Analysis
-
max time kernel
133s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 20:38
Behavioral task
behavioral1
Sample
3b340212b863324ef8c0228aff6bcb6c008ce08160c31d02c3b18b362e4f0bff.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b340212b863324ef8c0228aff6bcb6c008ce08160c31d02c3b18b362e4f0bff.xls
Resource
win10v2004-20241007-en
General
-
Target
3b340212b863324ef8c0228aff6bcb6c008ce08160c31d02c3b18b362e4f0bff.xls
-
Size
47KB
-
MD5
0b96bcfb5376095b15ee29633feae05b
-
SHA1
94241c3bdc25b33d595ec38c2132be0ffc2d41a0
-
SHA256
3b340212b863324ef8c0228aff6bcb6c008ce08160c31d02c3b18b362e4f0bff
-
SHA512
b6841d24ff52cde810babf185c929657b727e205270f157c9413a44d2646053827e3cdc9a8e000b8d011f53feddc021228383fd178007332d70c0a92eabadfa2
-
SSDEEP
768:yDM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JOiX6DGwUk7qHDSEuRZjiBp5H:y62tfQXi8vgLZkTOHkQT51Vp6AwPe8gV
Malware Config
Extracted
https://eleselektromekanik.com/69Iq5Pwbd0/s/
https://demo.icn.com.np/stories/Qk/
http://demo34.ckg.hk/service/Atk7RQfUV673M/
https://bitmovil.mx/css/TrgyPiTXy3/
http://dupot.cz/tvhost/DUnMUvwZOhQs/
http://focanainternet.com.br/erros/DepAK3p1Y/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4512 4720 regsvr32.exe EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4720 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid process 4720 EXCEL.EXE 4720 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
EXCEL.EXEdescription pid process target process PID 4720 wrote to memory of 4512 4720 EXCEL.EXE regsvr32.exe PID 4720 wrote to memory of 4512 4720 EXCEL.EXE regsvr32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3b340212b863324ef8c0228aff6bcb6c008ce08160c31d02c3b18b362e4f0bff.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe ..\wnrul.ocx2⤵
- Process spawned unexpected child process
PID:4512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize677B
MD5a8871ecf1789f5d9dbda2838d0eec4fb
SHA1c3a245953879b5eb9c3d97e5785799228b5a45bd
SHA256e6bcc9c59f10debfae5ed05f051c5d9f9d312bd435695f57dfc8c56bdca03e51
SHA51267dbdc2abfb7a29f7c1cddba254bcbfdae79db97d4286cdac98ccc3aad9a2b5af700dd99d1ec24a4233fb8b60e3ba3072a5a19ca7ac87a4484ab180410f1e541
-
Filesize
3KB
MD5cc666088a917dd7f5da8b6689069aec0
SHA1f688de634ccd20939a522391abb5049483e726bd
SHA256332d102987273318f13e7fc89a043613c6dd5dd7eb7d21033a2ab73dd438a405
SHA51277a15aebeb10d355e3723fdebd2ea59a09a60d54f09ab9a6f06c52dbfa3bea0965ff49b7a1c2e6f4ff94f3fe903e6301188de2f80801a8a978c8c09b3356c8dc