Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 11:47

General

  • Target

    70038dc836f537dea842699af7d86efb201ec5198e46c536c981fd5eb8430e98.xlsm

  • Size

    350KB

  • MD5

    c1f47a14a958e2345ba929afa829c7e7

  • SHA1

    4e30b187cdd04d385854b5aa5b06999c76b84049

  • SHA256

    70038dc836f537dea842699af7d86efb201ec5198e46c536c981fd5eb8430e98

  • SHA512

    46c7fb99ca38685d9031a7420dc2a101a68e4f3c23a2ec0ea130044bcac11435007c9b3d5de58e41d6feb82e6410f855b28777cb97e33190ed76eb6ae88d13a7

  • SSDEEP

    6144:qS6QagdFCmzIDv5yZV7HywNWeB6vGGGol25gj//v/OsQVjuiOzqGVo2DKYm+YP:qIPCOIDv8fyLOgGGdF/n90yfGGG2DKJ3

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\70038dc836f537dea842699af7d86efb201ec5198e46c536c981fd5eb8430e98.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Users\Public\output.exe
      C:\Users\Public\output.exe
      2⤵
      • Executes dropped EXE
      PID:232

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Public\output.exe

          Filesize

          362KB

          MD5

          86926e56e4f6d854161066b5989a350e

          SHA1

          ca3209a05fb91ebd01989f1fb3afbba9b4e209ac

          SHA256

          f9ff42037f02b6a2eedf7a6fb7aedb4b5d1f0eb460069f4e923fb60b5ad0841a

          SHA512

          2c265ebe599130827dc1c47c4ac13e618eebc08cca99b7e83463fe85b000a4bca24b1b5e934d34c24d6ed024c6258ffd0e99f0f2ab636b69b3a32e60267fbad2

        • memory/3632-14-0x00007FF85A770000-0x00007FF85A965000-memory.dmp

          Filesize

          2.0MB

        • memory/3632-56-0x00007FF81A7F0000-0x00007FF81A800000-memory.dmp

          Filesize

          64KB

        • memory/3632-3-0x00007FF81A7F0000-0x00007FF81A800000-memory.dmp

          Filesize

          64KB

        • memory/3632-4-0x00007FF85A770000-0x00007FF85A965000-memory.dmp

          Filesize

          2.0MB

        • memory/3632-15-0x00007FF85A770000-0x00007FF85A965000-memory.dmp

          Filesize

          2.0MB

        • memory/3632-6-0x00007FF85A770000-0x00007FF85A965000-memory.dmp

          Filesize

          2.0MB

        • memory/3632-7-0x00007FF81A7F0000-0x00007FF81A800000-memory.dmp

          Filesize

          64KB

        • memory/3632-8-0x00007FF85A770000-0x00007FF85A965000-memory.dmp

          Filesize

          2.0MB

        • memory/3632-9-0x00007FF85A770000-0x00007FF85A965000-memory.dmp

          Filesize

          2.0MB

        • memory/3632-11-0x00007FF85A770000-0x00007FF85A965000-memory.dmp

          Filesize

          2.0MB

        • memory/3632-10-0x00007FF817E90000-0x00007FF817EA0000-memory.dmp

          Filesize

          64KB

        • memory/3632-12-0x00007FF85A770000-0x00007FF85A965000-memory.dmp

          Filesize

          2.0MB

        • memory/3632-1-0x00007FF81A7F0000-0x00007FF81A800000-memory.dmp

          Filesize

          64KB

        • memory/3632-13-0x00007FF817E90000-0x00007FF817EA0000-memory.dmp

          Filesize

          64KB

        • memory/3632-5-0x00007FF81A7F0000-0x00007FF81A800000-memory.dmp

          Filesize

          64KB

        • memory/3632-16-0x00007FF85A770000-0x00007FF85A965000-memory.dmp

          Filesize

          2.0MB

        • memory/3632-17-0x00007FF85A770000-0x00007FF85A965000-memory.dmp

          Filesize

          2.0MB

        • memory/3632-18-0x00007FF85A770000-0x00007FF85A965000-memory.dmp

          Filesize

          2.0MB

        • memory/3632-19-0x00007FF85A770000-0x00007FF85A965000-memory.dmp

          Filesize

          2.0MB

        • memory/3632-20-0x00007FF85A770000-0x00007FF85A965000-memory.dmp

          Filesize

          2.0MB

        • memory/3632-21-0x00007FF85A770000-0x00007FF85A965000-memory.dmp

          Filesize

          2.0MB

        • memory/3632-2-0x00007FF85A770000-0x00007FF85A965000-memory.dmp

          Filesize

          2.0MB

        • memory/3632-36-0x00007FF85A770000-0x00007FF85A965000-memory.dmp

          Filesize

          2.0MB

        • memory/3632-0-0x00007FF81A7F0000-0x00007FF81A800000-memory.dmp

          Filesize

          64KB

        • memory/3632-57-0x00007FF81A7F0000-0x00007FF81A800000-memory.dmp

          Filesize

          64KB

        • memory/3632-58-0x00007FF81A7F0000-0x00007FF81A800000-memory.dmp

          Filesize

          64KB

        • memory/3632-59-0x00007FF81A7F0000-0x00007FF81A800000-memory.dmp

          Filesize

          64KB

        • memory/3632-60-0x00007FF85A770000-0x00007FF85A965000-memory.dmp

          Filesize

          2.0MB