Analysis

  • max time kernel
    133s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 08:42

General

  • Target

    d6981c5e7749ba2b9131b73137d9e4996ba2bebfc891fb4f8eef8f3754a47add.xls

  • Size

    47KB

  • MD5

    1f5223e70178f64721f359e72c61fe0f

  • SHA1

    0cc8c5e341a764294627dd623a2357b533bf4de0

  • SHA256

    d6981c5e7749ba2b9131b73137d9e4996ba2bebfc891fb4f8eef8f3754a47add

  • SHA512

    42be28582c0a22f7bd32664feb5790eb07225520cfaed2baa3350ef912339ad517764b4c6acfbe6e6e5570077cf2075dcb42691c22659adcbcc609462578ee8c

  • SSDEEP

    768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxFa:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gf

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.escueladecinemza.com.ar/_installation/IBlj/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d6981c5e7749ba2b9131b73137d9e4996ba2bebfc891fb4f8eef8f3754a47add.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3188
    • C:\Windows\SYSTEM32\regsvr32.exe
      regsvr32.exe ..\wnrul.ocx
      2⤵
      • Process spawned unexpected child process
      PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    e71b443dd51f974ad30c8248201e2614

    SHA1

    51e7c8625eb4bd9783e5607c9921d3aebdd0950e

    SHA256

    acbfcc5df4f41195aec6a065da24b99143373b3e15ebb9082cba7679fecc419f

    SHA512

    ae0aafacd95030515aa50344cebecf0fa2ea2729e95199deab35843120f10e2af795385332992754d1cdae7f23e7ea47d4e9e17f12d5502f93397527a67dc8a3

  • C:\Users\Admin\wnrul.ocx

    Filesize

    86KB

    MD5

    dfdb83bd3445e3f2ea46b104976c8d43

    SHA1

    78e1237f69e9ba18a68a2c72b6a78179fc01c29b

    SHA256

    76e4a6a2d7ade92678bdc5dd447199ce8f16496d32b36b000726053a89e89443

    SHA512

    6950cad2b1e7f9a20015ee358a44a7def9db96cb395c21a21fece6348e24cf4d307e10091b5f84edeb84368d9f435a82366ed992bcb372e078571a7b97cc328a

  • memory/3188-9-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-3-0x00007FFCA9C50000-0x00007FFCA9C60000-memory.dmp

    Filesize

    64KB

  • memory/3188-4-0x00007FFCA9C50000-0x00007FFCA9C60000-memory.dmp

    Filesize

    64KB

  • memory/3188-6-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-5-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-0-0x00007FFCA9C50000-0x00007FFCA9C60000-memory.dmp

    Filesize

    64KB

  • memory/3188-10-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-8-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-11-0x00007FFCA72F0000-0x00007FFCA7300000-memory.dmp

    Filesize

    64KB

  • memory/3188-7-0x00007FFCA9C50000-0x00007FFCA9C60000-memory.dmp

    Filesize

    64KB

  • memory/3188-13-0x00007FFCA72F0000-0x00007FFCA7300000-memory.dmp

    Filesize

    64KB

  • memory/3188-12-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-14-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-16-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-2-0x00007FFCA9C50000-0x00007FFCA9C60000-memory.dmp

    Filesize

    64KB

  • memory/3188-17-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-19-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-20-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-15-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-18-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-42-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-43-0x00007FFCE9C6D000-0x00007FFCE9C6E000-memory.dmp

    Filesize

    4KB

  • memory/3188-44-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-45-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-46-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-47-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-48-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-49-0x00007FFCE9BD0000-0x00007FFCE9DC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-1-0x00007FFCE9C6D000-0x00007FFCE9C6E000-memory.dmp

    Filesize

    4KB