Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 18:53
Behavioral task
behavioral1
Sample
b834ae0cc998615fa9a21eded0af0d8009167d77b10fad933d0d5f35b38c1fb6.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b834ae0cc998615fa9a21eded0af0d8009167d77b10fad933d0d5f35b38c1fb6.xlsm
Resource
win10v2004-20241007-en
General
-
Target
b834ae0cc998615fa9a21eded0af0d8009167d77b10fad933d0d5f35b38c1fb6.xlsm
-
Size
30KB
-
MD5
80aef7edfc9c272322aaea7038f55657
-
SHA1
4d9557ec54d47beb0a0d2eee419d7ee9101b4c06
-
SHA256
b834ae0cc998615fa9a21eded0af0d8009167d77b10fad933d0d5f35b38c1fb6
-
SHA512
0fb2ef79c7e2f40d0eab8c13b4ca5021371b43830d8ce62b48653655bbfda74f44b16a114b251ea6cae06506a6bc3491846b9773a76e5bdc85f2597ebeed004e
-
SSDEEP
384:n842JZPFhNjtOA7icg0SCdiVH2KgUrNU/qWhZOdBNPJM+kqr9eCgh0k5M2E6v:gHFhNZliH2ydFfPdkqstJhE6v
Malware Config
Extracted
http://henrysfreshroast.com/6cc4ts0bkrOlXq/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1272 2464 regsvr32.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2464 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2464 EXCEL.EXE 2464 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2464 wrote to memory of 1272 2464 EXCEL.EXE 90 PID 2464 wrote to memory of 1272 2464 EXCEL.EXE 90 PID 2464 wrote to memory of 1272 2464 EXCEL.EXE 90
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b834ae0cc998615fa9a21eded0af0d8009167d77b10fad933d0d5f35b38c1fb6.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe -s ..\rfs.dll2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:1272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5b92a597d991754cd8065d5e8767f0a10
SHA1481097ce24d6f64c686a36ae07f611413de11cb0
SHA2566a1bba4de8db4c1be0507e7255f5a5c3b4338708ad68aa00930ef8ed0ff75a20
SHA51265d8021e363dc10318becc437c715e2bd5193cf63f841b50e6c8a88aa94776fd66a85d99b692305284e97ab9768056a0ed855920ed4ae5022696cf3d5ed54b94
-
Filesize
56KB
MD5d5cbf3235a39c09c9d292dafdf0393a5
SHA1ae109e202e6f0965b47f38ee29b3725800939a9f
SHA256208d15c175407bc56c9e1d1a6e31290cf8c04fe1da742e4ad0dbe06960b7f1dd
SHA512202212aeb1cabe772e05ec7649b83be4a04b68b644a1621993e91e370dc0b9de268ea50f0dab3a74178ecb648d06b5173222d3ed1f0e31d04abeded020b079bd