Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 00:43
Behavioral task
behavioral1
Sample
19940a1e1820b4aa1e0bc8ae018bd31dc2d870fd9970ffbb3a25a25676c60936.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
19940a1e1820b4aa1e0bc8ae018bd31dc2d870fd9970ffbb3a25a25676c60936.xlsm
Resource
win10v2004-20241007-en
General
-
Target
19940a1e1820b4aa1e0bc8ae018bd31dc2d870fd9970ffbb3a25a25676c60936.xlsm
-
Size
37KB
-
MD5
281e4ecf6aa3fcbdad4755bbcdee69cd
-
SHA1
2f8ccfc79cb4ab0a40c3ba0a05419942626438c3
-
SHA256
19940a1e1820b4aa1e0bc8ae018bd31dc2d870fd9970ffbb3a25a25676c60936
-
SHA512
e8daf059c8cac6fdd694f333ee29a4c82bcb444af482a4ea7af9a27895b28cde9ddf721ba3b87d8575c6fffd0da6189fc3587485dc8adeac63eaa383c0d6e5dd
-
SSDEEP
768:0b/Mvd5dhTJxmxE7l0VGpevZCw4VmUxjfC30+kS4QyoX0VyY5G:0bmd5zmxE7W0XYk4pEVyV
Malware Config
Extracted
https://ordereasy.hk/error/8BZswf/
https://duocphamct.com/wp-content/JYT0KrYcoJrAj/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4048 4060 rundll32.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 4060 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid Process 4060 EXCEL.EXE 4060 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid Process 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
EXCEL.EXEdescription pid Process procid_target PID 4060 wrote to memory of 4048 4060 EXCEL.EXE 86 PID 4060 wrote to memory of 4048 4060 EXCEL.EXE 86 PID 4060 wrote to memory of 4048 4060 EXCEL.EXE 86
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\19940a1e1820b4aa1e0bc8ae018bd31dc2d870fd9970ffbb3a25a25676c60936.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe ..\bestb.ocx,D"&"l"&"l"&"R"&"eg"&"i"&"s"&"t"&"erServer2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:4048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD54dd943fe784a650108c7d6670a2797d8
SHA10f4f3a65be9b188f87cb5f460bf923f60118579e
SHA256d2449a97a3eacd2bf27b8a058e4902fa9cdef8603d6086ac4e98c0b157eefe6f
SHA512e4fc281213382083f6b5c67c63420a7b83912c245febde5e1e6ba9a9ab1bcc366efd5f1423d456c11a1aed68e13b24c390e7551664ffac0a3e544b769da1730f
-
Filesize
4KB
MD51a4fc9a4ad938a6cefb5bf1e5973d969
SHA1510bc731962479bdacbfc3ef98e34c4e4e8510a6
SHA2569448b78e8b7cbbdacea7a67be1eb85759762a3be01ed4d1538408d4c09dd410d
SHA5121585fb95c1c3375a0ba447df0172984d14ab2566be1c64cd3a877328bf34c4f4ced9885c4b97099d5ece96d8807f3c1e10ade70e6165165fac0551ecca584f6e