Analysis

  • max time kernel
    133s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 10:35

General

  • Target

    4639c3832713a5caee4b6757c892cfb7e70bb2f29d85a0209e76e95f9d0efd6e.xlsm

  • Size

    46KB

  • MD5

    ae0a98b322192fed9025f339bf201033

  • SHA1

    5e13a6b8a5053c51060ac662a661f4c7dfaa508d

  • SHA256

    4639c3832713a5caee4b6757c892cfb7e70bb2f29d85a0209e76e95f9d0efd6e

  • SHA512

    86dd221444c0bbcddf8a2b9ce68d6cc92b72f6a4db6b69fceb9eabcec94392c280623ff3245271552a9192f197ba2c828b8c105f552a55f82dee24da5acd007d

  • SSDEEP

    768:Xb1o2ODOevZCwrvtbzdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Uh0VfPst2:Xb1o1D/tT5fTR4Lh1NisFYBc3cr+UqVX

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://splitmon.com/mdbt/I3kw1HNHPchicDI/

xlm40.dropper

http://www.dancesportnation.com/wp-content/4Ac8YZEIIV/

xlm40.dropper

http://www.beholdpublications.com/home/Bnn6j/

xlm40.dropper

http://spbtorg.com/vzgsz/uq4fosqbjwAM5rnw5m/

xlm40.dropper

http://explorationit.com/screwing/KxxgEpfAvBsXjmQ/

xlm40.dropper

http://vipwatchpay.com/Isoetales/0LYzkIW/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4639c3832713a5caee4b6757c892cfb7e70bb2f29d85a0209e76e95f9d0efd6e.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    3KB

    MD5

    16d7350618fda1e28639ead7dacc1004

    SHA1

    0a252c965d1aab3c8a3bbeb6838da1926e899325

    SHA256

    51d7708cdce02cdcf2025fd8256c34211402c34e49dc2e9d0e22be35e4b547be

    SHA512

    a35cc8542a19b390e0f77773e695edf1784446e72f37463691d3eed57776577476c11901c452a14af8e9821c00851816916adfbac1e12cd5cc6780eacc7c3d35

  • memory/1488-10-0x00007FFAE0490000-0x00007FFAE0685000-memory.dmp

    Filesize

    2.0MB

  • memory/1488-11-0x00007FFAE0490000-0x00007FFAE0685000-memory.dmp

    Filesize

    2.0MB

  • memory/1488-1-0x00007FFAA0510000-0x00007FFAA0520000-memory.dmp

    Filesize

    64KB

  • memory/1488-5-0x00007FFAE0490000-0x00007FFAE0685000-memory.dmp

    Filesize

    2.0MB

  • memory/1488-6-0x00007FFAE0490000-0x00007FFAE0685000-memory.dmp

    Filesize

    2.0MB

  • memory/1488-8-0x00007FFAE0490000-0x00007FFAE0685000-memory.dmp

    Filesize

    2.0MB

  • memory/1488-7-0x00007FFAA0510000-0x00007FFAA0520000-memory.dmp

    Filesize

    64KB

  • memory/1488-4-0x00007FFAA0510000-0x00007FFAA0520000-memory.dmp

    Filesize

    64KB

  • memory/1488-12-0x00007FFAE0490000-0x00007FFAE0685000-memory.dmp

    Filesize

    2.0MB

  • memory/1488-13-0x00007FFAE0490000-0x00007FFAE0685000-memory.dmp

    Filesize

    2.0MB

  • memory/1488-3-0x00007FFAE052D000-0x00007FFAE052E000-memory.dmp

    Filesize

    4KB

  • memory/1488-9-0x00007FFAE0490000-0x00007FFAE0685000-memory.dmp

    Filesize

    2.0MB

  • memory/1488-0-0x00007FFAA0510000-0x00007FFAA0520000-memory.dmp

    Filesize

    64KB

  • memory/1488-14-0x00007FFA9DE90000-0x00007FFA9DEA0000-memory.dmp

    Filesize

    64KB

  • memory/1488-15-0x00007FFA9DE90000-0x00007FFA9DEA0000-memory.dmp

    Filesize

    64KB

  • memory/1488-17-0x00007FFAE0490000-0x00007FFAE0685000-memory.dmp

    Filesize

    2.0MB

  • memory/1488-16-0x00007FFAE0490000-0x00007FFAE0685000-memory.dmp

    Filesize

    2.0MB

  • memory/1488-20-0x00007FFAE0490000-0x00007FFAE0685000-memory.dmp

    Filesize

    2.0MB

  • memory/1488-19-0x00007FFAE0490000-0x00007FFAE0685000-memory.dmp

    Filesize

    2.0MB

  • memory/1488-18-0x00007FFAE0490000-0x00007FFAE0685000-memory.dmp

    Filesize

    2.0MB

  • memory/1488-38-0x00007FFAE0490000-0x00007FFAE0685000-memory.dmp

    Filesize

    2.0MB

  • memory/1488-2-0x00007FFAA0510000-0x00007FFAA0520000-memory.dmp

    Filesize

    64KB