Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 14:37
Static task
static1
Behavioral task
behavioral1
Sample
Account-1579644703.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Account-1579644703.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Original.dll
Resource
win7-20240903-en
General
-
Target
Account-1579644703.xls
-
Size
534KB
-
MD5
65a32f108d3c8a6cc8d7813b9892a952
-
SHA1
58f1ec7f794a717acfef21f2e1718a80e76d41c5
-
SHA256
6410cdf429baab84d583828623814316317029059eb46d8eab9a755bf234c612
-
SHA512
5a9e430794bee2f27dd376f98617a718702600d4ef1a069c16da895c0848c2d3b5372ebf9a7fe5dec5a32427503433bef52bd42349a0b65b995175d80054b84a
-
SSDEEP
12288:+z7yduBV3IpMiw44f6Mw4ntMe5AofygCuOqPLkH5:mMuBVfQMwe51HCuZPQ
Malware Config
Extracted
http://194.36.191.30/45666.6096425926.dat
http://23.106.122.40/45666.6096425926.dat
http://94.140.112.52/45666.6096425926.dat
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4340 3172 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4888 3172 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3524 3172 regsvr32.exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3172 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3172 EXCEL.EXE 3172 EXCEL.EXE 3172 EXCEL.EXE 3172 EXCEL.EXE 3172 EXCEL.EXE 3172 EXCEL.EXE 3172 EXCEL.EXE 3172 EXCEL.EXE 3172 EXCEL.EXE 3172 EXCEL.EXE 3172 EXCEL.EXE 3172 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3172 wrote to memory of 4340 3172 EXCEL.EXE 94 PID 3172 wrote to memory of 4340 3172 EXCEL.EXE 94 PID 3172 wrote to memory of 4888 3172 EXCEL.EXE 95 PID 3172 wrote to memory of 4888 3172 EXCEL.EXE 95 PID 3172 wrote to memory of 3524 3172 EXCEL.EXE 96 PID 3172 wrote to memory of 3524 3172 EXCEL.EXE 96
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Account-1579644703.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 -silent ..\Celod.wac2⤵
- Process spawned unexpected child process
PID:4340
-
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 -silent ..\Celod.wac12⤵
- Process spawned unexpected child process
PID:4888
-
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 -silent ..\Celod.wac22⤵
- Process spawned unexpected child process
PID:3524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5ad0f900981c83f875bf0e0d87a6e08c4
SHA15e26bf0e78eb745f0a6dab82bfc47f7d210bea92
SHA25604ff5356d48d44ab9b971506cddfc18268b053e31160aa3a04233b0e17e58be6
SHA512062b2842ce4004b764bd0d642958172159a3e25269efa76ece2e33a2cebaea3933badb8bbb906f1ba2848024e973fa478af394bfc2f8179a52ffcb51360f5184