Analysis

  • max time kernel
    128s
  • max time network
    131s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/11/2022, 02:49

General

  • Target

    f31008d5a84603b38b18fd2d79d974aa231bde38737e12b85918cb90ade07f98.xls

  • Size

    217KB

  • MD5

    f6dd0765fb84ca37e619e6117bfd0e72

  • SHA1

    a3c64daee4de3f52c12ace734be93a75f6b170e0

  • SHA256

    f31008d5a84603b38b18fd2d79d974aa231bde38737e12b85918cb90ade07f98

  • SHA512

    378ce2bc74a2fc75fedb4f908bab5080704533751194215c4764d80d87411e8aee03f983c7cd557c90e07d48fd54098fe7793007c55422a2c6174f0ed37f3bd7

  • SSDEEP

    6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQmc:JbGUMVWlbc

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://aquariorecords.com.br/wp-content/A8G3ownNApEj1L4hF/

xlm40.dropper

http://ftp.pricoat.com.mx/Fichas/3ybJLLXu5zqqn8Sx/

xlm40.dropper

http://armannahalpersian.ir/3H5qqUOB/

xlm40.dropper

http://alagi.ge/application/irnz5Rs8qWvQrf/

Signatures

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f31008d5a84603b38b18fd2d79d974aa231bde38737e12b85918cb90ade07f98.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3932
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx
      2⤵
      • Process spawned unexpected child process
      PID:5048
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx
      2⤵
      • Process spawned unexpected child process
      PID:4984
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx
      2⤵
      • Process spawned unexpected child process
      PID:5088
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx
      2⤵
      • Process spawned unexpected child process
      PID:492

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3932-119-0x00007FFBDF500000-0x00007FFBDF510000-memory.dmp

          Filesize

          64KB

        • memory/3932-118-0x00007FFBDF500000-0x00007FFBDF510000-memory.dmp

          Filesize

          64KB

        • memory/3932-116-0x00007FFBDF500000-0x00007FFBDF510000-memory.dmp

          Filesize

          64KB

        • memory/3932-128-0x00007FFBDC7E0000-0x00007FFBDC7F0000-memory.dmp

          Filesize

          64KB

        • memory/3932-129-0x00007FFBDC7E0000-0x00007FFBDC7F0000-memory.dmp

          Filesize

          64KB

        • memory/3932-117-0x00007FFBDF500000-0x00007FFBDF510000-memory.dmp

          Filesize

          64KB

        • memory/3932-308-0x00007FFBDF500000-0x00007FFBDF510000-memory.dmp

          Filesize

          64KB

        • memory/3932-309-0x00007FFBDF500000-0x00007FFBDF510000-memory.dmp

          Filesize

          64KB

        • memory/3932-310-0x00007FFBDF500000-0x00007FFBDF510000-memory.dmp

          Filesize

          64KB

        • memory/3932-311-0x00007FFBDF500000-0x00007FFBDF510000-memory.dmp

          Filesize

          64KB