Analysis

  • max time kernel
    137s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 22:48

General

  • Target

    e2c807c532e81e15c80902fbad8efac1f13f4988adb65bb99d42fa4fb48950bb.xlsm

  • Size

    95KB

  • MD5

    4e21813d68718d6b7495f398208431d4

  • SHA1

    eff9d3ad47ba031c557dc7b970217d10c6b62b45

  • SHA256

    e2c807c532e81e15c80902fbad8efac1f13f4988adb65bb99d42fa4fb48950bb

  • SHA512

    fb4b302a4cbdfb6c0a9892b3ad49beea6ba75582a0581ed72ba3db6e4849d961c21019d2b6231f1fdaebb6d81f4324a24de7473f3839f06fe84be00728294748

  • SSDEEP

    1536:sQxfGWXG8v5MB5Dg8cVoioFh+fYFl69oXiZ5bcvJlqGiwIWx1BcVXzAyVFfw:s2318DsVhonV69o2bchgGaWBcpA+fw

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://ashirvadgroup.com/wp-admin/LtoH5AWneDBZIV2D/

xlm40.dropper

https://patriciamirapsicologa.com/wp-includes/fVVa9DXB/

xlm40.dropper

https://forfreeiptv.com/wp-admin/s5Oxoskqv8/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\e2c807c532e81e15c80902fbad8efac1f13f4988adb65bb99d42fa4fb48950bb.xlsm
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Windows\SysWow64\regsvr32.exe
      C:\Windows\SysWow64\regsvr32.exe /s ..\dw1.ocx
      2⤵
      • Process spawned unexpected child process
      • System Location Discovery: System Language Discovery
      PID:2244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\dw1.ocx

    Filesize

    1KB

    MD5

    c6fca0a8426ce9c974a3f421bed466b3

    SHA1

    4fac8b8338bc96d6d9c2a3190e53cc941e52df91

    SHA256

    fe3739dee4b71c2d834dd626d0cda2e728581737cbdcfad72b117758b6062aaf

    SHA512

    5334f4f8b10329ae2856edb478ea4cc4cd3fc1904fb07b37fe503bca5d9f369422e25063e83893ff37aed1c243528e189b70f39b03c11dac4db84cc4e1b718ed

  • memory/2744-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2744-1-0x00000000735FD000-0x0000000073608000-memory.dmp

    Filesize

    44KB

  • memory/2744-28-0x00000000735FD000-0x0000000073608000-memory.dmp

    Filesize

    44KB