Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 00:43
Behavioral task
behavioral1
Sample
19940a1e1820b4aa1e0bc8ae018bd31dc2d870fd9970ffbb3a25a25676c60936.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
19940a1e1820b4aa1e0bc8ae018bd31dc2d870fd9970ffbb3a25a25676c60936.xlsm
Resource
win10v2004-20241007-en
General
-
Target
19940a1e1820b4aa1e0bc8ae018bd31dc2d870fd9970ffbb3a25a25676c60936.xlsm
-
Size
37KB
-
MD5
281e4ecf6aa3fcbdad4755bbcdee69cd
-
SHA1
2f8ccfc79cb4ab0a40c3ba0a05419942626438c3
-
SHA256
19940a1e1820b4aa1e0bc8ae018bd31dc2d870fd9970ffbb3a25a25676c60936
-
SHA512
e8daf059c8cac6fdd694f333ee29a4c82bcb444af482a4ea7af9a27895b28cde9ddf721ba3b87d8575c6fffd0da6189fc3587485dc8adeac63eaa383c0d6e5dd
-
SSDEEP
768:0b/Mvd5dhTJxmxE7l0VGpevZCw4VmUxjfC30+kS4QyoX0VyY5G:0bmd5zmxE7W0XYk4pEVyV
Malware Config
Extracted
https://ordereasy.hk/error/8BZswf/
https://duocphamct.com/wp-content/JYT0KrYcoJrAj/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2528 1852 rundll32.exe 27 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exeEXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 1852 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid Process 1852 EXCEL.EXE 1852 EXCEL.EXE 1852 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
EXCEL.EXEdescription pid Process procid_target PID 1852 wrote to memory of 2528 1852 EXCEL.EXE 29 PID 1852 wrote to memory of 2528 1852 EXCEL.EXE 29 PID 1852 wrote to memory of 2528 1852 EXCEL.EXE 29 PID 1852 wrote to memory of 2528 1852 EXCEL.EXE 29 PID 1852 wrote to memory of 2528 1852 EXCEL.EXE 29 PID 1852 wrote to memory of 2528 1852 EXCEL.EXE 29 PID 1852 wrote to memory of 2528 1852 EXCEL.EXE 29
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\19940a1e1820b4aa1e0bc8ae018bd31dc2d870fd9970ffbb3a25a25676c60936.xlsm1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWow64\rundll32.exeC:\Windows\SysWow64\rundll32.exe ..\bestb.ocx,D"&"l"&"l"&"R"&"eg"&"i"&"s"&"t"&"erServer2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5d1017b57ecb3d2f64ea69706cb16a18e
SHA1534d1c24ee4c911f653e794ea0c1825ce6a9af05
SHA256411408565a0c82ec117736a0ba7e0fc408ff6b1e0cdf195ddb217038d26803f7
SHA5123d869e53345a3d9754ec7cda5231a61daa9a036d4ea57b8335c629668a86280e7f9c0ca3c7f8bb56c9e12b10ba2522973ab5a8475e3ea9d5752470627b4f195f