Analysis

  • max time kernel
    128s
  • max time network
    128s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    18-01-2022 12:44

General

  • Target

    b454720ed1a861971e5c7d34338fdeb2507205fc189c95cd786376ba40732cf8.xlsm

  • Size

    99KB

  • MD5

    69c8122d5e2239bc39cd32133fdaf2b1

  • SHA1

    7e40cab4e882a32f9842182e167297630707893d

  • SHA256

    b454720ed1a861971e5c7d34338fdeb2507205fc189c95cd786376ba40732cf8

  • SHA512

    75a237ef3efc22e7ea855b2a7190ae8f1ab7329fe69162c9b4a3ce9f9f0d7a4cb262785d50538de679d9dffe27ecdfa75dafa0126e7d1e7b35a168d7e16e9945

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://shop.lambolero.com/iiwkjgp/eu7rH6/

xlm40.dropper

http://api.task-lite.com/-/EYe3DEfcw7LCaU6T/

xlm40.dropper

https://celhocortofilmfestival.stream/css/oQSBr44obE/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b454720ed1a861971e5c7d34338fdeb2507205fc189c95cd786376ba40732cf8.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3124

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3124-114-0x00007FFD72FE0000-0x00007FFD72FF0000-memory.dmp
    Filesize

    64KB

  • memory/3124-115-0x00007FFD72FE0000-0x00007FFD72FF0000-memory.dmp
    Filesize

    64KB

  • memory/3124-116-0x00007FFD72FE0000-0x00007FFD72FF0000-memory.dmp
    Filesize

    64KB

  • memory/3124-117-0x00007FFD72FE0000-0x00007FFD72FF0000-memory.dmp
    Filesize

    64KB

  • memory/3124-118-0x00007FFD72FE0000-0x00007FFD72FF0000-memory.dmp
    Filesize

    64KB

  • memory/3124-127-0x00007FFD6F570000-0x00007FFD6F580000-memory.dmp
    Filesize

    64KB

  • memory/3124-128-0x00007FFD6F570000-0x00007FFD6F580000-memory.dmp
    Filesize

    64KB

  • memory/3124-293-0x00007FFD72FE0000-0x00007FFD72FF0000-memory.dmp
    Filesize

    64KB

  • memory/3124-294-0x00007FFD72FE0000-0x00007FFD72FF0000-memory.dmp
    Filesize

    64KB

  • memory/3124-295-0x00007FFD72FE0000-0x00007FFD72FF0000-memory.dmp
    Filesize

    64KB

  • memory/3124-296-0x00007FFD72FE0000-0x00007FFD72FF0000-memory.dmp
    Filesize

    64KB