Analysis

  • max time kernel
    133s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 12:34

General

  • Target

    4b60f16267cccc012996728c348d161d8bf6fcfa0f4a0ec5e4ac7f66e4561751.xlsm

  • Size

    102KB

  • MD5

    2e99b5266f0e8c18d6f467a91173f79f

  • SHA1

    5754d735aa4b2630224f825dd80aa0d08f5ec827

  • SHA256

    4b60f16267cccc012996728c348d161d8bf6fcfa0f4a0ec5e4ac7f66e4561751

  • SHA512

    27eb43b1410c90c1fc80c4d396d23363827e0f4359cfc8dbfd59f36cd06b93b470f4fe20d16f31aa51c4927561003465aa3884fa10c93027e2a0ba9cebb4b9b4

  • SSDEEP

    1536:6HpqqHip20B+axURtKckrr9qZGrhD1GW+wZk4lHpuaI4qMCh:MBHiHHxutKckrpqZGh+wrlJuaIjV

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://luoicauthang.com/css/m6RaglUnYVXJ7mw2W/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4b60f16267cccc012996728c348d161d8bf6fcfa0f4a0ec5e4ac7f66e4561751.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Windows\SysWow64\rundll32.exe
      C:\Windows\SysWow64\rundll32.exe ..\bestb.ocx,D"&"l"&"l"&"R"&"eg"&"i"&"s"&"t"&"e"&"rS"&"e"&"rver
      2⤵
      • Process spawned unexpected child process
      • System Location Discovery: System Language Discovery
      PID:5028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    14072a475717656d436b57cfb498a18b

    SHA1

    4b0c345bac4d1dc684436186bb3e5a0f19963b5e

    SHA256

    8b73e1d059b282599e39b854ad61410f396448debbb7f1f58e6b19b38864da71

    SHA512

    8ce6be738a3a626ddfd238172ba6250d23751698c805c51a98bf6031f9e5e6a086a127866eaf2d1ab8ebd1eef92c196c0e2fc312b5aa3f393001d56e4d2922fd

  • C:\Users\Admin\bestb.ocx

    Filesize

    24KB

    MD5

    2f977d5872cb7eb7a560eb0b0a540baf

    SHA1

    c8e2d0134632884763d3922bdae5d1245207259c

    SHA256

    3b8a21beff2c38dad1d682f7876cf1233fd7a8325b99292400828b6d9c4b3c38

    SHA512

    15f89220c95de08df80eeabf3acbfed6490e43df568d3869bf39677819ff017f68a64c986c2bd86aa39b13ad96317f84fcdb6a51e2f1bdb54c3992862b309b69

  • memory/1404-13-0x00007FFD1D390000-0x00007FFD1D3A0000-memory.dmp

    Filesize

    64KB

  • memory/1404-11-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-6-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-5-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-4-0x00007FFD1FC70000-0x00007FFD1FC80000-memory.dmp

    Filesize

    64KB

  • memory/1404-8-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-7-0x00007FFD1FC70000-0x00007FFD1FC80000-memory.dmp

    Filesize

    64KB

  • memory/1404-10-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-12-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-14-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-1-0x00007FFD1FC70000-0x00007FFD1FC80000-memory.dmp

    Filesize

    64KB

  • memory/1404-0-0x00007FFD1FC70000-0x00007FFD1FC80000-memory.dmp

    Filesize

    64KB

  • memory/1404-9-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-15-0x00007FFD1D390000-0x00007FFD1D3A0000-memory.dmp

    Filesize

    64KB

  • memory/1404-17-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-19-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-20-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-18-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-16-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-2-0x00007FFD1FC70000-0x00007FFD1FC80000-memory.dmp

    Filesize

    64KB

  • memory/1404-36-0x00007FFD5FBF0000-0x00007FFD5FDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-3-0x00007FFD5FC8D000-0x00007FFD5FC8E000-memory.dmp

    Filesize

    4KB