Analysis
-
max time kernel
134s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 20:56
Behavioral task
behavioral1
Sample
a569a9652c612685763907aa760d54f8336ff157283eb52dd9548fd1717a6121.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a569a9652c612685763907aa760d54f8336ff157283eb52dd9548fd1717a6121.xls
Resource
win10v2004-20241007-en
General
-
Target
a569a9652c612685763907aa760d54f8336ff157283eb52dd9548fd1717a6121.xls
-
Size
40KB
-
MD5
3fb588eaecbd241ec02ed5f061176570
-
SHA1
e196ba97365f2a3677f2fe6ddf65cfc8ab179aa8
-
SHA256
a569a9652c612685763907aa760d54f8336ff157283eb52dd9548fd1717a6121
-
SHA512
6168e468fc551da2fa208a2a70d39a70be356be251cbf7e821c0566f8fb7a92ac951df63237ca30d849c02aa25f92d8785a147dce08cdb9bf05dd2e938dd66f3
-
SSDEEP
768:pkZKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgACCBn9kC+xbwcZfqG9tMvcVi1l8:p+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dE
Malware Config
Extracted
http://easiercommunications.com/wp-content/w/
http://dulichdichvu.net/libraries/QhtrjCZymLp5EbqOdpKk/
https://www.whow.fr/wp-includes/H54Fgj0tG/
http://genccagdas.com.tr/assets/TTHOm833iNn3BxT/
http://heaventechnologies.com.pk/apitest/xdeAU0rx26LT9I/
http://goonboy.com/goonie/bSFz7Av/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4896 4948 regsvr32.exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4948 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4948 EXCEL.EXE 4948 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4948 wrote to memory of 4896 4948 EXCEL.EXE 90 PID 4948 wrote to memory of 4896 4948 EXCEL.EXE 90
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a569a9652c612685763907aa760d54f8336ff157283eb52dd9548fd1717a6121.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe ..\wurod.ocx2⤵
- Process spawned unexpected child process
PID:4896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5b56b3b78f0dc6f9ae32f5e2c097354e8
SHA1bec1ebe87db2eb9ac11505624c2fc50945366782
SHA256811d350dc3d4963716c8cd2a02ebc6660a474154a33fc29f1f450e79ef2208ff
SHA5126446bf19c4616e1aa2387917b10baf3d564c6fd752dae518abfdac7c0073ae54ed11a67e30f786065dd89db7b71424fdcae849cd6ff25144950c566151e313a8
-
Filesize
7KB
MD5797e94343f2bd6d4cdea65cc8b1fdf00
SHA1ad3aa4de0584f6e92e2cf571bc02eb4a8138ba66
SHA256168c6189f01359d4d46c94a1681c214403f530d0c6d643154bc530b5e947407e
SHA51292302d8b4e0c1ec95efafaf33c0e3248a4a071284691cf9b3d96d6f380ed668798cfda620a7389a76c9f1df07c25dd53d32cc26623f27f176f03f8b4eb8498d3