Analysis

  • max time kernel
    133s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 23:53

General

  • Target

    6120f414a9bedd26fc94824354837cd181beb5222f40b2a0701cad80a17a1487.xlsm

  • Size

    48KB

  • MD5

    b57365b1dc6d095a1f787cfc600a0bf5

  • SHA1

    e9f42179a3ffdd6e3d17e77616b88feeb8e6bbc0

  • SHA256

    6120f414a9bedd26fc94824354837cd181beb5222f40b2a0701cad80a17a1487

  • SHA512

    cab1bf45ebe5467a76b92335b3612a3a90aa9b4a2d501ce5de1c8563a50b07d933ec8d3d4c6d78b75afef37d1e1522099ddb8cc96e3dec11cbae9ea02bc4119b

  • SSDEEP

    768:zO+CAEWvxRc3mlkKDNWBA7rTj+RYV8Q0RuVBR2jPrtysHRX0AOBAa:z7O2b8QkKDNck01u/R2rZyjtBl

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://suleyera.com/components/CNGhltc5v2K6/

xlm40.dropper

http://sociallysavvyseo.com/PinnacleDynamicServices/pRlYMzvfuu5B/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\6120f414a9bedd26fc94824354837cd181beb5222f40b2a0701cad80a17a1487.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:100
    • C:\Windows\SysWow64\regsvr32.exe
      C:\Windows\SysWow64\regsvr32.exe -s ..\ax.ocx
      2⤵
      • Process spawned unexpected child process
      • System Location Discovery: System Language Discovery
      PID:4600

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

          Filesize

          3KB

          MD5

          acd74bd2a7bf308aac25c2f8e323f251

          SHA1

          4fc798e40677048e510234dd83e238d04eca4d99

          SHA256

          8bbd98fe368b8e3fd67de753833e1f0436f2122c766172a420e678090aed1cd9

          SHA512

          72cf6ddd163f5ef27b22c51f58b710df4994c31743a5b5a417d3325efcf571899ee104ca8d80995968f50e9ad37d9679e2d55cdeab515db1994825ab8943a32b

        • C:\Users\Admin\ax.ocx

          Filesize

          7KB

          MD5

          fc250a2589e567b2a63d934ab6be1fa9

          SHA1

          4ba1a4afdd9488389eda5dc8a8fc1b6713ce29e4

          SHA256

          fb551dbf1e7abb4a0af4f82f23e423a451b977587282c521dda07e61c35cb42d

          SHA512

          3b53091ef2241db8bfbdacaa90c117d2929997430421d69e064f6fc4b6e0afbb5e71b1caf15a2d83d9028e3b78a99da60af50249513ca35731bbf2eafa95ed28

        • memory/100-6-0x00007FF9FAC70000-0x00007FF9FAE65000-memory.dmp

          Filesize

          2.0MB

        • memory/100-14-0x00007FF9B8A20000-0x00007FF9B8A30000-memory.dmp

          Filesize

          64KB

        • memory/100-9-0x00007FF9FAC70000-0x00007FF9FAE65000-memory.dmp

          Filesize

          2.0MB

        • memory/100-11-0x00007FF9FAC70000-0x00007FF9FAE65000-memory.dmp

          Filesize

          2.0MB

        • memory/100-12-0x00007FF9FAC70000-0x00007FF9FAE65000-memory.dmp

          Filesize

          2.0MB

        • memory/100-8-0x00007FF9FAC70000-0x00007FF9FAE65000-memory.dmp

          Filesize

          2.0MB

        • memory/100-17-0x00007FF9FAC70000-0x00007FF9FAE65000-memory.dmp

          Filesize

          2.0MB

        • memory/100-13-0x00007FF9FAC70000-0x00007FF9FAE65000-memory.dmp

          Filesize

          2.0MB

        • memory/100-7-0x00007FF9FAC70000-0x00007FF9FAE65000-memory.dmp

          Filesize

          2.0MB

        • memory/100-15-0x00007FF9B8A20000-0x00007FF9B8A30000-memory.dmp

          Filesize

          64KB

        • memory/100-4-0x00007FF9BACF0000-0x00007FF9BAD00000-memory.dmp

          Filesize

          64KB

        • memory/100-0-0x00007FF9BACF0000-0x00007FF9BAD00000-memory.dmp

          Filesize

          64KB

        • memory/100-2-0x00007FF9BACF0000-0x00007FF9BAD00000-memory.dmp

          Filesize

          64KB

        • memory/100-18-0x00007FF9FAC70000-0x00007FF9FAE65000-memory.dmp

          Filesize

          2.0MB

        • memory/100-16-0x00007FF9FAC70000-0x00007FF9FAE65000-memory.dmp

          Filesize

          2.0MB

        • memory/100-10-0x00007FF9FAC70000-0x00007FF9FAE65000-memory.dmp

          Filesize

          2.0MB

        • memory/100-19-0x00007FF9FAC70000-0x00007FF9FAE65000-memory.dmp

          Filesize

          2.0MB

        • memory/100-1-0x00007FF9FAD0D000-0x00007FF9FAD0E000-memory.dmp

          Filesize

          4KB

        • memory/100-5-0x00007FF9BACF0000-0x00007FF9BAD00000-memory.dmp

          Filesize

          64KB

        • memory/100-41-0x00007FF9FAC70000-0x00007FF9FAE65000-memory.dmp

          Filesize

          2.0MB

        • memory/100-42-0x00007FF9FAD0D000-0x00007FF9FAD0E000-memory.dmp

          Filesize

          4KB

        • memory/100-43-0x00007FF9FAC70000-0x00007FF9FAE65000-memory.dmp

          Filesize

          2.0MB

        • memory/100-47-0x00007FF9FAC70000-0x00007FF9FAE65000-memory.dmp

          Filesize

          2.0MB

        • memory/100-3-0x00007FF9BACF0000-0x00007FF9BAD00000-memory.dmp

          Filesize

          64KB