Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 10:59

General

  • Target

    cc406aebf4e4188980bec3c758348a2c65aeebea963e30746b409a48ff11d79e.xls

  • Size

    78KB

  • MD5

    d81ae595b36a59e8464055aafb1ac4a7

  • SHA1

    d7c1bc1cef63446fa500bb3d6354ff45a8a17608

  • SHA256

    cc406aebf4e4188980bec3c758348a2c65aeebea963e30746b409a48ff11d79e

  • SHA512

    ba6cb7621fc9efd8e0edee2c814629ec090f0c04748d197df539afd5cb53411515a54e3e104fab7577d14c208573fd864799b38c8dc69426ef9ce3325d300375

  • SSDEEP

    1536:ZwKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg+dXTZhKEw+PmYEJ8zobcW13G+8eJNfnV:CKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg3

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://hostal-alfonso12.com/clases/SKtPvv/

xlm40.dropper

http://howesitgoing.com/images/HyaDnlbl6K7tbh2Lugys/

xlm40.dropper

https://www.jdserralheria.com.br/cgi-bin/KFG6/

xlm40.dropper

http://inteirado.com.br/fonts/7dJCVvuE5x3YrGQs2oJz/

xlm40.dropper

http://iciee.untirta.ac.id/test/GccRw/

xlm40.dropper

https://ideoso.com.tw/cgi-bin/zLrnBd2Eg1N3UVy5yL/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cc406aebf4e4188980bec3c758348a2c65aeebea963e30746b409a48ff11d79e.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1248-0-0x00007FFD000F0000-0x00007FFD00100000-memory.dmp

    Filesize

    64KB

  • memory/1248-1-0x00007FFD4010D000-0x00007FFD4010E000-memory.dmp

    Filesize

    4KB

  • memory/1248-2-0x00007FFD000F0000-0x00007FFD00100000-memory.dmp

    Filesize

    64KB

  • memory/1248-3-0x00007FFD000F0000-0x00007FFD00100000-memory.dmp

    Filesize

    64KB

  • memory/1248-4-0x00007FFD000F0000-0x00007FFD00100000-memory.dmp

    Filesize

    64KB

  • memory/1248-5-0x00007FFD000F0000-0x00007FFD00100000-memory.dmp

    Filesize

    64KB

  • memory/1248-8-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1248-7-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1248-6-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1248-11-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1248-12-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1248-14-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1248-13-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1248-15-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1248-10-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1248-9-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1248-16-0x00007FFCFE090000-0x00007FFCFE0A0000-memory.dmp

    Filesize

    64KB

  • memory/1248-17-0x00007FFCFE090000-0x00007FFCFE0A0000-memory.dmp

    Filesize

    64KB

  • memory/1248-39-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1248-40-0x00007FFD4010D000-0x00007FFD4010E000-memory.dmp

    Filesize

    4KB

  • memory/1248-41-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB