Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 18:40
Behavioral task
behavioral1
Sample
c1267528f4b81191aaf05b334bacf697c9ec41f5e2892f2202d0c3501e4f151d.xls
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
c1267528f4b81191aaf05b334bacf697c9ec41f5e2892f2202d0c3501e4f151d.xls
Resource
win10v2004-20241007-en
General
-
Target
c1267528f4b81191aaf05b334bacf697c9ec41f5e2892f2202d0c3501e4f151d.xls
-
Size
70KB
-
MD5
287f3debd0c4fe8a48b2396da2e20b3a
-
SHA1
db209563a5fd9975efeac926d04f38534512e8cd
-
SHA256
c1267528f4b81191aaf05b334bacf697c9ec41f5e2892f2202d0c3501e4f151d
-
SHA512
721cffc8a4d1e2043281d7ec32cb6969b448cd2f5cd809f099b59231fbff75267b0c2332b2c98092d2c7751fb94e302dc0e5c3b1a8552044142b598e6e07c4ec
-
SSDEEP
1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+/+hDcnTLiQrRTZws8EbK:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM1
Malware Config
Extracted
https://prprofile.com/wp-admin/CIqrvgYsvBiBlIM/
https://retardantedefuegoperu.com/slider/rFhAa78/
http://survei.absensi.net/cc-content/YCcjkOA3ijYNu46Y/
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exeregsvr32.exeregsvr32.exedescription pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4512 2244 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4724 2244 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2908 2244 regsvr32.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 2244 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid Process 2244 EXCEL.EXE 2244 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid Process 2244 EXCEL.EXE 2244 EXCEL.EXE 2244 EXCEL.EXE 2244 EXCEL.EXE 2244 EXCEL.EXE 2244 EXCEL.EXE 2244 EXCEL.EXE 2244 EXCEL.EXE 2244 EXCEL.EXE 2244 EXCEL.EXE 2244 EXCEL.EXE 2244 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
EXCEL.EXEdescription pid Process procid_target PID 2244 wrote to memory of 4512 2244 EXCEL.EXE 87 PID 2244 wrote to memory of 4512 2244 EXCEL.EXE 87 PID 2244 wrote to memory of 4724 2244 EXCEL.EXE 88 PID 2244 wrote to memory of 4724 2244 EXCEL.EXE 88 PID 2244 wrote to memory of 2908 2244 EXCEL.EXE 89 PID 2244 wrote to memory of 2908 2244 EXCEL.EXE 89
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\c1267528f4b81191aaf05b334bacf697c9ec41f5e2892f2202d0c3501e4f151d.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa1.ocx2⤵
- Process spawned unexpected child process
PID:4512
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa2.ocx2⤵
- Process spawned unexpected child process
PID:4724
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa3.ocx2⤵
- Process spawned unexpected child process
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize680B
MD5fd5b75c3bc54295df8b79d6eb03de054
SHA1f44574d4c7b5355ce4c6a6ac2022bad11addd750
SHA2564ebabbb1f7e47ed23d7c98e7bd1e404385fc0a5059ac26c254cd4795a6c34c1c
SHA51277bdaeaec3b893ad50b6487f8b16f917e38bec3723875148b27caacb40e6272e336686d40983d5d47e567a8eb0b916c1c9f8a5de060912e5812b0f8abd0e7b82