Analysis

  • max time kernel
    141s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 11:54

General

  • Target

    19963a72ee0a67d13ccde842336f3b6f4a3dfe1c905781b2279f538d1f8d8058.xlsm

  • Size

    50KB

  • MD5

    2cdc95cffe61b54651fcbe51298f830e

  • SHA1

    6ecd6e865c0f367a2a17905e5f83d4f1d6b36463

  • SHA256

    19963a72ee0a67d13ccde842336f3b6f4a3dfe1c905781b2279f538d1f8d8058

  • SHA512

    f2500b6c3addf6180d6cd8579fa1bfe244ffa5fe5266a8198b18b747f4480c6f5e17a505c9995cdba908e241deb46e49b24c0ebe282c3d8d623a6a8e0444e052

  • SSDEEP

    768:mx9D9onkH+lSQHAamYDSmPq9A3Bj9DLC+9uSEcmQThnuG3KA0Zl:mXD9oencDSmSIBlGeuSEcm2h0BZl

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://actividades.laforetlanguages.com/wp-admin/WQNAwrWi77MV8a05fia/

xlm40.dropper

http://consejosdeorlando.com/wp-includes/mMaIlj99Y1C1sYN/

xlm40.dropper

http://aopda.org/wp-content/uploads/KXc3Agu18w/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\19963a72ee0a67d13ccde842336f3b6f4a3dfe1c905781b2279f538d1f8d8058.xlsm
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\SysWow64\regsvr32.exe
      C:\Windows\SysWow64\regsvr32.exe -s ..\en.ocx
      2⤵
      • Process spawned unexpected child process
      • System Location Discovery: System Language Discovery
      PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\en.ocx

    Filesize

    4KB

    MD5

    1ffe1c9e01d36cf549c8faa9d4ac1852

    SHA1

    ba3ea6270b9bbfcf56cbf34c7b0f668a49e4eb8d

    SHA256

    7e693cf72d74a25510ee683c9bd3cd952d4bc3b4aa9d81c46cd5b4a4041afa16

    SHA512

    cb19e2909baaec6ab1e803529435722a15bf84f716f4a3f575fcbf56a481a5c6bea62274f97f1a9250c060099f18f9c6403d0bfdb3dd738f2ab3a62edaca013e

  • memory/2280-1-0x000000007241D000-0x0000000072428000-memory.dmp

    Filesize

    44KB

  • memory/2280-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2280-7-0x000000007241D000-0x0000000072428000-memory.dmp

    Filesize

    44KB