Analysis

  • max time kernel
    133s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 09:43

General

  • Target

    e6feaed63c4a2120c51e24c616d6ce3ccb4e6dc2cd294b12c7ca9669242781df.xls

  • Size

    126KB

  • MD5

    7dd25450386b671d262e17132fd3ff22

  • SHA1

    aae26e98a0edbb0f50c8f65f3d30f5af4f4b9e12

  • SHA256

    e6feaed63c4a2120c51e24c616d6ce3ccb4e6dc2cd294b12c7ca9669242781df

  • SHA512

    bdd6042cfc35f54f5e1214f09ae54a759da0c069dbaaf06288db7b93422897d96dcf433c01f22a943f8665fe5af370f5530f629750922b6c238363eb0fc33b1c

  • SSDEEP

    3072:LsKpbdrHYrMue8q7QPX+5xtekEdi8/dgR3Syz+nzQIceCRlCB:QKpbdrHYrMue8q7QPX+5xtFEdi8/dgRI

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://med.devsrm.com/wp-content/gtOOTHi3zkUbn8U6/

xlm40.dropper

http://izytalab.com/includes/1mafAX0kOa/

xlm40.dropper

https://pcsolutionss.com/zSlT4HR92TiOpw5NM/

xlm40.dropper

http://www.doctorcasenave.com/wp-content/O2Z1HMebIXiHYBBS/

xlm40.dropper

https://wpl28.realtyna.com/wp-content/0b0ny5cPM/

xlm40.dropper

http://www.efcballjoint.com/Template/AxEZPOfAa9/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e6feaed63c4a2120c51e24c616d6ce3ccb4e6dc2cd294b12c7ca9669242781df.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:3196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    3KB

    MD5

    bfe6471ecaf8435306866e873d0a5b6c

    SHA1

    0ffb42e0783fe35f88306e3212e1ce26d53e3adc

    SHA256

    9a7ac7d3c9c3aba2e0b70b852adf706869aa3d5046b372cb7417686e6fbc6c64

    SHA512

    5f00dc05392cc34581312c1a207589713908aa3895512c4c16ccd1e99811ce937eda1dbf4ac65dd2b3dd85addafeb17d6e18d896b21d9c74a5f72ec0166314ee

  • memory/3196-12-0x00007FFC7BDB0000-0x00007FFC7BFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3196-9-0x00007FFC7BDB0000-0x00007FFC7BFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3196-0-0x00007FFC7BE4D000-0x00007FFC7BE4E000-memory.dmp

    Filesize

    4KB

  • memory/3196-4-0x00007FFC7BDB0000-0x00007FFC7BFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3196-6-0x00007FFC3BE30000-0x00007FFC3BE40000-memory.dmp

    Filesize

    64KB

  • memory/3196-5-0x00007FFC7BDB0000-0x00007FFC7BFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3196-8-0x00007FFC3BE30000-0x00007FFC3BE40000-memory.dmp

    Filesize

    64KB

  • memory/3196-15-0x00007FFC7BDB0000-0x00007FFC7BFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3196-1-0x00007FFC3BE30000-0x00007FFC3BE40000-memory.dmp

    Filesize

    64KB

  • memory/3196-10-0x00007FFC39C70000-0x00007FFC39C80000-memory.dmp

    Filesize

    64KB

  • memory/3196-2-0x00007FFC3BE30000-0x00007FFC3BE40000-memory.dmp

    Filesize

    64KB

  • memory/3196-11-0x00007FFC7BDB0000-0x00007FFC7BFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3196-7-0x00007FFC7BDB0000-0x00007FFC7BFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3196-19-0x00007FFC7BDB0000-0x00007FFC7BFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3196-18-0x00007FFC7BDB0000-0x00007FFC7BFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3196-17-0x00007FFC7BDB0000-0x00007FFC7BFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3196-16-0x00007FFC7BDB0000-0x00007FFC7BFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3196-14-0x00007FFC7BDB0000-0x00007FFC7BFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3196-13-0x00007FFC39C70000-0x00007FFC39C80000-memory.dmp

    Filesize

    64KB

  • memory/3196-39-0x00007FFC7BE4D000-0x00007FFC7BE4E000-memory.dmp

    Filesize

    4KB

  • memory/3196-40-0x00007FFC7BDB0000-0x00007FFC7BFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3196-41-0x00007FFC7BDB0000-0x00007FFC7BFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3196-3-0x00007FFC3BE30000-0x00007FFC3BE40000-memory.dmp

    Filesize

    64KB