Analysis

  • max time kernel
    129s
  • max time network
    129s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    18-01-2022 12:48

General

  • Target

    e9c18b8a871de1f84aa55e88b7962bfb978211ba79ca104831b25cba11312a93.xlsm

  • Size

    99KB

  • MD5

    1920737efea720db8e87e065eafe25b6

  • SHA1

    cd707519d84bb0737a4ef806cae506f642fc73d0

  • SHA256

    e9c18b8a871de1f84aa55e88b7962bfb978211ba79ca104831b25cba11312a93

  • SHA512

    21a9e2a13f6d1b28633b1b59803d203e65131f0ad839a036d268f542afbf8ecc2efa7061795ece02aee62e096f1432505e9e114168026e735ee9a7a33c8067a0

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://avionxpress.com/lp/T9b1Bga4FdDfP5HI/

xlm40.dropper

http://news.tapchivietkieu.info/wordpress/CJzFM/

xlm40.dropper

http://monosun.net/wp-includes/JcDnYBSKpyfU/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e9c18b8a871de1f84aa55e88b7962bfb978211ba79ca104831b25cba11312a93.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3608

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3608-115-0x00007FF836310000-0x00007FF836320000-memory.dmp
    Filesize

    64KB

  • memory/3608-116-0x00007FF836310000-0x00007FF836320000-memory.dmp
    Filesize

    64KB

  • memory/3608-117-0x00007FF836310000-0x00007FF836320000-memory.dmp
    Filesize

    64KB

  • memory/3608-118-0x00007FF836310000-0x00007FF836320000-memory.dmp
    Filesize

    64KB

  • memory/3608-123-0x00007FF836310000-0x00007FF836320000-memory.dmp
    Filesize

    64KB

  • memory/3608-128-0x00007FF832AF0000-0x00007FF832B00000-memory.dmp
    Filesize

    64KB

  • memory/3608-129-0x00007FF832AF0000-0x00007FF832B00000-memory.dmp
    Filesize

    64KB

  • memory/3608-276-0x00007FF836310000-0x00007FF836320000-memory.dmp
    Filesize

    64KB

  • memory/3608-277-0x00007FF836310000-0x00007FF836320000-memory.dmp
    Filesize

    64KB

  • memory/3608-278-0x00007FF836310000-0x00007FF836320000-memory.dmp
    Filesize

    64KB

  • memory/3608-279-0x00007FF836310000-0x00007FF836320000-memory.dmp
    Filesize

    64KB