Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 05:37

General

  • Target

    f3ca7a0c0a161752347f2fb919a4bd320543ecfad7c57c2e8e31320864b74463.xlsm

  • Size

    56KB

  • MD5

    4f2e3bbf4e1169ccd6a74d3161c8719b

  • SHA1

    1003f1e725587fbbed1e46154eca2c82990a9c11

  • SHA256

    f3ca7a0c0a161752347f2fb919a4bd320543ecfad7c57c2e8e31320864b74463

  • SHA512

    17dd745a6895a9c0b9022531b8df216dafc506c8a3cb810d681a7936e633c43ca67afaf63f403eda28360dbc93b8a6702fadc38919742bd91764ac28d1d3a8a8

  • SSDEEP

    1536:mUsgWy4WV8cPkkhN+8ZvOVWoNwlQolOko3t0F5uVAwk6:Zsnbcpn+8ZGIFK73tMQ5

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.equus.com/2i8yt/GhBSz6peG/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f3ca7a0c0a161752347f2fb919a4bd320543ecfad7c57c2e8e31320864b74463.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:696
    • C:\Windows\SysWow64\regsvr32.exe
      C:\Windows\SysWow64\regsvr32.exe -s ..\adw.ocx
      2⤵
      • Process spawned unexpected child process
      • System Location Discovery: System Language Discovery
      PID:4124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    152103ccf64f598239c083185d9e792f

    SHA1

    e5ae2e294fd819bac338325cdc72c21e5034feb9

    SHA256

    66ee419b54e8214f60c929692cf6f37add71570725869897b834c4c022446f41

    SHA512

    e91e4e4c5eee44b5f35001b30691468d109e02b240d3573795d588a9d77f685f9da0f5ab379d886dd4b727e5b695928dbd4c34f9738aea4fe53264ede1b369bb

  • C:\Users\Admin\adw.ocx

    Filesize

    638B

    MD5

    c7617446d16b7213f3db764a2e1e2687

    SHA1

    0c668589ea0918533985693696ec12016c8d609d

    SHA256

    faedea74bbfeb00b2a46a351776282b49e9cf69f8eda107dfd6398b955e6a710

    SHA512

    19b80989e6e0115710a90425d13be6c5ddaa5d84bf27be5da18be51613bad8f40225fc84433a74211ce6cca3273262a5444dabb625cd99566ecdb787b124b16d

  • memory/696-14-0x00007FFCE62B0000-0x00007FFCE64A5000-memory.dmp

    Filesize

    2.0MB

  • memory/696-37-0x00007FFCE634D000-0x00007FFCE634E000-memory.dmp

    Filesize

    4KB

  • memory/696-4-0x00007FFCA6330000-0x00007FFCA6340000-memory.dmp

    Filesize

    64KB

  • memory/696-8-0x00007FFCE62B0000-0x00007FFCE64A5000-memory.dmp

    Filesize

    2.0MB

  • memory/696-10-0x00007FFCE62B0000-0x00007FFCE64A5000-memory.dmp

    Filesize

    2.0MB

  • memory/696-9-0x00007FFCE62B0000-0x00007FFCE64A5000-memory.dmp

    Filesize

    2.0MB

  • memory/696-11-0x00007FFCA40B0000-0x00007FFCA40C0000-memory.dmp

    Filesize

    64KB

  • memory/696-7-0x00007FFCE62B0000-0x00007FFCE64A5000-memory.dmp

    Filesize

    2.0MB

  • memory/696-6-0x00007FFCE62B0000-0x00007FFCE64A5000-memory.dmp

    Filesize

    2.0MB

  • memory/696-12-0x00007FFCA40B0000-0x00007FFCA40C0000-memory.dmp

    Filesize

    64KB

  • memory/696-1-0x00007FFCE634D000-0x00007FFCE634E000-memory.dmp

    Filesize

    4KB

  • memory/696-13-0x00007FFCE62B0000-0x00007FFCE64A5000-memory.dmp

    Filesize

    2.0MB

  • memory/696-2-0x00007FFCA6330000-0x00007FFCA6340000-memory.dmp

    Filesize

    64KB

  • memory/696-20-0x00007FFCE62B0000-0x00007FFCE64A5000-memory.dmp

    Filesize

    2.0MB

  • memory/696-17-0x00007FFCE62B0000-0x00007FFCE64A5000-memory.dmp

    Filesize

    2.0MB

  • memory/696-18-0x00007FFCE62B0000-0x00007FFCE64A5000-memory.dmp

    Filesize

    2.0MB

  • memory/696-16-0x00007FFCE62B0000-0x00007FFCE64A5000-memory.dmp

    Filesize

    2.0MB

  • memory/696-15-0x00007FFCE62B0000-0x00007FFCE64A5000-memory.dmp

    Filesize

    2.0MB

  • memory/696-5-0x00007FFCA6330000-0x00007FFCA6340000-memory.dmp

    Filesize

    64KB

  • memory/696-3-0x00007FFCA6330000-0x00007FFCA6340000-memory.dmp

    Filesize

    64KB

  • memory/696-36-0x00007FFCE62B0000-0x00007FFCE64A5000-memory.dmp

    Filesize

    2.0MB

  • memory/696-19-0x00007FFCE62B0000-0x00007FFCE64A5000-memory.dmp

    Filesize

    2.0MB

  • memory/696-38-0x00007FFCE62B0000-0x00007FFCE64A5000-memory.dmp

    Filesize

    2.0MB

  • memory/696-42-0x00007FFCE62B0000-0x00007FFCE64A5000-memory.dmp

    Filesize

    2.0MB

  • memory/696-0-0x00007FFCA6330000-0x00007FFCA6340000-memory.dmp

    Filesize

    64KB