Analysis

  • max time kernel
    133s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 08:39

General

  • Target

    024f6086a2047a875c8589f8474030be1b38d8f1b8f902eb466aa1d1c2c5ffa1.xlsm

  • Size

    30KB

  • MD5

    57ae023feb4532e62c44c809f0c8dcff

  • SHA1

    f1e3a9de686d5401476f28a83d789a2195adc5e8

  • SHA256

    024f6086a2047a875c8589f8474030be1b38d8f1b8f902eb466aa1d1c2c5ffa1

  • SHA512

    4e84283a658fa396e18be152db6c859d1d1a36afc6464a5ee206bb3ac734304491b8a45165c3a659446411d62c70811d99f2b756d119f1a54926704d79837338

  • SSDEEP

    384:7842JZPFhNjtOA7icg0SCdiVH2KgUrNU/qWhZOdBNPJM+kqr9eCgh0k5M2E6v:sHFhNZliH2ydFfPdkqstJhE6v

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://henrysfreshroast.com/6cc4ts0bkrOlXq/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\024f6086a2047a875c8589f8474030be1b38d8f1b8f902eb466aa1d1c2c5ffa1.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4204
    • C:\Windows\SysWow64\regsvr32.exe
      C:\Windows\SysWow64\regsvr32.exe -s ..\rfs.dll
      2⤵
      • Process spawned unexpected child process
      • System Location Discovery: System Language Discovery
      PID:352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    46023bfddc30287504b22968d6e5cada

    SHA1

    d1109936ab5eba5cc1dfeed9ccb6d30da7d71600

    SHA256

    2da80bf76d32d43152a84a2c6a45ac9a3486f489b31b8a9a448d291ef9b40d74

    SHA512

    af82659d165a7abf35d042257df8b0f64b3249367ceb648b1af0576ed855de057d630c7b970720d3da94c7f56e7fb990c9fae69e1faef478655f35f17faf288a

  • C:\Users\Admin\rfs.dll

    Filesize

    56KB

    MD5

    d5cbf3235a39c09c9d292dafdf0393a5

    SHA1

    ae109e202e6f0965b47f38ee29b3725800939a9f

    SHA256

    208d15c175407bc56c9e1d1a6e31290cf8c04fe1da742e4ad0dbe06960b7f1dd

    SHA512

    202212aeb1cabe772e05ec7649b83be4a04b68b644a1621993e91e370dc0b9de268ea50f0dab3a74178ecb648d06b5173222d3ed1f0e31d04abeded020b079bd

  • memory/4204-11-0x00007FFD1D390000-0x00007FFD1D3A0000-memory.dmp

    Filesize

    64KB

  • memory/4204-10-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4204-6-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4204-5-0x00007FFD1FC70000-0x00007FFD1FC80000-memory.dmp

    Filesize

    64KB

  • memory/4204-4-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4204-8-0x00007FFD1FC70000-0x00007FFD1FC80000-memory.dmp

    Filesize

    64KB

  • memory/4204-7-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4204-15-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4204-14-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4204-12-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4204-3-0x00007FFD1FC70000-0x00007FFD1FC80000-memory.dmp

    Filesize

    64KB

  • memory/4204-0-0x00007FFD1FC70000-0x00007FFD1FC80000-memory.dmp

    Filesize

    64KB

  • memory/4204-9-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4204-13-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4204-16-0x00007FFD1D390000-0x00007FFD1D3A0000-memory.dmp

    Filesize

    64KB

  • memory/4204-18-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4204-17-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4204-1-0x00007FFD5FC8D000-0x00007FFD5FC8E000-memory.dmp

    Filesize

    4KB

  • memory/4204-40-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4204-41-0x00007FFD5FC8D000-0x00007FFD5FC8E000-memory.dmp

    Filesize

    4KB

  • memory/4204-42-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4204-43-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4204-2-0x00007FFD1FC70000-0x00007FFD1FC80000-memory.dmp

    Filesize

    64KB