Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 10:07

General

  • Target

    2367489958bcab574a748c05e26b0e2e525d517f3c69915aec0ba5d25b00e5ae.xls

  • Size

    70KB

  • MD5

    5b51a362e989e0af3e7f2e080d88770f

  • SHA1

    e77c6f647c9b7fdfacd7e9177f46d4dd0ff26982

  • SHA256

    2367489958bcab574a748c05e26b0e2e525d517f3c69915aec0ba5d25b00e5ae

  • SHA512

    c5cf8cab5e9b96dc22e440d977afeb27506f777db1ed850c8335950adc952d9da1744d396b65c4b50463eec6bacc1a42158b60f0cd40996043f8241a01323cdd

  • SSDEEP

    1536:5+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dgZYW/ESKQHS1yXJFaGqEEc:kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg9

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://hepsisifa.com/wp-admin/k/

xlm40.dropper

http://filmmogzivota.rs/SpryAssets/or24hhBl2Ib8704SDO/

xlm40.dropper

http://ecoarch.com.tw/cgi-bin/E/

xlm40.dropper

https://www.clearconstruction.co.uk/scripts/Ev5IXoBvFJkBQ0MZXb/

xlm40.dropper

https://galaxy-catering.com.vn/galxy/Fg1vvhlYJ/

xlm40.dropper

http://www.hangaryapi.com.tr/wp-admin/5n42ncL3nWMbJHwy7/

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\2367489958bcab574a748c05e26b0e2e525d517f3c69915aec0ba5d25b00e5ae.xls
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3064-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/3064-1-0x0000000071FCD000-0x0000000071FD8000-memory.dmp

    Filesize

    44KB

  • memory/3064-2-0x0000000071FCD000-0x0000000071FD8000-memory.dmp

    Filesize

    44KB