Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 22:14

General

  • Target

    0ef08095b9ef39787a7f00e186fbc9cb2a9aa82bdbe56c0577b65be35fb83708.xls

  • Size

    78KB

  • MD5

    118ae5a49bdcd0dfd675bab78b968828

  • SHA1

    b1a24c85e541eb06174805a212481fce887362d7

  • SHA256

    0ef08095b9ef39787a7f00e186fbc9cb2a9aa82bdbe56c0577b65be35fb83708

  • SHA512

    bdc532b477b20eb0fffebd7e573f1c4893978266348f347aef392e23f08e4179363d64fbeeca5a2889375129845ec5625e227ea3664a60ce33c765575dd48a48

  • SSDEEP

    1536:ZwKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg+dXTZhKEw+PmYEJ8zobcW13G+8eJNfn1:CKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgX

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://hostal-alfonso12.com/clases/SKtPvv/

xlm40.dropper

http://howesitgoing.com/images/HyaDnlbl6K7tbh2Lugys/

xlm40.dropper

https://www.jdserralheria.com.br/cgi-bin/KFG6/

xlm40.dropper

http://inteirado.com.br/fonts/7dJCVvuE5x3YrGQs2oJz/

xlm40.dropper

http://iciee.untirta.ac.id/test/GccRw/

xlm40.dropper

https://ideoso.com.tw/cgi-bin/zLrnBd2Eg1N3UVy5yL/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0ef08095b9ef39787a7f00e186fbc9cb2a9aa82bdbe56c0577b65be35fb83708.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    2KB

    MD5

    343cbaf82cc35ad0e0aabf4f63ff1a01

    SHA1

    66646210faf82d4a1e19e7e3fca082153c9a64df

    SHA256

    11fc76faef4f6154b39fe272f7e1cb30d99f187a48e3883abbbe37d59bedcadc

    SHA512

    d72919d4ac1cbf83b7c510256f7fe024de03697f2f8d53dc8d66e45746a914f4930a452de5ad78db371f8795442e5cb3da99b2c1270e1ea1a481794229e8ad7d

  • memory/4940-11-0x00007FFD83610000-0x00007FFD83805000-memory.dmp

    Filesize

    2.0MB

  • memory/4940-6-0x00007FFD83610000-0x00007FFD83805000-memory.dmp

    Filesize

    2.0MB

  • memory/4940-10-0x00007FFD83610000-0x00007FFD83805000-memory.dmp

    Filesize

    2.0MB

  • memory/4940-7-0x00007FFD43690000-0x00007FFD436A0000-memory.dmp

    Filesize

    64KB

  • memory/4940-9-0x00007FFD83610000-0x00007FFD83805000-memory.dmp

    Filesize

    2.0MB

  • memory/4940-8-0x00007FFD83610000-0x00007FFD83805000-memory.dmp

    Filesize

    2.0MB

  • memory/4940-12-0x00007FFD83610000-0x00007FFD83805000-memory.dmp

    Filesize

    2.0MB

  • memory/4940-14-0x00007FFD83610000-0x00007FFD83805000-memory.dmp

    Filesize

    2.0MB

  • memory/4940-13-0x00007FFD83610000-0x00007FFD83805000-memory.dmp

    Filesize

    2.0MB

  • memory/4940-1-0x00007FFD836AD000-0x00007FFD836AE000-memory.dmp

    Filesize

    4KB

  • memory/4940-2-0x00007FFD43690000-0x00007FFD436A0000-memory.dmp

    Filesize

    64KB

  • memory/4940-3-0x00007FFD43690000-0x00007FFD436A0000-memory.dmp

    Filesize

    64KB

  • memory/4940-5-0x00007FFD83610000-0x00007FFD83805000-memory.dmp

    Filesize

    2.0MB

  • memory/4940-4-0x00007FFD43690000-0x00007FFD436A0000-memory.dmp

    Filesize

    64KB

  • memory/4940-15-0x00007FFD41290000-0x00007FFD412A0000-memory.dmp

    Filesize

    64KB

  • memory/4940-16-0x00007FFD41290000-0x00007FFD412A0000-memory.dmp

    Filesize

    64KB

  • memory/4940-38-0x00007FFD83610000-0x00007FFD83805000-memory.dmp

    Filesize

    2.0MB

  • memory/4940-39-0x00007FFD836AD000-0x00007FFD836AE000-memory.dmp

    Filesize

    4KB

  • memory/4940-40-0x00007FFD83610000-0x00007FFD83805000-memory.dmp

    Filesize

    2.0MB

  • memory/4940-41-0x00007FFD83610000-0x00007FFD83805000-memory.dmp

    Filesize

    2.0MB

  • memory/4940-0-0x00007FFD43690000-0x00007FFD436A0000-memory.dmp

    Filesize

    64KB