Analysis

  • max time kernel
    46s
  • max time network
    37s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2024, 21:35

General

  • Target

    f21f29b4f71c3d5488ee1fd5c0e029cea9a54a7fe5bf80e57dc61a75034be097.xls

  • Size

    95KB

  • MD5

    c754f9367be5721d7bc3a0a90e12376e

  • SHA1

    01f87c9d70cd034aa627e39e76d24632710ecbff

  • SHA256

    f21f29b4f71c3d5488ee1fd5c0e029cea9a54a7fe5bf80e57dc61a75034be097

  • SHA512

    2151fe74fce89a6e77a99920ef3e0363ec092a1c183459c75ac620dc865c8d8cbbb3797829912d4c067ef0e1c91a47349e1fd0d9fa5fac60d65f7e19fd057348

  • SSDEEP

    1536:ySto05SVUsNwtzLT/KMuuAe0+OcfpUZGsMkvV:/t/SmsCpH/KZuAZGsMo

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://dougveeder.com/cgi-bin/xJ91ZttGRioQ7IUL/

xlm40.dropper

https://e-fistik.com/ajax/PnA23/

xlm40.dropper

http://dsinformaticos.com/_private/f36Yl/

xlm40.dropper

http://dstny.net/cgi-bin/POqJKcxiIzRb/

xlm40.dropper

http://fakecity.net/cache/XtIzhyLEoLI7/

xlm40.dropper

http://fayeschmidt.com/cgi-bin/Q8pj6/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f21f29b4f71c3d5488ee1fd5c0e029cea9a54a7fe5bf80e57dc61a75034be097.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    2e3d34c9d90484f24d2965fd6ba3d5c1

    SHA1

    465ea56f1cb16819aaca21c57d5927037e09f356

    SHA256

    de8eadde9e62f9002d40e8a7f28b620133d1eee8c6f1b25f40b056d2cde69c67

    SHA512

    affacd99acbb6658d07b5461f6ca7405d716a6e660b31785bd264fc52f0a397e8596a2810e1a51a3868c8b07d19d01d85bb55fc79d41153dba252a35b84e64b9

  • memory/4652-7-0x00007FFD9C9D0000-0x00007FFD9C9E0000-memory.dmp

    Filesize

    64KB

  • memory/4652-14-0x00007FFD9A5D0000-0x00007FFD9A5E0000-memory.dmp

    Filesize

    64KB

  • memory/4652-2-0x00007FFD9C9D0000-0x00007FFD9C9E0000-memory.dmp

    Filesize

    64KB

  • memory/4652-5-0x00007FFDDC950000-0x00007FFDDCB45000-memory.dmp

    Filesize

    2.0MB

  • memory/4652-6-0x00007FFD9C9D0000-0x00007FFD9C9E0000-memory.dmp

    Filesize

    64KB

  • memory/4652-4-0x00007FFDDC950000-0x00007FFDDCB45000-memory.dmp

    Filesize

    2.0MB

  • memory/4652-8-0x00007FFDDC950000-0x00007FFDDCB45000-memory.dmp

    Filesize

    2.0MB

  • memory/4652-1-0x00007FFDDC9ED000-0x00007FFDDC9EE000-memory.dmp

    Filesize

    4KB

  • memory/4652-3-0x00007FFD9C9D0000-0x00007FFD9C9E0000-memory.dmp

    Filesize

    64KB

  • memory/4652-9-0x00007FFDDC950000-0x00007FFDDCB45000-memory.dmp

    Filesize

    2.0MB

  • memory/4652-13-0x00007FFD9A5D0000-0x00007FFD9A5E0000-memory.dmp

    Filesize

    64KB

  • memory/4652-12-0x00007FFDDC950000-0x00007FFDDCB45000-memory.dmp

    Filesize

    2.0MB

  • memory/4652-11-0x00007FFDDC950000-0x00007FFDDCB45000-memory.dmp

    Filesize

    2.0MB

  • memory/4652-10-0x00007FFDDC950000-0x00007FFDDCB45000-memory.dmp

    Filesize

    2.0MB

  • memory/4652-26-0x00007FFDDC950000-0x00007FFDDCB45000-memory.dmp

    Filesize

    2.0MB

  • memory/4652-27-0x00007FFDDC9ED000-0x00007FFDDC9EE000-memory.dmp

    Filesize

    4KB

  • memory/4652-28-0x00007FFDDC950000-0x00007FFDDCB45000-memory.dmp

    Filesize

    2.0MB

  • memory/4652-0-0x00007FFD9C9D0000-0x00007FFD9C9E0000-memory.dmp

    Filesize

    64KB