Analysis

  • max time kernel
    133s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 22:34

General

  • Target

    029490043fe87b081869226c4a91b0b30fd94d55556bd89eda53c95aa547a521.xlsm

  • Size

    21KB

  • MD5

    4d3ea999c1f60c580e5a5d51a656aab0

  • SHA1

    ba512a19e619461640fe07bb569d2085771bfd7f

  • SHA256

    029490043fe87b081869226c4a91b0b30fd94d55556bd89eda53c95aa547a521

  • SHA512

    b23b8130364ba9abd55162ba79db6892904c3eb7df6c23bd220e743c0980b8473f58b26f7d1be51fa8e7a6107ea5f44f5aeef5dcd4f3e7cca798d2fa8d6d8fb9

  • SSDEEP

    384:DhuAi/NjZS8EibbwBlwegASYrLb5CzgObff9kC+xbX77NWu:DtsNxzXQFCBn9kC+xbL71

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://beetle-j.jp/wp-admin/ErM4mW05tdj/

xlm40.dropper

https://brutobrasil.com.br/pdf/toO18cIP3/

xlm40.dropper

http://e3technology.in/2checkout_integration_php/rDcr1Wl90WWA9M/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\029490043fe87b081869226c4a91b0b30fd94d55556bd89eda53c95aa547a521.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4180
    • C:\Windows\SysWow64\regsvr32.exe
      C:\Windows\SysWow64\regsvr32.exe -s ..\rfs.dll
      2⤵
      • Process spawned unexpected child process
      • System Location Discovery: System Language Discovery
      PID:3860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    671B

    MD5

    e06139685cbd53c16869d2fcf4610612

    SHA1

    d275e6150328a13fe3dfb09c30fc36ccd3cfb920

    SHA256

    6242a9bc311455d8812666297236c77c36fa91a04bf3fd09f05178e49129ca9c

    SHA512

    1707669a1061093ac3ace07c96a0bcdc2af6fc68f248d79220bf7cd917411b60d8e29f75f4382763c5f99ef4eeb1837ef40b88c4f63dcdf4f5308ba770c2fbd8

  • C:\Users\Admin\rfs.dll

    Filesize

    114B

    MD5

    e89f75f918dbdcee28604d4e09dd71d7

    SHA1

    f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

    SHA256

    6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

    SHA512

    8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

  • memory/4180-12-0x00007FFD7A6B0000-0x00007FFD7A6C0000-memory.dmp

    Filesize

    64KB

  • memory/4180-2-0x00007FFD7CED0000-0x00007FFD7CEE0000-memory.dmp

    Filesize

    64KB

  • memory/4180-13-0x00007FFDBCE50000-0x00007FFDBD045000-memory.dmp

    Filesize

    2.0MB

  • memory/4180-5-0x00007FFD7CED0000-0x00007FFD7CEE0000-memory.dmp

    Filesize

    64KB

  • memory/4180-7-0x00007FFDBCE50000-0x00007FFDBD045000-memory.dmp

    Filesize

    2.0MB

  • memory/4180-8-0x00007FFDBCE50000-0x00007FFDBD045000-memory.dmp

    Filesize

    2.0MB

  • memory/4180-6-0x00007FFDBCE50000-0x00007FFDBD045000-memory.dmp

    Filesize

    2.0MB

  • memory/4180-9-0x00007FFDBCE50000-0x00007FFDBD045000-memory.dmp

    Filesize

    2.0MB

  • memory/4180-14-0x00007FFD7A6B0000-0x00007FFD7A6C0000-memory.dmp

    Filesize

    64KB

  • memory/4180-11-0x00007FFDBCE50000-0x00007FFDBD045000-memory.dmp

    Filesize

    2.0MB

  • memory/4180-1-0x00007FFD7CED0000-0x00007FFD7CEE0000-memory.dmp

    Filesize

    64KB

  • memory/4180-4-0x00007FFD7CED0000-0x00007FFD7CEE0000-memory.dmp

    Filesize

    64KB

  • memory/4180-10-0x00007FFDBCE50000-0x00007FFDBD045000-memory.dmp

    Filesize

    2.0MB

  • memory/4180-16-0x00007FFDBCE50000-0x00007FFDBD045000-memory.dmp

    Filesize

    2.0MB

  • memory/4180-18-0x00007FFDBCE50000-0x00007FFDBD045000-memory.dmp

    Filesize

    2.0MB

  • memory/4180-20-0x00007FFDBCE50000-0x00007FFDBD045000-memory.dmp

    Filesize

    2.0MB

  • memory/4180-19-0x00007FFDBCE50000-0x00007FFDBD045000-memory.dmp

    Filesize

    2.0MB

  • memory/4180-17-0x00007FFDBCE50000-0x00007FFDBD045000-memory.dmp

    Filesize

    2.0MB

  • memory/4180-15-0x00007FFDBCE50000-0x00007FFDBD045000-memory.dmp

    Filesize

    2.0MB

  • memory/4180-0-0x00007FFD7CED0000-0x00007FFD7CEE0000-memory.dmp

    Filesize

    64KB

  • memory/4180-41-0x00007FFDBCE50000-0x00007FFDBD045000-memory.dmp

    Filesize

    2.0MB

  • memory/4180-3-0x00007FFDBCEED000-0x00007FFDBCEEE000-memory.dmp

    Filesize

    4KB