Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 23:24

General

  • Target

    97c83302a8e6cf45c425139b6711d08af5878928c130bea8c28dc951a021c382.xls

  • Size

    74KB

  • MD5

    63aaa783bd7e9422654036acb1799212

  • SHA1

    b81c8eceba2c4c0d5782756fa86a3a7e786aa877

  • SHA256

    97c83302a8e6cf45c425139b6711d08af5878928c130bea8c28dc951a021c382

  • SHA512

    9ed5786ed8da9b872fd789d15315947b8532cefdd7db5092b821b45652623742ad93e332c73d8961354f0b2e259d4ac407b1f0deaab52b471240f5ebe3ee155d

  • SSDEEP

    1536:VTOKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgTKHuS4NcTO9/z7UYdEJBo:VaKpb8rGYrMPe3q7Q0XV5xtezEsi8/dw

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://bdtin.com/cache/4G8pl/

xlm40.dropper

http://bascoysonido.com.ar/cgi-bin/AmUUPhWK6oTKLzHpl7zm/

xlm40.dropper

http://basnetbd.com/ckfinder/K0a/

Signatures

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\97c83302a8e6cf45c425139b6711d08af5878928c130bea8c28dc951a021c382.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\cui1.ocx
      2⤵
      • Process spawned unexpected child process
      PID:3076
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\cui2.ocx
      2⤵
      • Process spawned unexpected child process
      PID:412
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\cui3.ocx
      2⤵
      • Process spawned unexpected child process
      PID:3592
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\cui4.ocx
      2⤵
      • Process spawned unexpected child process
      PID:4068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    3KB

    MD5

    c01fbc43e00ae0314b95cb918679d190

    SHA1

    870e545b6874fce164a00c1d6ddd160a2ad96767

    SHA256

    19ec63e09e4c6fd11d9f64b2c89fb456bc53c38904d3374542976609393a0178

    SHA512

    b705399f58b20d264d121520658cce8e28396b162392564a08c0e60d623e6dfb3f5a60b1f94b7a37814e9c43ca3a3c7e2f6aa6f36d0ab84e706c1b6a4750f49f

  • memory/2588-6-0x00007FF9FED50000-0x00007FF9FED60000-memory.dmp

    Filesize

    64KB

  • memory/2588-1-0x00007FFA3ED6D000-0x00007FFA3ED6E000-memory.dmp

    Filesize

    4KB

  • memory/2588-15-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-5-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-7-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-8-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-9-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-10-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-13-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-12-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-14-0x00007FF9FCA50000-0x00007FF9FCA60000-memory.dmp

    Filesize

    64KB

  • memory/2588-11-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-3-0x00007FF9FED50000-0x00007FF9FED60000-memory.dmp

    Filesize

    64KB

  • memory/2588-2-0x00007FF9FED50000-0x00007FF9FED60000-memory.dmp

    Filesize

    64KB

  • memory/2588-16-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-17-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-18-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-22-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-21-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-20-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-19-0x00007FF9FCA50000-0x00007FF9FCA60000-memory.dmp

    Filesize

    64KB

  • memory/2588-4-0x00007FF9FED50000-0x00007FF9FED60000-memory.dmp

    Filesize

    64KB

  • memory/2588-48-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-49-0x00007FFA3ED6D000-0x00007FFA3ED6E000-memory.dmp

    Filesize

    4KB

  • memory/2588-50-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-51-0x00007FFA3ECD0000-0x00007FFA3EEC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-0-0x00007FF9FED50000-0x00007FF9FED60000-memory.dmp

    Filesize

    64KB