Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 00:21
Behavioral task
behavioral1
Sample
a230ad5ca2567b174c97fc9d38e23cae4e243a2df847daa1d2290024c480cdc8.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a230ad5ca2567b174c97fc9d38e23cae4e243a2df847daa1d2290024c480cdc8.xls
Resource
win10v2004-20241007-en
General
-
Target
a230ad5ca2567b174c97fc9d38e23cae4e243a2df847daa1d2290024c480cdc8.xls
-
Size
95KB
-
MD5
f2d0109c32bca89c212d650d4760bf17
-
SHA1
7c636757a786500b1c04695980eb81f374c34d16
-
SHA256
a230ad5ca2567b174c97fc9d38e23cae4e243a2df847daa1d2290024c480cdc8
-
SHA512
35070dc3015dddd92c420c77735946a57535c303054698686dd92193e200d22e9bcc0aa5d4a12aa561d2dce99e91096379996239e002144e95674a04cb98a5e5
-
SSDEEP
1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgYHuS4hcTO97v7UYdEJmFB2:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgk
Malware Config
Extracted
https://educacionsanvicentefundacion.com/iplookup/wYEInbaN/
https://www.4monkeys.com/wp-admin/dNAuBEKo/
http://haircutbar.com/cgi-bin/dNfEA5F/
http://gedebey-tvradio.info/wp-includes/T0J9THbd5f2/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2740 2368 regsvr32.exe EXCEL.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2844 2368 regsvr32.exe EXCEL.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2732 2368 regsvr32.exe EXCEL.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2064 2368 regsvr32.exe EXCEL.EXE -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exeEXCEL.EXEregsvr32.exeregsvr32.exeregsvr32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2368 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 2368 EXCEL.EXE 2368 EXCEL.EXE 2368 EXCEL.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
EXCEL.EXEdescription pid process target process PID 2368 wrote to memory of 2740 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2740 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2740 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2740 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2740 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2740 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2740 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2844 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2844 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2844 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2844 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2844 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2844 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2844 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2732 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2732 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2732 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2732 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2732 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2732 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2732 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2064 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2064 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2064 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2064 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2064 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2064 2368 EXCEL.EXE regsvr32.exe PID 2368 wrote to memory of 2064 2368 EXCEL.EXE regsvr32.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\a230ad5ca2567b174c97fc9d38e23cae4e243a2df847daa1d2290024c480cdc8.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\uoya1.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\uoya2.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\uoya3.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\uoya4.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2064
-