Analysis

  • max time kernel
    132s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2023 13:39

General

  • Target

    Complaint-922836043-02182021.xls

  • Size

    142KB

  • MD5

    1596dc98f96feae955a680a87024dd2d

  • SHA1

    c61de22e6d9ff5555016b8259ed0d0421893ca10

  • SHA256

    10d3ebe25e0249c65fe82295865e2730021876ed8d3bccc3e88242e452d4c2cb

  • SHA512

    d7d1ad7110b8c42922ae8e37c042230422a41cded1b90ff38d3f965fac3bd51b89b9cafcf8f04ab0228c9fac3290969496224bc176a44f23c9d0ef30e53867cc

  • SSDEEP

    3072:GcPiTQAVW/89BQnmlcGvgZ6Gr3J8YUOMRt/BI/s/C/i/R/7/3/UQ/OhP/2/a/1/V:GcPiTQAVW/89BQnmlcGvgZ7r3J8YUOMU

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://rzminc.com/xklyulyijvn/44951611444560200000.dat

xlm40.dropper

http://pathinanchilearthmovers.com/eznwcdhx/44951611444560200000.dat

xlm40.dropper

http://jugueterialatorre.com.ar/xjzpfwc/44951611444560200000.dat

xlm40.dropper

http://rzminc.com/fdzgprclatqo/44951611444560200000.dat

xlm40.dropper

http://biblicalisraeltours.com/otmchxmxeg/44951611444560200000.dat

Signatures

  • Process spawned unexpected child process 5 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Complaint-922836043-02182021.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\JDFR.hdfgr,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:3384
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\JDFR.hdfgr1,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:4472
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\JDFR.hdfgr2,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:4120
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\JDFR.hdfgr3,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:2744
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\JDFR.hdfgr4,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:3812

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1208-145-0x00007FF8314D0000-0x00007FF8314E0000-memory.dmp
    Filesize

    64KB

  • memory/1208-132-0x00007FF8314D0000-0x00007FF8314E0000-memory.dmp
    Filesize

    64KB

  • memory/1208-134-0x00007FF8314D0000-0x00007FF8314E0000-memory.dmp
    Filesize

    64KB

  • memory/1208-135-0x00007FF8314D0000-0x00007FF8314E0000-memory.dmp
    Filesize

    64KB

  • memory/1208-148-0x00007FF8314D0000-0x00007FF8314E0000-memory.dmp
    Filesize

    64KB

  • memory/1208-137-0x00007FF82F050000-0x00007FF82F060000-memory.dmp
    Filesize

    64KB

  • memory/1208-133-0x00007FF8314D0000-0x00007FF8314E0000-memory.dmp
    Filesize

    64KB

  • memory/1208-138-0x00007FF82F050000-0x00007FF82F060000-memory.dmp
    Filesize

    64KB

  • memory/1208-136-0x00007FF8314D0000-0x00007FF8314E0000-memory.dmp
    Filesize

    64KB

  • memory/1208-147-0x00007FF8314D0000-0x00007FF8314E0000-memory.dmp
    Filesize

    64KB

  • memory/1208-146-0x00007FF8314D0000-0x00007FF8314E0000-memory.dmp
    Filesize

    64KB

  • memory/2744-142-0x0000000000000000-mapping.dmp
  • memory/3384-139-0x0000000000000000-mapping.dmp
  • memory/3812-143-0x0000000000000000-mapping.dmp
  • memory/4120-141-0x0000000000000000-mapping.dmp
  • memory/4472-140-0x0000000000000000-mapping.dmp