Analysis

  • max time kernel
    133s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 10:07

General

  • Target

    2367489958bcab574a748c05e26b0e2e525d517f3c69915aec0ba5d25b00e5ae.xls

  • Size

    70KB

  • MD5

    5b51a362e989e0af3e7f2e080d88770f

  • SHA1

    e77c6f647c9b7fdfacd7e9177f46d4dd0ff26982

  • SHA256

    2367489958bcab574a748c05e26b0e2e525d517f3c69915aec0ba5d25b00e5ae

  • SHA512

    c5cf8cab5e9b96dc22e440d977afeb27506f777db1ed850c8335950adc952d9da1744d396b65c4b50463eec6bacc1a42158b60f0cd40996043f8241a01323cdd

  • SSDEEP

    1536:5+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dgZYW/ESKQHS1yXJFaGqEEc:kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg9

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://hepsisifa.com/wp-admin/k/

xlm40.dropper

http://filmmogzivota.rs/SpryAssets/or24hhBl2Ib8704SDO/

xlm40.dropper

http://ecoarch.com.tw/cgi-bin/E/

xlm40.dropper

https://www.clearconstruction.co.uk/scripts/Ev5IXoBvFJkBQ0MZXb/

xlm40.dropper

https://galaxy-catering.com.vn/galxy/Fg1vvhlYJ/

xlm40.dropper

http://www.hangaryapi.com.tr/wp-admin/5n42ncL3nWMbJHwy7/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2367489958bcab574a748c05e26b0e2e525d517f3c69915aec0ba5d25b00e5ae.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:3256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    3KB

    MD5

    6159e4590156b95eeaa822653fc1775a

    SHA1

    dd8748e8f1948fb32bb94e3ac078732d8591eb5b

    SHA256

    4f29bc9a0d6746feede53a965f2aa2c110358871e9a68bca1831d6b56076b20f

    SHA512

    216e2c553602e9a1a316b183a289d2400380f24517abfc8d4e8a58ef69aa768200c2ff7544ca6f1947e8ff9da1b7482e85862c70b566eb8ff750c24a28127234

  • memory/3256-13-0x00007FFFCC090000-0x00007FFFCC285000-memory.dmp

    Filesize

    2.0MB

  • memory/3256-11-0x00007FFFCC090000-0x00007FFFCC285000-memory.dmp

    Filesize

    2.0MB

  • memory/3256-4-0x00007FFF8C110000-0x00007FFF8C120000-memory.dmp

    Filesize

    64KB

  • memory/3256-2-0x00007FFF8C110000-0x00007FFF8C120000-memory.dmp

    Filesize

    64KB

  • memory/3256-5-0x00007FFFCC090000-0x00007FFFCC285000-memory.dmp

    Filesize

    2.0MB

  • memory/3256-8-0x00007FFF8C110000-0x00007FFF8C120000-memory.dmp

    Filesize

    64KB

  • memory/3256-7-0x00007FFFCC090000-0x00007FFFCC285000-memory.dmp

    Filesize

    2.0MB

  • memory/3256-6-0x00007FFFCC090000-0x00007FFFCC285000-memory.dmp

    Filesize

    2.0MB

  • memory/3256-10-0x00007FFFCC090000-0x00007FFFCC285000-memory.dmp

    Filesize

    2.0MB

  • memory/3256-9-0x00007FFFCC090000-0x00007FFFCC285000-memory.dmp

    Filesize

    2.0MB

  • memory/3256-3-0x00007FFF8C110000-0x00007FFF8C120000-memory.dmp

    Filesize

    64KB

  • memory/3256-12-0x00007FFFCC090000-0x00007FFFCC285000-memory.dmp

    Filesize

    2.0MB

  • memory/3256-1-0x00007FFFCC12D000-0x00007FFFCC12E000-memory.dmp

    Filesize

    4KB

  • memory/3256-15-0x00007FFFCC090000-0x00007FFFCC285000-memory.dmp

    Filesize

    2.0MB

  • memory/3256-14-0x00007FFFCC090000-0x00007FFFCC285000-memory.dmp

    Filesize

    2.0MB

  • memory/3256-17-0x00007FFF89D50000-0x00007FFF89D60000-memory.dmp

    Filesize

    64KB

  • memory/3256-16-0x00007FFFCC090000-0x00007FFFCC285000-memory.dmp

    Filesize

    2.0MB

  • memory/3256-19-0x00007FFF89D50000-0x00007FFF89D60000-memory.dmp

    Filesize

    64KB

  • memory/3256-40-0x00007FFFCC090000-0x00007FFFCC285000-memory.dmp

    Filesize

    2.0MB

  • memory/3256-41-0x00007FFFCC12D000-0x00007FFFCC12E000-memory.dmp

    Filesize

    4KB

  • memory/3256-42-0x00007FFFCC090000-0x00007FFFCC285000-memory.dmp

    Filesize

    2.0MB

  • memory/3256-0-0x00007FFF8C110000-0x00007FFF8C120000-memory.dmp

    Filesize

    64KB