Analysis

  • max time kernel
    133s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 19:05

General

  • Target

    abd0ee709a4da53f98077949878ab7bf87a5aba28065527f3580c46d4cb52690.xls

  • Size

    71KB

  • MD5

    536dedd72bbc959b9c6c741f18d0c668

  • SHA1

    11950368583f1fd376ac478700a0354cdb550991

  • SHA256

    abd0ee709a4da53f98077949878ab7bf87a5aba28065527f3580c46d4cb52690

  • SHA512

    20c66ed1fb5a87380b9a6a0d2ce55baba7f24ff617c593f863ef26898e0dd8c854fd1d839e8b3e064eb2ed0fe93c9c8715ea0e1a9255fb35744767ac90fd98cb

  • SSDEEP

    1536:DhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+gH+hDcnTLiQrRTZws8EYy:FKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMj

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://papillonweb.fr/wp-content/G8z08q0mj/

xlm40.dropper

http://brennanasia.com/images/6IwPBHbnUvfgugV1b/

xlm40.dropper

https://estacioesportivavilanovailageltru.cat/tmp/IgSyqwgJmE/

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\abd0ee709a4da53f98077949878ab7bf87a5aba28065527f3580c46d4cb52690.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\usoiy1.ocx
      2⤵
      • Process spawned unexpected child process
      PID:1180
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\usoiy2.ocx
      2⤵
      • Process spawned unexpected child process
      PID:1516
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\usoiy3.ocx
      2⤵
      • Process spawned unexpected child process
      PID:1748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    3KB

    MD5

    dd018dc20cf263c9c6675cf75e108c68

    SHA1

    4fd62267cba4fad9d5b41edefa1d1a6956180c53

    SHA256

    92684a341886e73fc177647495995b6855fd6e1588955acce092d2fc44ca6552

    SHA512

    007bb718a2a396e059e966a169d6d425c64f9ce730d2d85d45ff0c4d6a73535c6b24ad4b68bfca94ba06fdcc2bd01f84bd7f8da4c784bbababd2054e411f32b7

  • C:\Users\Admin\usoiy1.ocx

    Filesize

    111KB

    MD5

    a32ddff026d0c45aec7bf4c84fb00e6f

    SHA1

    377fa6800165a19b9f2b760ba1b970ab3c09d3ae

    SHA256

    79a01b0fa26cfd15bd528c57d32d2bb6e6a984f2b0f4d95d7b24dfcf1dcb89e9

    SHA512

    de15e922e1bf7c43e73050acaedaa1b9c7978cf3ac29ccd24ce114617a93cd6d6fa035f9226bd32fa2c72892ffb8fdf92665b322e90ffeb82d85f306ee30cf9e

  • C:\Users\Admin\usoiy3.ocx

    Filesize

    56KB

    MD5

    f34e4b7f769306519143947d83c03039

    SHA1

    fb2af13bc0f9361decfce757beb46981c3d8b174

    SHA256

    840cae86366b6237e49e8079658f8d6c6aa520a63e0c7b3958c57dc315f42462

    SHA512

    30b689710e0ae951de8c44736e55a81751c0623dae07c0b207e0e90fb288857f11a6219848aed38a71612b5da36f1d7f7d38d0be07b17fe9a6b432aa16be014d

  • memory/2656-11-0x00007FFA21FD0000-0x00007FFA221C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2656-13-0x00007FFA21FD0000-0x00007FFA221C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2656-8-0x00007FFA21FD0000-0x00007FFA221C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2656-2-0x00007FF9E2050000-0x00007FF9E2060000-memory.dmp

    Filesize

    64KB

  • memory/2656-1-0x00007FF9E2050000-0x00007FF9E2060000-memory.dmp

    Filesize

    64KB

  • memory/2656-3-0x00007FFA2206D000-0x00007FFA2206E000-memory.dmp

    Filesize

    4KB

  • memory/2656-10-0x00007FFA21FD0000-0x00007FFA221C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2656-9-0x00007FFA21FD0000-0x00007FFA221C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2656-12-0x00007FFA21FD0000-0x00007FFA221C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2656-0-0x00007FF9E2050000-0x00007FF9E2060000-memory.dmp

    Filesize

    64KB

  • memory/2656-14-0x00007FF9DFFC0000-0x00007FF9DFFD0000-memory.dmp

    Filesize

    64KB

  • memory/2656-6-0x00007FFA21FD0000-0x00007FFA221C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2656-17-0x00007FFA21FD0000-0x00007FFA221C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2656-18-0x00007FFA21FD0000-0x00007FFA221C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2656-16-0x00007FFA21FD0000-0x00007FFA221C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2656-19-0x00007FF9DFFC0000-0x00007FF9DFFD0000-memory.dmp

    Filesize

    64KB

  • memory/2656-15-0x00007FFA21FD0000-0x00007FFA221C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2656-7-0x00007FFA21FD0000-0x00007FFA221C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2656-45-0x00007FFA21FD0000-0x00007FFA221C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2656-5-0x00007FF9E2050000-0x00007FF9E2060000-memory.dmp

    Filesize

    64KB

  • memory/2656-4-0x00007FF9E2050000-0x00007FF9E2060000-memory.dmp

    Filesize

    64KB