Analysis

  • max time kernel
    124s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • submitted
    21-05-2022 18:07

General

  • Target

    5234d8010e2d4159f3e7f526bf2e0fff77aa9e8644d62e6c07680b173ea426e7.xls

  • Size

    78KB

  • MD5

    3a373bc4aa8ef7f65fdfa455173b5687

  • SHA1

    3b179f1f1d0d2bcc8fa8074f5c8e36fbd3436014

  • SHA256

    5234d8010e2d4159f3e7f526bf2e0fff77aa9e8644d62e6c07680b173ea426e7

  • SHA512

    8e9a7acd52231fab6807d08ed125a99faceca65935050c1c53f64c19860ff30036da06b3da24b668190e4351aabebaa847fff7ea2e7663589470eb344d1901f4

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://hostal-alfonso12.com/clases/SKtPvv/

xlm40.dropper

http://howesitgoing.com/images/HyaDnlbl6K7tbh2Lugys/

xlm40.dropper

https://www.jdserralheria.com.br/cgi-bin/KFG6/

xlm40.dropper

http://inteirado.com.br/fonts/7dJCVvuE5x3YrGQs2oJz/

xlm40.dropper

http://iciee.untirta.ac.id/test/GccRw/

xlm40.dropper

https://ideoso.com.tw/cgi-bin/zLrnBd2Eg1N3UVy5yL/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\5234d8010e2d4159f3e7f526bf2e0fff77aa9e8644d62e6c07680b173ea426e7.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1956

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1956-116-0x00007FFDC1640000-0x00007FFDC1650000-memory.dmp
    Filesize

    64KB

  • memory/1956-117-0x00007FFDC1640000-0x00007FFDC1650000-memory.dmp
    Filesize

    64KB

  • memory/1956-118-0x00007FFDC1640000-0x00007FFDC1650000-memory.dmp
    Filesize

    64KB

  • memory/1956-119-0x00007FFDC1640000-0x00007FFDC1650000-memory.dmp
    Filesize

    64KB

  • memory/1956-128-0x00007FFDBDB80000-0x00007FFDBDB90000-memory.dmp
    Filesize

    64KB

  • memory/1956-129-0x00007FFDBDB80000-0x00007FFDBDB90000-memory.dmp
    Filesize

    64KB

  • memory/1956-304-0x00007FFDC1640000-0x00007FFDC1650000-memory.dmp
    Filesize

    64KB

  • memory/1956-305-0x00007FFDC1640000-0x00007FFDC1650000-memory.dmp
    Filesize

    64KB

  • memory/1956-306-0x00007FFDC1640000-0x00007FFDC1650000-memory.dmp
    Filesize

    64KB

  • memory/1956-307-0x00007FFDC1640000-0x00007FFDC1650000-memory.dmp
    Filesize

    64KB