Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 19:49
Behavioral task
behavioral1
Sample
5cd8decb65dc63c909f33d3ec42380e7770b55ff233713d6c9e701ec94895ab3.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5cd8decb65dc63c909f33d3ec42380e7770b55ff233713d6c9e701ec94895ab3.xls
Resource
win10v2004-20241007-en
General
-
Target
5cd8decb65dc63c909f33d3ec42380e7770b55ff233713d6c9e701ec94895ab3.xls
-
Size
40KB
-
MD5
193bc8b61cde3226b7ebb962fd3d4f18
-
SHA1
4879e7457d55232f5216a2f0ac5b9bc63a67697e
-
SHA256
5cd8decb65dc63c909f33d3ec42380e7770b55ff233713d6c9e701ec94895ab3
-
SHA512
62ca1e05d7faaa7e2ccc4091c7de10d7039a9bad572eea01a0e2810acfb0c8914cdede55377243122c592a9c19c1604d82dbbe9e2bcdf3e55212ecc13b1e2d9f
-
SSDEEP
768:pkZKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgAdCBn9kC+xbqc6q+otrvEVLcAo:p+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/d5
Malware Config
Extracted
https://www.itesmeitic.com/term/IFjx5ElE0ldr8wDDHjub/
https://www.ingonherbal.com/application/PhEbceg4Tx/
http://ftp.colibriconstruction.net/cc/KHieqeOsagkmlGIuXc56/
http://commune-ariana.tn/sites/3BvaCmo/
http://dmaicinnovations.com/Swift-5.0.2/jEtePB/
https://drcreative.cz/images/DwThyQntyImCHk0tpba/
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2404 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 2404 EXCEL.EXE 2404 EXCEL.EXE 2404 EXCEL.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\5cd8decb65dc63c909f33d3ec42380e7770b55ff233713d6c9e701ec94895ab3.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2404