Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 23:34

General

  • Target

    d519acdef138e77ef754edcb0b2af2f569d41e3fbb9dca73401eba2e05209884.xlsm

  • Size

    40KB

  • MD5

    3b71ed07b85122e5d70c5f4d68a96d6e

  • SHA1

    1ca2cbf77bf525510ab6a727d259c48b845f775b

  • SHA256

    d519acdef138e77ef754edcb0b2af2f569d41e3fbb9dca73401eba2e05209884

  • SHA512

    092cc1e1e4d8410915fe65d0dbd735b2a3ba8f5cb919c8e19131d252d39d14d8f45d426b314084e0038a5f479a42d279da2fcd01bd16d91c516bf630ca304265

  • SSDEEP

    768:m9oms9O+pOevZCwtxyKfcrND59V+L9Rw4eWrXcTqw0VfWZE:m9oms7tylND59V4jwmXc2RVfW+

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://queaventurasathya.com/licenses/r903sDTMHYLyn8ykMU/

xlm40.dropper

https://escuelageneraljosedesanmartin.com/tmp/5vJR7J/

xlm40.dropper

https://indianbusinessclub.org/wtzrlyx/Nfisb7Le5JH/

xlm40.dropper

https://cartelac.pt/wp-includes/VJMcayYWquGgVAGa/

xlm40.dropper

https://axial-ing.fr/old/98WgLPFy5u2Xf/

xlm40.dropper

https://luape.es/wp-admin/moJpURVz/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d519acdef138e77ef754edcb0b2af2f569d41e3fbb9dca73401eba2e05209884.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:3412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    1b419587b892a8da2e188601de472d65

    SHA1

    a5d3c0f5901058dcb23d767d8c1aa56e701f282f

    SHA256

    70b25573cca0ec7690fd55de9cffafb4a4be724d4dd92979c4422908d37f3e44

    SHA512

    b53a43b1e75f677a71e883f9548af7ca9823d11d18f0524ecab71b8d0ae79cbac8950d5ba41de41999054a898fd0931c5eb8088e95dccabbcbdfe373345ca6ed

  • memory/3412-10-0x00007FFE354F0000-0x00007FFE356E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3412-1-0x00007FFDF5570000-0x00007FFDF5580000-memory.dmp

    Filesize

    64KB

  • memory/3412-11-0x00007FFDF2DB0000-0x00007FFDF2DC0000-memory.dmp

    Filesize

    64KB

  • memory/3412-7-0x00007FFE354F0000-0x00007FFE356E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3412-4-0x00007FFE354F0000-0x00007FFE356E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3412-6-0x00007FFDF5570000-0x00007FFDF5580000-memory.dmp

    Filesize

    64KB

  • memory/3412-8-0x00007FFE354F0000-0x00007FFE356E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3412-0-0x00007FFDF5570000-0x00007FFDF5580000-memory.dmp

    Filesize

    64KB

  • memory/3412-3-0x00007FFE3558D000-0x00007FFE3558E000-memory.dmp

    Filesize

    4KB

  • memory/3412-2-0x00007FFDF5570000-0x00007FFDF5580000-memory.dmp

    Filesize

    64KB

  • memory/3412-5-0x00007FFDF5570000-0x00007FFDF5580000-memory.dmp

    Filesize

    64KB

  • memory/3412-13-0x00007FFE354F0000-0x00007FFE356E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3412-14-0x00007FFE354F0000-0x00007FFE356E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3412-16-0x00007FFE354F0000-0x00007FFE356E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3412-15-0x00007FFDF2DB0000-0x00007FFDF2DC0000-memory.dmp

    Filesize

    64KB

  • memory/3412-12-0x00007FFE354F0000-0x00007FFE356E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3412-33-0x00007FFE354F0000-0x00007FFE356E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3412-9-0x00007FFE354F0000-0x00007FFE356E5000-memory.dmp

    Filesize

    2.0MB