567af6871936490ab3783dcfba77360e33a500193d40e3a1398e82a27ae5a24dfa
SHA512f27671d9621aaadc791f10b1ebd71eb05f9eccd6350d01a00afa578a1f0c85d301bf1c6b9c25bd9523b5b1d0a609f9e7fe0fed91f7c641c6a99bdcb4f4a33202
-
Filesize
9B
MD59d1ead73e678fa2f51a70a933b0bf017
SHA1d205cbd6783332a212c5ae92d73c77178c2d2f28
SHA2560019dfc4b32d63c1392aa264aed2253c1e0c2fb09216f8e2cc269bbfb8bb49b5
SHA512935b3d516e996f6d25948ba8a54c1b7f70f7f0e3f517e36481fdf0196c2c5cfc2841f86e891f3df9517746b7fb605db47cdded1b8ff78d9482ddaa621db43a34