Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 17:58
Static task
static1
Behavioral task
behavioral1
Sample
PO#9943441.xls.exe
Resource
win7-20240729-en
General
-
Target
PO#9943441.xls.exe
-
Size
887KB
-
MD5
d805ae4b8c9cc7d49432a7dd3f5de693
-
SHA1
cdb73e6bd75bf2b7a4ef54435a5dd0179c67693b
-
SHA256
415c22ceb1927b67c21bd55423f75713b29ca6950e806387e28abbbf19ccc8bd
-
SHA512
3cd4ae4964e0a491f5819c554aa1379f98d9b834590f309b450e8943892a322a7ee5a17a925f311dc83155eaa7a058fe75b9ed969e6ff5155160d0bfa4c9b2ca
-
SSDEEP
6144:0V2wunldSL9/jlaD8jzurlsY4/Pg1IWSzOvZFTiEExL08koTxBroW:0V2ruLxjlaqmlsYKPg1k4FGEE28V
Malware Config
Extracted
formbook
4.1
gdo
algarverentalhome.com
zhmuying.com
familyinflow.com
tsushin.tech
pisosnuevosenbarajas.com
papeles-pintados.biz
october12017.info
armcodev.com
jumo-7.com
creativaph.net
moriteeguesthouse.com
bigdogowners.com
xunleigesp.com
danosporagua.com
xn--mkro7sz6qzxo.com
fidelitymoving.com
shreddingcycles.com
oldschoolquarterbacks.net
googlegtx.com
collinnorotsky.com
waterproofspray.tech
juicyrootsentertainment.com
dinamikmekanik.com
unicorncampus.com
chinadcr.com
wheniwasstupid.net
ysabellesilly.com
associationcompassion.com
futureadprovn.com
opebet697.com
rycoin.net
pizzeriavalentis.com
illuminaters.com
jzsapa.com
savyobills.info
lifestylewithheather.com
halfoffbogodeals.com
pizzarad.com
buywintershirtjps.win
aaliveshopping.com
weinisi.site
blackcracker.online
fudousan-eigyou.com
boguan360.com
playkill.net
future-of-mining.net
anhbatuvi.com
daruhane.com
554681.top
twinsystem.biz
pcb-breakers.net
cascadaonline.com
nbut.ltd
hsjckmy.com
gocreole.com
tychovanoorschot.com
taomi4428.com
trevli.com
batotovillage.com
tbtvwg.com
ptprofessional.net
elastomeros-asociados.com
loanin3.com
thmfn.loan
iskovlay.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/3648-182-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral2/memory/3648-186-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Executes dropped EXE 1 IoCs
pid Process 3648 AddInProcess32.exe -
Loads dropped DLL 1 IoCs
pid Process 1308 PO#9943441.xls.exe -
Obfuscated with Agile.Net obfuscator 33 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/1308-3-0x00000000024B0000-0x00000000024D8000-memory.dmp agile_net behavioral2/memory/1308-73-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-59-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-39-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-12-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-71-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-69-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-68-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-65-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-63-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-62-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-57-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-55-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-53-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-51-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-49-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-47-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-45-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-43-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-41-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-37-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-35-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-34-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-31-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-29-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-27-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-26-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-23-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-21-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-19-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-17-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-15-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net behavioral2/memory/1308-13-0x00000000024B0000-0x00000000024D1000-memory.dmp agile_net -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1308 set thread context of 3648 1308 PO#9943441.xls.exe 94 PID 3648 set thread context of 3492 3648 AddInProcess32.exe 56 PID 2036 set thread context of 3492 2036 wlanext.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO#9943441.xls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 1308 PO#9943441.xls.exe 1308 PO#9943441.xls.exe 1308 PO#9943441.xls.exe 3648 AddInProcess32.exe 3648 AddInProcess32.exe 3648 AddInProcess32.exe 3648 AddInProcess32.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe 2036 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3648 AddInProcess32.exe 3648 AddInProcess32.exe 3648 AddInProcess32.exe 2036 wlanext.exe 2036 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1308 PO#9943441.xls.exe Token: SeDebugPrivilege 3648 AddInProcess32.exe Token: SeDebugPrivilege 2036 wlanext.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3492 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1308 wrote to memory of 3648 1308 PO#9943441.xls.exe 94 PID 1308 wrote to memory of 3648 1308 PO#9943441.xls.exe 94 PID 1308 wrote to memory of 3648 1308 PO#9943441.xls.exe 94 PID 1308 wrote to memory of 3648 1308 PO#9943441.xls.exe 94 PID 1308 wrote to memory of 3648 1308 PO#9943441.xls.exe 94 PID 1308 wrote to memory of 3648 1308 PO#9943441.xls.exe 94 PID 3492 wrote to memory of 2036 3492 Explorer.EXE 95 PID 3492 wrote to memory of 2036 3492 Explorer.EXE 95 PID 3492 wrote to memory of 2036 3492 Explorer.EXE 95 PID 2036 wrote to memory of 2720 2036 wlanext.exe 96 PID 2036 wrote to memory of 2720 2036 wlanext.exe 96 PID 2036 wrote to memory of 2720 2036 wlanext.exe 96
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\PO#9943441.xls.exe"C:\Users\Admin\AppData\Local\Temp\PO#9943441.xls.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3648
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD59827ff3cdf4b83f9c86354606736ca9c
SHA1e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723
SHA256c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a
SHA5128261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579
-
Filesize
94KB
MD514ff402962ad21b78ae0b4c43cd1f194
SHA1f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b