Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 14:37
Static task
static1
Behavioral task
behavioral1
Sample
Account-1579644703.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Account-1579644703.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Original.dll
Resource
win7-20240903-en
General
-
Target
Account-1579644703.xls
-
Size
534KB
-
MD5
65a32f108d3c8a6cc8d7813b9892a952
-
SHA1
58f1ec7f794a717acfef21f2e1718a80e76d41c5
-
SHA256
6410cdf429baab84d583828623814316317029059eb46d8eab9a755bf234c612
-
SHA512
5a9e430794bee2f27dd376f98617a718702600d4ef1a069c16da895c0848c2d3b5372ebf9a7fe5dec5a32427503433bef52bd42349a0b65b995175d80054b84a
-
SSDEEP
12288:+z7yduBV3IpMiw44f6Mw4ntMe5AofygCuOqPLkH5:mMuBVfQMwe51HCuZPQ
Malware Config
Extracted
http://194.36.191.30/45666.6096484954.dat
http://23.106.122.40/45666.6096484954.dat
http://94.140.112.52/45666.6096484954.dat
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2056 2128 regsvr32.exe 29 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2236 2128 regsvr32.exe 29 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1800 2128 regsvr32.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2128 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2128 EXCEL.EXE 2128 EXCEL.EXE 2128 EXCEL.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2056 2128 EXCEL.EXE 31 PID 2128 wrote to memory of 2056 2128 EXCEL.EXE 31 PID 2128 wrote to memory of 2056 2128 EXCEL.EXE 31 PID 2128 wrote to memory of 2056 2128 EXCEL.EXE 31 PID 2128 wrote to memory of 2056 2128 EXCEL.EXE 31 PID 2128 wrote to memory of 2056 2128 EXCEL.EXE 31 PID 2128 wrote to memory of 2056 2128 EXCEL.EXE 31 PID 2128 wrote to memory of 2236 2128 EXCEL.EXE 32 PID 2128 wrote to memory of 2236 2128 EXCEL.EXE 32 PID 2128 wrote to memory of 2236 2128 EXCEL.EXE 32 PID 2128 wrote to memory of 2236 2128 EXCEL.EXE 32 PID 2128 wrote to memory of 2236 2128 EXCEL.EXE 32 PID 2128 wrote to memory of 2236 2128 EXCEL.EXE 32 PID 2128 wrote to memory of 2236 2128 EXCEL.EXE 32 PID 2128 wrote to memory of 1800 2128 EXCEL.EXE 33 PID 2128 wrote to memory of 1800 2128 EXCEL.EXE 33 PID 2128 wrote to memory of 1800 2128 EXCEL.EXE 33 PID 2128 wrote to memory of 1800 2128 EXCEL.EXE 33 PID 2128 wrote to memory of 1800 2128 EXCEL.EXE 33 PID 2128 wrote to memory of 1800 2128 EXCEL.EXE 33 PID 2128 wrote to memory of 1800 2128 EXCEL.EXE 33
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Account-1579644703.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 -silent ..\Celod.wac2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2056
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 -silent ..\Celod.wac12⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2236
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 -silent ..\Celod.wac22⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:1800
-