Analysis

  • max time kernel
    133s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 23:16

General

  • Target

    4dfb3af0290a605bcb760a84efe15f25d9077692dce897b37e72de42abd0114e.xlsm

  • Size

    20KB

  • MD5

    b4f4c208edb5e427cdf3a517d27b369c

  • SHA1

    5693c98355cbd16be9aede6902eaf6782fe3b16c

  • SHA256

    4dfb3af0290a605bcb760a84efe15f25d9077692dce897b37e72de42abd0114e

  • SHA512

    f3b01c4a7943d0964b114fea767855f8b407e03853cd38a3bc31565581010e19ed65eadb19575d5db078b5df843d6a339c2aa005f481282759bdf2c772337844

  • SSDEEP

    384:2QZAVb1GNjJITo4CGzPd6ZIwVKb5CzgObff9kC+xbX7zL0crX:2TINqTo4FL3CBn9kC+xbLHjj

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.bridgewien.at/admin/9Osvbo9caA4QYishnWka/

xlm40.dropper

http://bartboutens.nl/cgi-bin/aPqSkCZXI3ueRdI/

xlm40.dropper

http://aleph.org.ng/wp-includes/k8YwVWkrdmUM9/

xlm40.dropper

http://alkautsarlampung.sch.id/belajar/WQlNleMJKoulGBUvgC9/

xlm40.dropper

http://automyjniafordon.bydgoszcz.pl/123/mOWZgMaL/

xlm40.dropper

http://www.annuncisiciliani.it/app/3l1ZgVfwIEiIcGelh/

xlm40.dropper

http://autoat.mx/assets/VljikBuT029PkSBfrc/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4dfb3af0290a605bcb760a84efe15f25d9077692dce897b37e72de42abd0114e.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    2KB

    MD5

    701a906baa82bea05314e5b963467000

    SHA1

    cae9306166d8631fc62383b6cf31e470da41162f

    SHA256

    8525818068ef7cc548e35fe090b43431bc3df56008969e448dac2e73e308df36

    SHA512

    5647454cb792c94fd8961d1c31cedfc68d9001caa3f960e375656a203bb5614046a05bdc68eb1c2bd03765d22623bf6f24976d10da39b43a7f4d27442e97a318

  • memory/1964-10-0x00007FF85AD50000-0x00007FF85AF45000-memory.dmp

    Filesize

    2.0MB

  • memory/1964-3-0x00007FF85ADED000-0x00007FF85ADEE000-memory.dmp

    Filesize

    4KB

  • memory/1964-7-0x00007FF85AD50000-0x00007FF85AF45000-memory.dmp

    Filesize

    2.0MB

  • memory/1964-5-0x00007FF85AD50000-0x00007FF85AF45000-memory.dmp

    Filesize

    2.0MB

  • memory/1964-4-0x00007FF81ADD0000-0x00007FF81ADE0000-memory.dmp

    Filesize

    64KB

  • memory/1964-6-0x00007FF81ADD0000-0x00007FF81ADE0000-memory.dmp

    Filesize

    64KB

  • memory/1964-8-0x00007FF85AD50000-0x00007FF85AF45000-memory.dmp

    Filesize

    2.0MB

  • memory/1964-9-0x00007FF85AD50000-0x00007FF85AF45000-memory.dmp

    Filesize

    2.0MB

  • memory/1964-0-0x00007FF81ADD0000-0x00007FF81ADE0000-memory.dmp

    Filesize

    64KB

  • memory/1964-2-0x00007FF81ADD0000-0x00007FF81ADE0000-memory.dmp

    Filesize

    64KB

  • memory/1964-12-0x00007FF85AD50000-0x00007FF85AF45000-memory.dmp

    Filesize

    2.0MB

  • memory/1964-11-0x00007FF818C60000-0x00007FF818C70000-memory.dmp

    Filesize

    64KB

  • memory/1964-14-0x00007FF85AD50000-0x00007FF85AF45000-memory.dmp

    Filesize

    2.0MB

  • memory/1964-15-0x00007FF818C60000-0x00007FF818C70000-memory.dmp

    Filesize

    64KB

  • memory/1964-16-0x00007FF85AD50000-0x00007FF85AF45000-memory.dmp

    Filesize

    2.0MB

  • memory/1964-17-0x00007FF85AD50000-0x00007FF85AF45000-memory.dmp

    Filesize

    2.0MB

  • memory/1964-13-0x00007FF85AD50000-0x00007FF85AF45000-memory.dmp

    Filesize

    2.0MB

  • memory/1964-43-0x00007FF85AD50000-0x00007FF85AF45000-memory.dmp

    Filesize

    2.0MB

  • memory/1964-1-0x00007FF81ADD0000-0x00007FF81ADE0000-memory.dmp

    Filesize

    64KB