Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 21:24
Behavioral task
behavioral1
Sample
45aac4eeb99af8df78a39835a6d1845f463c7e7f43118f155f90488955129476.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
45aac4eeb99af8df78a39835a6d1845f463c7e7f43118f155f90488955129476.xls
Resource
win10v2004-20241007-en
General
-
Target
45aac4eeb99af8df78a39835a6d1845f463c7e7f43118f155f90488955129476.xls
-
Size
70KB
-
MD5
77221120c6ff2154c101f25598fdd728
-
SHA1
153e854886d87037cb5971c5dc4821c4cf405daa
-
SHA256
45aac4eeb99af8df78a39835a6d1845f463c7e7f43118f155f90488955129476
-
SHA512
8ea814f497f4d834f51b394e073d752f801b5d942d43a4041875e6a0b762d543ea4a6c1e9eb8f1ac78c0d9c0a1c0ac38e1f77924068ec06754b8f392badeccdc
-
SSDEEP
1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+/+hDcnTLiQrRTZws8EbK:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM1
Malware Config
Extracted
https://prprofile.com/wp-admin/CIqrvgYsvBiBlIM/
https://retardantedefuegoperu.com/slider/rFhAa78/
http://survei.absensi.net/cc-content/YCcjkOA3ijYNu46Y/
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exeregsvr32.exeregsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4524 3112 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4084 3112 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2044 3112 regsvr32.exe EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 3112 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid process 3112 EXCEL.EXE 3112 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
EXCEL.EXEdescription pid process target process PID 3112 wrote to memory of 4524 3112 EXCEL.EXE regsvr32.exe PID 3112 wrote to memory of 4524 3112 EXCEL.EXE regsvr32.exe PID 3112 wrote to memory of 4084 3112 EXCEL.EXE regsvr32.exe PID 3112 wrote to memory of 4084 3112 EXCEL.EXE regsvr32.exe PID 3112 wrote to memory of 2044 3112 EXCEL.EXE regsvr32.exe PID 3112 wrote to memory of 2044 3112 EXCEL.EXE regsvr32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\45aac4eeb99af8df78a39835a6d1845f463c7e7f43118f155f90488955129476.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa1.ocx2⤵
- Process spawned unexpected child process
PID:4524
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa2.ocx2⤵
- Process spawned unexpected child process
PID:4084
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa3.ocx2⤵
- Process spawned unexpected child process
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize665B
MD58daafe79a9450a0af0ab31823e3262f0
SHA190f53af4390e680dd8c5a858a79d7dfacfe96225
SHA256d81c67ea6aab2201e13eef94d959ee81cae7fc02cfe5cf585af4b5c1e5545ce3
SHA512226e162455ef4cd98b9e36d02d125ecefa77842b752e5ad44fa8be43169a3501d25c09a482a3d444edc7b3301778794915a25f88f76de8db2ee15003e7e94e12