Analysis

  • max time kernel
    133s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 12:39

General

  • Target

    900554ea88fc0a7e0130660897ce1c8112b68a09ea4c382edb350c63cb29686b.xls

  • Size

    101KB

  • MD5

    9ec6cbc4dfce17fc65e8041bd72d8807

  • SHA1

    6319b10b1144582b5e95fbd5a99bde74ca61e4af

  • SHA256

    900554ea88fc0a7e0130660897ce1c8112b68a09ea4c382edb350c63cb29686b

  • SHA512

    5ea1a50eae000bdd40904d0c98ce135533d3433b25ce1382650b43be56779e259ffcf67ad2a6741d7e617fe5397a64fa7ca888a9c2fdda431cd5d3b8730e5b81

  • SSDEEP

    3072:RKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+/bOZzbqkn6RND9fxuss8OG:RKpb8rGYrMPe3q7Q0XV5xtuE8vG8UM+/

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://decorusfinancial.com/wp-content/7dODakeZZ83fJi/

xlm40.dropper

https://e-kinerja.ntbprov.go.id/aset/sAeaEvaSxGhvnsuFE/

xlm40.dropper

http://facts-jo.com/init/jLQY2FpesnIGi0qHqz/

xlm40.dropper

http://fashionbyprincessmelodicaah.com/4185PINT/jwh2cwjFHLZL/

xlm40.dropper

http://easiercommunications.com/wp-content/yqNxi8IKbRIt7akB/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\900554ea88fc0a7e0130660897ce1c8112b68a09ea4c382edb350c63cb29686b.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:3752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    a95667e143775fbba4298ee1dac2b48c

    SHA1

    c70deeb9fbf39c800991b1362057b2f35cb81469

    SHA256

    2381c138d31b92548ba6d28e2191762653db6325e40743a9158630a0e171cfe0

    SHA512

    01abd9a885926bc1c01defe679c633d91eab6d783dc45febc8e29ac34409159e42b327fa055b6779542b75eaef898b50405d8dc7c18633a38c0015a2050215f9

  • memory/3752-12-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-41-0x00007FFCE06AD000-0x00007FFCE06AE000-memory.dmp

    Filesize

    4KB

  • memory/3752-5-0x00007FFCA0690000-0x00007FFCA06A0000-memory.dmp

    Filesize

    64KB

  • memory/3752-6-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-9-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-8-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-10-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-7-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-3-0x00007FFCA0690000-0x00007FFCA06A0000-memory.dmp

    Filesize

    64KB

  • memory/3752-2-0x00007FFCA0690000-0x00007FFCA06A0000-memory.dmp

    Filesize

    64KB

  • memory/3752-11-0x00007FFC9DFB0000-0x00007FFC9DFC0000-memory.dmp

    Filesize

    64KB

  • memory/3752-1-0x00007FFCE06AD000-0x00007FFCE06AE000-memory.dmp

    Filesize

    4KB

  • memory/3752-4-0x00007FFCA0690000-0x00007FFCA06A0000-memory.dmp

    Filesize

    64KB

  • memory/3752-13-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-14-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-17-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-20-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-19-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-18-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-16-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-37-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-15-0x00007FFC9DFB0000-0x00007FFC9DFC0000-memory.dmp

    Filesize

    64KB

  • memory/3752-42-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-52-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-0-0x00007FFCA0690000-0x00007FFCA06A0000-memory.dmp

    Filesize

    64KB