Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 20:41
Behavioral task
behavioral1
Sample
ef63377af7c07bd4020d72c6f014e22f2df22cca0c507c7beedd79d0612ae106.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ef63377af7c07bd4020d72c6f014e22f2df22cca0c507c7beedd79d0612ae106.xls
Resource
win10v2004-20241007-en
General
-
Target
ef63377af7c07bd4020d72c6f014e22f2df22cca0c507c7beedd79d0612ae106.xls
-
Size
47KB
-
MD5
3311e632600d66faf08f6142f0433c19
-
SHA1
c0712f58dc4df3025ad65d484273ee2eddf16478
-
SHA256
ef63377af7c07bd4020d72c6f014e22f2df22cca0c507c7beedd79d0612ae106
-
SHA512
fc1216a0d7feae1635f221992500d06169ffe5211b452c09d29e8745076516a8e937ff7aca1ec3675c9812dc9410dd74edfcd123207113ae789bda653ac0953d
-
SSDEEP
768:yDM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JOiX6DGwUk7qHDSEuRZjiBp5X:y62tfQXi8vgLZkTOHkQT51Vp6AwPe8gl
Malware Config
Extracted
https://eleselektromekanik.com/69Iq5Pwbd0/s/
https://demo.icn.com.np/stories/Qk/
http://demo34.ckg.hk/service/Atk7RQfUV673M/
https://bitmovil.mx/css/TrgyPiTXy3/
http://dupot.cz/tvhost/DUnMUvwZOhQs/
http://focanainternet.com.br/erros/DepAK3p1Y/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2840 3220 regsvr32.exe EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 3220 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid process 3220 EXCEL.EXE 3220 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
EXCEL.EXEdescription pid process target process PID 3220 wrote to memory of 2840 3220 EXCEL.EXE regsvr32.exe PID 3220 wrote to memory of 2840 3220 EXCEL.EXE regsvr32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ef63377af7c07bd4020d72c6f014e22f2df22cca0c507c7beedd79d0612ae106.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe ..\wnrul.ocx2⤵
- Process spawned unexpected child process
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5a8014241c516afcb852e67c39906339d
SHA10e4b9ff9ae4c9488e51fe1b75d40833b2b2b1d33
SHA2563323a5acb34eef3299336d984e4f3b8c86a43c5d1afd8df6078954f4d50c4fac
SHA51250c1d0131bc1941575a9f4bedec827ab45b421b9041ece3e118dc5d3df62064e0b431570ef2885a9ffa0bc7c5f2eda52b896bb393286ff802c9fb14496908148
-
Filesize
3KB
MD5cc666088a917dd7f5da8b6689069aec0
SHA1f688de634ccd20939a522391abb5049483e726bd
SHA256332d102987273318f13e7fc89a043613c6dd5dd7eb7d21033a2ab73dd438a405
SHA51277a15aebeb10d355e3723fdebd2ea59a09a60d54f09ab9a6f06c52dbfa3bea0965ff49b7a1c2e6f4ff94f3fe903e6301188de2f80801a8a978c8c09b3356c8dc