Analysis

  • max time kernel
    133s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 11:20

General

  • Target

    a932e919a7f30f5349ee94054f7da0bbeb89ac34defe8ff98e78c442a05c0f1c.xls

  • Size

    126KB

  • MD5

    50085ae84688261e0ff21f78b0fd307b

  • SHA1

    0046f11d817727b4d40bec82e563046d6c1bbb21

  • SHA256

    a932e919a7f30f5349ee94054f7da0bbeb89ac34defe8ff98e78c442a05c0f1c

  • SHA512

    873681da20a5f99d63f190e1c3d4d600bbb2571cfe8603c7c64879d2c651369fd23515dee97fb84b107b8aee4e94ee9fe75c2a116a5c653d7169074743cbfa47

  • SSDEEP

    3072:LsKpbdrHYrMue8q7QPX+5xtekEdi8/dgR3Syz+nzQIceCRlC9:QKpbdrHYrMue8q7QPX+5xtFEdi8/dgRc

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://med.devsrm.com/wp-content/gtOOTHi3zkUbn8U6/

xlm40.dropper

http://izytalab.com/includes/1mafAX0kOa/

xlm40.dropper

https://pcsolutionss.com/zSlT4HR92TiOpw5NM/

xlm40.dropper

http://www.doctorcasenave.com/wp-content/O2Z1HMebIXiHYBBS/

xlm40.dropper

https://wpl28.realtyna.com/wp-content/0b0ny5cPM/

xlm40.dropper

http://www.efcballjoint.com/Template/AxEZPOfAa9/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a932e919a7f30f5349ee94054f7da0bbeb89ac34defe8ff98e78c442a05c0f1c.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    0abc39aeb6ed583cfbeec582839e694d

    SHA1

    996b6101ff712dc3524e5ec0897f40f5c8704f5a

    SHA256

    87774b37d0ae4fe51e33eb94d70be898f755666f93c229b4b9d7e7bb6b10b679

    SHA512

    1942a1434fbe2486d319138962736ccd147f363994c33f7e46c4a0a34ade27e1e3bf703c1d068fe2b728c54715058c3f9837c0065f8d11cc76891c2bb8b4c6e9

  • memory/448-8-0x00007FFA1D970000-0x00007FFA1DB65000-memory.dmp

    Filesize

    2.0MB

  • memory/448-1-0x00007FF9DD9F0000-0x00007FF9DDA00000-memory.dmp

    Filesize

    64KB

  • memory/448-5-0x00007FFA1D970000-0x00007FFA1DB65000-memory.dmp

    Filesize

    2.0MB

  • memory/448-6-0x00007FFA1D970000-0x00007FFA1DB65000-memory.dmp

    Filesize

    2.0MB

  • memory/448-7-0x00007FF9DD9F0000-0x00007FF9DDA00000-memory.dmp

    Filesize

    64KB

  • memory/448-10-0x00007FFA1D970000-0x00007FFA1DB65000-memory.dmp

    Filesize

    2.0MB

  • memory/448-9-0x00007FFA1D970000-0x00007FFA1DB65000-memory.dmp

    Filesize

    2.0MB

  • memory/448-0-0x00007FF9DD9F0000-0x00007FF9DDA00000-memory.dmp

    Filesize

    64KB

  • memory/448-4-0x00007FF9DD9F0000-0x00007FF9DDA00000-memory.dmp

    Filesize

    64KB

  • memory/448-12-0x00007FFA1D970000-0x00007FFA1DB65000-memory.dmp

    Filesize

    2.0MB

  • memory/448-3-0x00007FFA1DA0D000-0x00007FFA1DA0E000-memory.dmp

    Filesize

    4KB

  • memory/448-13-0x00007FFA1D970000-0x00007FFA1DB65000-memory.dmp

    Filesize

    2.0MB

  • memory/448-11-0x00007FFA1D970000-0x00007FFA1DB65000-memory.dmp

    Filesize

    2.0MB

  • memory/448-14-0x00007FF9DB5E0000-0x00007FF9DB5F0000-memory.dmp

    Filesize

    64KB

  • memory/448-15-0x00007FF9DB5E0000-0x00007FF9DB5F0000-memory.dmp

    Filesize

    64KB

  • memory/448-35-0x00007FFA1D970000-0x00007FFA1DB65000-memory.dmp

    Filesize

    2.0MB

  • memory/448-2-0x00007FF9DD9F0000-0x00007FF9DDA00000-memory.dmp

    Filesize

    64KB