Analysis

  • max time kernel
    148s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 22:55

General

  • Target

    0dd041b3635a558a1a3f6cfcb07b9c82476a470c777d20b78e7f78f1aaa10fa9.xlsm

  • Size

    44KB

  • MD5

    3dc24670b45aa94955797797e2870f88

  • SHA1

    d77961c13b839b8bf751f814a54523bcccfa6b5b

  • SHA256

    0dd041b3635a558a1a3f6cfcb07b9c82476a470c777d20b78e7f78f1aaa10fa9

  • SHA512

    6a26d6c7ab247d39de7270075cb49f72d5a90edfccb540c1b52edb90627ed30f560b5653772be7bced8c9c429caf868c2e037b9a84a70da64bd4c7bb86f0f59d

  • SSDEEP

    768:i1kICkZNRvmHazrfRmUOcIIGq9hqN6994E3ewNXz8OP6AQPHWZinVd0VhkhB:iKItBvGazLRYIzhqOisNz8OP6Tein0Vo

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.agretto.com/Template/ziasuz5w8pS08Gm2/

xlm40.dropper

http://www.agnesleung.com/raw.backup/j4ry/

xlm40.dropper

https://lifebotl.com/Response/WllkQWM/

xlm40.dropper

https://livejagat.com/h/SjpRvD/

xlm40.dropper

http://185.187.70.35/wordpress_bo/srvoaI2MBFc/

xlm40.dropper

http://188.166.245.112/sipadu/eFi8UiJETZiK1FB/

xlm40.dropper

http://103.85.95.5/v1/uploads/87DtpAEZULSccOn/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0dd041b3635a558a1a3f6cfcb07b9c82476a470c777d20b78e7f78f1aaa10fa9.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    2KB

    MD5

    77ca9df74fe3b5b2044f5d57bca996e7

    SHA1

    4673d692f98c2494ed45500e6bd784cdfc26dcc9

    SHA256

    5fa71a44bedb1cd57437795bc033c667e280a6e4c85ed6a79828dda892702a7c

    SHA512

    36f6c809137a1ae448ed776f9b3df3d5093e96985e2c83d142795cbe64f3222a6150ab56af09bba50216631bce3ed784f5df8509ab1af61be55ce25d2b6407da

  • memory/1072-10-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1072-7-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1072-14-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1072-2-0x00007FFE368B0000-0x00007FFE368C0000-memory.dmp

    Filesize

    64KB

  • memory/1072-15-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1072-6-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1072-8-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1072-9-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1072-11-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1072-12-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1072-13-0x00007FFE34000000-0x00007FFE34010000-memory.dmp

    Filesize

    64KB

  • memory/1072-3-0x00007FFE768CD000-0x00007FFE768CE000-memory.dmp

    Filesize

    4KB

  • memory/1072-4-0x00007FFE368B0000-0x00007FFE368C0000-memory.dmp

    Filesize

    64KB

  • memory/1072-5-0x00007FFE368B0000-0x00007FFE368C0000-memory.dmp

    Filesize

    64KB

  • memory/1072-0-0x00007FFE368B0000-0x00007FFE368C0000-memory.dmp

    Filesize

    64KB

  • memory/1072-16-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1072-17-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1072-18-0x00007FFE34000000-0x00007FFE34010000-memory.dmp

    Filesize

    64KB

  • memory/1072-19-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1072-20-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1072-21-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1072-23-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1072-22-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1072-45-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1072-1-0x00007FFE368B0000-0x00007FFE368C0000-memory.dmp

    Filesize

    64KB