Analysis

  • max time kernel
    154s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 07:05

General

  • Target

    2caf623a3473d8bc40514bb9608df936.exe

  • Size

    306KB

  • MD5

    2caf623a3473d8bc40514bb9608df936

  • SHA1

    1a8f69b217f5a64b96e3f64db1d133407b4dd39f

  • SHA256

    ffac3ab646de0d62b7e769c4b5f2eae38c673f2c028895a7da744ddda0611078

  • SHA512

    c0882b18b65f7b069cbce58ffa4f97af56fd885c3b8b910f6459243273fba9923573a878edc6e4b40fb0a10d9c391617517df3040ca5a5df781b71c86bf50889

  • SSDEEP

    6144:8vRMaZOTDio+vL/h2jzlMlI39izNPQt8IRVCACcab5O0+L81mxOH5S:+MIOTMTh2NMlI39ixPQ/RVNab5O0pmxr

Score
8/10

Malware Config

Signatures

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2caf623a3473d8bc40514bb9608df936.exe
    "C:\Users\Admin\AppData\Local\Temp\2caf623a3473d8bc40514bb9608df936.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Users\Admin\AppData\Local\Temp\XLtoEXE240102121001_tmp\2caf623a3473d8bc40514bb9608df936.exe
      "C:\Users\Admin\AppData\Local\Temp\XLtoEXE240102121001_tmp\2caf623a3473d8bc40514bb9608df936.exe" cmd/CallFromZipBase /C:\Users\Admin\AppData\Local\Temp\2caf623a3473d8bc40514bb9608df936.exe /65536 /108928 /220645 /313675 /C:\Users\Admin\AppData\Local\Temp\XLtoEXE240102121001_tmp\ /0 /8992 /0 /
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4164
      • C:\Users\Admin\AppData\Local\Temp\2caf623a3473d8bc40514bb9608df936.exe
        "C:\Users\Admin\AppData\Local\Temp\2caf623a3473d8bc40514bb9608df936.exe" cmd/del /C:\Users\Admin\AppData\Local\Temp\XLtoEXE240102121001_tmp\ /0 /0 /
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:4232
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:5084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\XLtoEXE240102121001_tmp\2caf623a3473d8bc40514bb9608df936.exe

    Filesize

    312KB

    MD5

    0503017284ff2b935a4ee3d7ba8d53eb

    SHA1

    260f5195077dee4fd243d6e08b8b42c9fa4ffe31

    SHA256

    df6f06bbdc39a94d9cfdbbb12d4638c1a9d2d1d51d724039dfdcb2299b8c1000

    SHA512

    a0ad76a6a517f3dbbe72f715a3f4b831536348785cb4b33644f2daf1088b26612971764f5da01f47cd714f032d991bc33e2e36239225349f1a5dbb14333da948

  • C:\Users\Admin\AppData\Local\Temp\XLtoEXE240102121001_tmp\XLtoEXEtmp\5 Star Personal Budget Workbook.xlsm

    Filesize

    107KB

    MD5

    e9d8de5a0c20ca5390a3837c579211e1

    SHA1

    7cbc609b5c458dabd61e2ad250b2c5a119a00f99

    SHA256

    7365ce8c5b62bdd158cca7a0a8bf84e36a55d01af26483422f55f48ccd45a52f

    SHA512

    8453c86bb48271796253ce9f2997ad040b10dfbcb10ab1856a4d0d22b6edb9cee5602ba41c534488350437f555cd47d1e728980aa57a091239b29ad1c83bac39

  • C:\Users\Admin\AppData\Local\Temp\XLtoEXE240102121001_tmp\zlib123.dll

    Filesize

    72KB

    MD5

    4efaa53c545f4ffb1ee0ed1709c15ea7

    SHA1

    076b2d31e24fe8cfb56f9c292fd6ca1402be79b2

    SHA256

    21582b3a68e8753322a1b1c7e550ae7fd305de4935de68fbde9f87570f484d00

    SHA512

    7fa8c0954729ea14fdceb788393c3de6e139fc4c480b84183863f62afacec2d6bbc0993b601a4a74c87bc89338b627dc37a18be309d090bae880ea10ab9d7314

  • memory/2744-7-0x0000000002A50000-0x0000000002A77000-memory.dmp

    Filesize

    156KB

  • memory/4164-24-0x0000000002940000-0x0000000002967000-memory.dmp

    Filesize

    156KB

  • memory/5084-29-0x00007FFAA7F30000-0x00007FFAA7F40000-memory.dmp

    Filesize

    64KB

  • memory/5084-38-0x00007FFAA5C60000-0x00007FFAA5C70000-memory.dmp

    Filesize

    64KB

  • memory/5084-31-0x00007FFAE7EB0000-0x00007FFAE80A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5084-32-0x00007FFAE7EB0000-0x00007FFAE80A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5084-33-0x00007FFAA7F30000-0x00007FFAA7F40000-memory.dmp

    Filesize

    64KB

  • memory/5084-35-0x00007FFAE7EB0000-0x00007FFAE80A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5084-34-0x00007FFAA7F30000-0x00007FFAA7F40000-memory.dmp

    Filesize

    64KB

  • memory/5084-36-0x00007FFAE7EB0000-0x00007FFAE80A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5084-37-0x00007FFAA5C60000-0x00007FFAA5C70000-memory.dmp

    Filesize

    64KB

  • memory/5084-30-0x00007FFAA7F30000-0x00007FFAA7F40000-memory.dmp

    Filesize

    64KB

  • memory/5084-28-0x00007FFAA7F30000-0x00007FFAA7F40000-memory.dmp

    Filesize

    64KB

  • memory/5084-57-0x00007FFAA7F30000-0x00007FFAA7F40000-memory.dmp

    Filesize

    64KB

  • memory/5084-58-0x00007FFAA7F30000-0x00007FFAA7F40000-memory.dmp

    Filesize

    64KB

  • memory/5084-59-0x00007FFAA7F30000-0x00007FFAA7F40000-memory.dmp

    Filesize

    64KB

  • memory/5084-60-0x00007FFAA7F30000-0x00007FFAA7F40000-memory.dmp

    Filesize

    64KB

  • memory/5084-61-0x00007FFAE7EB0000-0x00007FFAE80A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5084-62-0x00007FFAE7EB0000-0x00007FFAE80A5000-memory.dmp

    Filesize

    2.0MB