Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 19:03
Behavioral task
behavioral1
Sample
4e59716215358b1963af87001f4b9c2965b20270a981f0815c8deb1093c22bbb.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4e59716215358b1963af87001f4b9c2965b20270a981f0815c8deb1093c22bbb.xls
Resource
win10v2004-20241007-en
General
-
Target
4e59716215358b1963af87001f4b9c2965b20270a981f0815c8deb1093c22bbb.xls
-
Size
95KB
-
MD5
3353a4b9d5935314092349910e762df0
-
SHA1
66ebeb8e6ca50ce7009e00e7afa062b12f25240e
-
SHA256
4e59716215358b1963af87001f4b9c2965b20270a981f0815c8deb1093c22bbb
-
SHA512
0b8c7b4d9672d70024d0d36b2600dff601d52631c7e79bf7fae84ae24593e4c25521d0f04f5596c5a256f7ff6be97b12bc2cf1e7c9334498c9ba6f19e8020afe
-
SSDEEP
1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJmJ:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgk
Malware Config
Extracted
https://fikti.bem.gunadarma.ac.id/SDM/YH8OJ1Zz8miBX/
http://ebuysa.co.za/yt-assets/yZ30/
http://3dstudioa.com.br/files/1ubPAB/
http://boardmart.co.za/images/DvMHPbTLn/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3616 3600 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2344 3600 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2792 3600 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3236 3600 regsvr32.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3600 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3600 EXCEL.EXE 3600 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3600 EXCEL.EXE 3600 EXCEL.EXE 3600 EXCEL.EXE 3600 EXCEL.EXE 3600 EXCEL.EXE 3600 EXCEL.EXE 3600 EXCEL.EXE 3600 EXCEL.EXE 3600 EXCEL.EXE 3600 EXCEL.EXE 3600 EXCEL.EXE 3600 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3600 wrote to memory of 3616 3600 EXCEL.EXE 89 PID 3600 wrote to memory of 3616 3600 EXCEL.EXE 89 PID 3600 wrote to memory of 2344 3600 EXCEL.EXE 92 PID 3600 wrote to memory of 2344 3600 EXCEL.EXE 92 PID 3600 wrote to memory of 2792 3600 EXCEL.EXE 95 PID 3600 wrote to memory of 2792 3600 EXCEL.EXE 95 PID 3600 wrote to memory of 3236 3600 EXCEL.EXE 96 PID 3600 wrote to memory of 3236 3600 EXCEL.EXE 96
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4e59716215358b1963af87001f4b9c2965b20270a981f0815c8deb1093c22bbb.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci1.ocx2⤵
- Process spawned unexpected child process
PID:3616
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci2.ocx2⤵
- Process spawned unexpected child process
PID:2344
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci3.ocx2⤵
- Process spawned unexpected child process
PID:2792
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci4.ocx2⤵
- Process spawned unexpected child process
PID:3236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5719a576fd82c153779437808fda5956b
SHA1aa8d666cc6a6b4d6f35bfe62eae527a62b47582a
SHA256fa42766f3280b8d882e9e0e5ede4a2fb523187853435220e3247fcba4e15fe94
SHA5122b145a7a3f7029cb6ed8abcee8dda83f17d81e5850f9b554d3b2afd797fa25f20458431e46ec678d2f0266db1163e7e261890f45e69e20d5464b5b785a305a9c