Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 00:20
Behavioral task
behavioral1
Sample
adb5f6c930dda46a88011caab1a3188ce3084aa0d5c4940e2218154d656b6865.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
adb5f6c930dda46a88011caab1a3188ce3084aa0d5c4940e2218154d656b6865.xlsm
Resource
win10v2004-20241007-en
General
-
Target
adb5f6c930dda46a88011caab1a3188ce3084aa0d5c4940e2218154d656b6865.xlsm
-
Size
95KB
-
MD5
9eea9a8014a4e3311490daac505ac5a0
-
SHA1
bcc3d34b9c88aae8488535443a4c2792a048a5dc
-
SHA256
adb5f6c930dda46a88011caab1a3188ce3084aa0d5c4940e2218154d656b6865
-
SHA512
15a401f7b95439dbfae8e3fb659be9e9fd5529a007e75a4f60f46123465a7fefcf0dc2bdd6e583e1accc90de215c47714890636f8d12fe40e53acaa8fa8cf7db
-
SSDEEP
1536:gQxfGWXG8v5MB5Dg8cVoioFh+fYFl69oXiZ5bcvJlqGiwIWx1BcVXzAyVFfw:g2318DsVhonV69o2bchgGaWBcpA+fw
Malware Config
Extracted
https://ashirvadgroup.com/wp-admin/LtoH5AWneDBZIV2D/
https://patriciamirapsicologa.com/wp-includes/fVVa9DXB/
https://forfreeiptv.com/wp-admin/s5Oxoskqv8/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2720 2056 regsvr32.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2056 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2056 EXCEL.EXE 2056 EXCEL.EXE 2056 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2720 2056 EXCEL.EXE 31 PID 2056 wrote to memory of 2720 2056 EXCEL.EXE 31 PID 2056 wrote to memory of 2720 2056 EXCEL.EXE 31 PID 2056 wrote to memory of 2720 2056 EXCEL.EXE 31 PID 2056 wrote to memory of 2720 2056 EXCEL.EXE 31 PID 2056 wrote to memory of 2720 2056 EXCEL.EXE 31 PID 2056 wrote to memory of 2720 2056 EXCEL.EXE 31
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\adb5f6c930dda46a88011caab1a3188ce3084aa0d5c4940e2218154d656b6865.xlsm1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe /s ..\dw1.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5734e778eddef44e810f128afe8c84c52
SHA1e6eff4d5d26170d845e079cbece103168f99a785
SHA2561a2b39971d63fd664bb513870cce81509478439fae165b7ceb47a4230c742743
SHA512ebbfeeb534ca236af2e401ee3a7f5beb618d6c05f4d4b09c6f12417074dd4f84a6d1fa7f64a1f73eef35988fd89f30d8836325c5627fde764d2117d17c759dec