Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/01/2023, 03:26

General

  • Target

    bd310a2a64e17c99fb956a72c31807a7a6120cb0719c203a3dab22ae47bdd8a2.xls

  • Size

    217KB

  • MD5

    bc3affabc827c9ebbe52dc136760e056

  • SHA1

    132b7a932aa3cc66beefa39d282257125a08f17c

  • SHA256

    bd310a2a64e17c99fb956a72c31807a7a6120cb0719c203a3dab22ae47bdd8a2

  • SHA512

    e5b77000f5d1797e8f58ca550d7c0a6adbb90dc814b10334e35f5c129a795aa8fa284f0666129d86ba973e18184bacafc600ed6609b30dff6a45078718ff3c8b

  • SSDEEP

    6144:SKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQm1:QbGUMVWlb1

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://aquariorecords.com.br/wp-content/A8G3ownNApEj1L4hF/

xlm40.dropper

http://ftp.pricoat.com.mx/Fichas/3ybJLLXu5zqqn8Sx/

xlm40.dropper

http://armannahalpersian.ir/3H5qqUOB/

xlm40.dropper

http://alagi.ge/application/irnz5Rs8qWvQrf/

Signatures

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\bd310a2a64e17c99fb956a72c31807a7a6120cb0719c203a3dab22ae47bdd8a2.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx
      2⤵
      • Process spawned unexpected child process
      PID:692
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx
      2⤵
      • Process spawned unexpected child process
      PID:1700
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx
      2⤵
      • Process spawned unexpected child process
      PID:964
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx
      2⤵
      • Process spawned unexpected child process
      PID:1324

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\oxnv3.ooccxx

          Filesize

          7KB

          MD5

          a4ca539beeb3ea425b4b67081a504f8f

          SHA1

          5e7d63eebe91562a90ad2e6a90684e0d9ec24205

          SHA256

          1510d5c9b96e88c8af6c81f3d921e62e5dceb83ba66e289def9fb86b6f742add

          SHA512

          251e311db54b46141744a04780b9f9f159c4dbe0e1483dd1e24873d1f165ed275c043f6af5c5f5c7fe05ea52527181166b666885a68c3190dab2b11e55b39699

        • C:\Users\Admin\oxnv4.ooccxx

          Filesize

          20KB

          MD5

          799b765e359759f23ad13a1a256a5f37

          SHA1

          032117694429b62e57a190bdcb9da5668adf7021

          SHA256

          c1afa658ee93404718cc76be40326aa7efe6fd727d4a8612182697f44e71d715

          SHA512

          8cb2477ff38f321eaf414b753914fbcaceff1770ba5a508fdff07bce7f28002e2e5f04be9d2757f7dd2abb806d12b14ed5f1e88111401855b7ffbd0d706e6ecc

        • memory/1996-54-0x000000002FAC1000-0x000000002FAC4000-memory.dmp

          Filesize

          12KB

        • memory/1996-55-0x0000000071391000-0x0000000071393000-memory.dmp

          Filesize

          8KB

        • memory/1996-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1996-57-0x000000007237D000-0x0000000072388000-memory.dmp

          Filesize

          44KB

        • memory/1996-58-0x00000000753D1000-0x00000000753D3000-memory.dmp

          Filesize

          8KB

        • memory/1996-69-0x000000007237D000-0x0000000072388000-memory.dmp

          Filesize

          44KB