Analysis

  • max time kernel
    133s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 22:39

General

  • Target

    e05ae88fdae10ca621f0a49ce9278d1f677004358beae1450cea0cd7b442aae8.xlsm

  • Size

    40KB

  • MD5

    c0b0fa3a9fe1a94c0ca1f2ac1353d57d

  • SHA1

    e52e0f919d08efc0fc3a076a887a2bbb6f46b2ca

  • SHA256

    e05ae88fdae10ca621f0a49ce9278d1f677004358beae1450cea0cd7b442aae8

  • SHA512

    4d3169ecfa3717c223324290739d3aea37ea6d729fc64af444ff6170aa85bac296b0b714a3d8c9dc255f76f33c7422deea55400bc6e5082b4cae58c093e3323c

  • SSDEEP

    768:qXomZDOevZCwtvyKfcrND59V+L9Rw4eWrXcTqZ0VPH+t:2omZDzylND59V4jwmXc2CVPu

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://radiomedenine.com/kidfngb/h3a3D5WRS/

xlm40.dropper

https://mobapkapps.com/wp-includes/JcEqRwhEw0/

xlm40.dropper

https://bhandariclub.com/iwdfol/X64nJKK8fsiQcbkW5MN/

xlm40.dropper

https://welcomelanguages.com/factoo/7Wz9qXX7QSjXm0VPM/

xlm40.dropper

https://deine-bewerbung.com/wp-content/HHotdOzCFlW/

xlm40.dropper

https://wewin21.com/wp-content/NITdYcwbO3C1uJd/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e05ae88fdae10ca621f0a49ce9278d1f677004358beae1450cea0cd7b442aae8.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    cf2e6e630df2c7fb3bc80aa8cd2873a1

    SHA1

    0e78529743147ef04f2d392a3183d6eee9501a9a

    SHA256

    29a454e2dc8ae11aa59475eb8f41518742507396ec36df73925d46a477d5a05d

    SHA512

    3ba8e4ef28da31b6a90bad392810359837db8e93b2882a7850ba4e5a06e6d71bd50812961836d5fcad117a575431a8e5878550251bcbb296ce918e7e92be47a3

  • memory/2320-11-0x00007FFF44C90000-0x00007FFF44E85000-memory.dmp

    Filesize

    2.0MB

  • memory/2320-4-0x00007FFF04D10000-0x00007FFF04D20000-memory.dmp

    Filesize

    64KB

  • memory/2320-14-0x00007FFF44C90000-0x00007FFF44E85000-memory.dmp

    Filesize

    2.0MB

  • memory/2320-2-0x00007FFF04D10000-0x00007FFF04D20000-memory.dmp

    Filesize

    64KB

  • memory/2320-5-0x00007FFF44C90000-0x00007FFF44E85000-memory.dmp

    Filesize

    2.0MB

  • memory/2320-6-0x00007FFF44C90000-0x00007FFF44E85000-memory.dmp

    Filesize

    2.0MB

  • memory/2320-8-0x00007FFF04D10000-0x00007FFF04D20000-memory.dmp

    Filesize

    64KB

  • memory/2320-7-0x00007FFF44C90000-0x00007FFF44E85000-memory.dmp

    Filesize

    2.0MB

  • memory/2320-15-0x00007FFF025D0000-0x00007FFF025E0000-memory.dmp

    Filesize

    64KB

  • memory/2320-0-0x00007FFF04D10000-0x00007FFF04D20000-memory.dmp

    Filesize

    64KB

  • memory/2320-1-0x00007FFF44D2D000-0x00007FFF44D2E000-memory.dmp

    Filesize

    4KB

  • memory/2320-3-0x00007FFF04D10000-0x00007FFF04D20000-memory.dmp

    Filesize

    64KB

  • memory/2320-10-0x00007FFF44C90000-0x00007FFF44E85000-memory.dmp

    Filesize

    2.0MB

  • memory/2320-16-0x00007FFF44C90000-0x00007FFF44E85000-memory.dmp

    Filesize

    2.0MB

  • memory/2320-17-0x00007FFF44C90000-0x00007FFF44E85000-memory.dmp

    Filesize

    2.0MB

  • memory/2320-18-0x00007FFF025D0000-0x00007FFF025E0000-memory.dmp

    Filesize

    64KB

  • memory/2320-12-0x00007FFF44C90000-0x00007FFF44E85000-memory.dmp

    Filesize

    2.0MB

  • memory/2320-9-0x00007FFF44C90000-0x00007FFF44E85000-memory.dmp

    Filesize

    2.0MB

  • memory/2320-28-0x00007FFF44C90000-0x00007FFF44E85000-memory.dmp

    Filesize

    2.0MB

  • memory/2320-29-0x00007FFF44D2D000-0x00007FFF44D2E000-memory.dmp

    Filesize

    4KB

  • memory/2320-30-0x00007FFF44C90000-0x00007FFF44E85000-memory.dmp

    Filesize

    2.0MB

  • memory/2320-13-0x00007FFF44C90000-0x00007FFF44E85000-memory.dmp

    Filesize

    2.0MB