Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 00:28
Behavioral task
behavioral1
Sample
28e2a587439b687fbb213fa32d3ddc8edd92e295cd788d5e42005dac1159cf69.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28e2a587439b687fbb213fa32d3ddc8edd92e295cd788d5e42005dac1159cf69.xlsm
Resource
win10v2004-20241007-en
General
-
Target
28e2a587439b687fbb213fa32d3ddc8edd92e295cd788d5e42005dac1159cf69.xlsm
-
Size
32KB
-
MD5
96edfaa4cc37d7db9713cc2a68de53c8
-
SHA1
74b26a8ecae65ebf51cd182e3926e80dae428e1b
-
SHA256
28e2a587439b687fbb213fa32d3ddc8edd92e295cd788d5e42005dac1159cf69
-
SHA512
bbc7ebc84a4615b892c32163a4365296f7ab1a85ad26d6ae266b8cfe1f942f3db29493f1c141bc9d8ae23d1b8c87418336c9f219bd600ca449db079845f9a4e6
-
SSDEEP
768:gjf8WFhN7beEizXT2LxdFfPdkqstJVE6D:6EsTXrgXUndkq8E6D
Malware Config
Extracted
https://www.alejandrovillar.com/MSL/eKDWjpa4OHRxpysOTFe/
https://alejandrastamateas.com/web/ZxA3zHwsH3r/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1772 4812 regsvr32.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4812 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4812 EXCEL.EXE 4812 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4812 EXCEL.EXE 4812 EXCEL.EXE 4812 EXCEL.EXE 4812 EXCEL.EXE 4812 EXCEL.EXE 4812 EXCEL.EXE 4812 EXCEL.EXE 4812 EXCEL.EXE 4812 EXCEL.EXE 4812 EXCEL.EXE 4812 EXCEL.EXE 4812 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4812 wrote to memory of 1772 4812 EXCEL.EXE 93 PID 4812 wrote to memory of 1772 4812 EXCEL.EXE 93 PID 4812 wrote to memory of 1772 4812 EXCEL.EXE 93
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\28e2a587439b687fbb213fa32d3ddc8edd92e295cd788d5e42005dac1159cf69.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe -s ..\rfs.dll2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:1772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5d911d5cdb4d0380a4f7019447486b8c1
SHA1bdf48d963efdf4ac60331e1a2ceb290707b355d7
SHA256c8f17235fe205e1c136519a2f13e0ca1e0aa9b438efe4bbf08076a91a3bdf1a2
SHA512d43e0bd3056e2ffd8e561ca017535c93db3610288a28e4bdb5e2eacaff06225fa65c37d2d2d91f6e52f4ea3666497eb94accad0e1957059e4bcc9f5c3026f1e3
-
Filesize
202KB
MD55579d9981ff17d710d7b515a21ccaf31
SHA1c6c9ca2a98ecb18feeb5768c8284f9b9e86fc624
SHA2569865ad1fb0be0397e7d1d50042983e5620257a0e1642ef4c247ebd017312ee4a
SHA512d8b9aa9dfc576f1a3891a22c0ee244068bf5cb13650b0cf554b311de6f4833bfabfd4811fa999613f0d5d5ab2279a29143b317d31a8fb66d06611ba526251c37