Analysis
-
max time kernel
133s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 20:50
Behavioral task
behavioral1
Sample
bf63b9fb17e0a41c5279cec6ab8c9d9dbb6fd7aaf6465e861cc005c1ea5aecbe.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
bf63b9fb17e0a41c5279cec6ab8c9d9dbb6fd7aaf6465e861cc005c1ea5aecbe.xlsm
Resource
win10v2004-20241007-en
General
-
Target
bf63b9fb17e0a41c5279cec6ab8c9d9dbb6fd7aaf6465e861cc005c1ea5aecbe.xlsm
-
Size
32KB
-
MD5
71e22e31c9e47ca22ea80518a81e5767
-
SHA1
b767ffe76201d052627c9a1f3d9f712f17783c53
-
SHA256
bf63b9fb17e0a41c5279cec6ab8c9d9dbb6fd7aaf6465e861cc005c1ea5aecbe
-
SHA512
e62df2f1875982f115cd49e681f5f555138e5db1eee911b1dd3c9846ad272f8fbc9ede72ebbc063d60f141f465173e46a91809b1b9ba5cd9cfe5bba331b06ff9
-
SSDEEP
768:cjf8WFhN7beEizXT2LxdFfPdkqstJVE6D:2EsTXrgXUndkq8E6D
Malware Config
Extracted
https://www.alejandrovillar.com/MSL/eKDWjpa4OHRxpysOTFe/
https://alejandrastamateas.com/web/ZxA3zHwsH3r/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3864 3148 regsvr32.exe EXCEL.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 3148 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid process 3148 EXCEL.EXE 3148 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
EXCEL.EXEdescription pid process target process PID 3148 wrote to memory of 3864 3148 EXCEL.EXE regsvr32.exe PID 3148 wrote to memory of 3864 3148 EXCEL.EXE regsvr32.exe PID 3148 wrote to memory of 3864 3148 EXCEL.EXE regsvr32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\bf63b9fb17e0a41c5279cec6ab8c9d9dbb6fd7aaf6465e861cc005c1ea5aecbe.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe -s ..\rfs.dll2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:3864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5f1e878542633b539d389325e871fcb53
SHA1e2f83cd0f1983cfc0fff272ab0161fbb265b7eba
SHA256dfadb784ba44b259625a841ace04c303eb30f972da0d5d2e228d2381f1160cf4
SHA512a8fed54706e0d1cf97eb730d82c560a24d00f57d9959f5b9330d27cae8679ff9d62fbfda9bfea6f834bbdf8a620317ccaa3542d7419cc131566eb51541133e61
-
Filesize
202KB
MD5539f9cf69b3477bbade872f9cb2c20da
SHA17739ad0149b311693d4d4e70020ad9f15dbf9c31
SHA25614c16bddc40f6d3afa927344d84c04117832fe52d562dc4c9e153abfe6410f01
SHA5124b80165fe14089298a826cd034a86039291a798f82984e8bd6966761937ea3595834ed4813140d9b8d8d36bce8be726e1bf14edae0c868738dcd79dde07bd8dd