Analysis

  • max time kernel
    133s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 13:06

General

  • Target

    c1615fdd2ba03bfa53afae45b40e32c7820a30675728c0d25cffb9b5e5e7fb95.xlsm

  • Size

    209KB

  • MD5

    b189dbf4ea16f81dfb8f3e2c68a19b58

  • SHA1

    f11734a495b1a957b7f0d2c2d5d451e487e5d622

  • SHA256

    c1615fdd2ba03bfa53afae45b40e32c7820a30675728c0d25cffb9b5e5e7fb95

  • SHA512

    35faab9f1c770cdbc318a7522952205b20885627d13df4c3ca58506e08d3d47026fb1fc9f3b454bf05d4ba034a0131e823f59dfa3f11ebb6362d6b8fb3bc772d

  • SSDEEP

    6144:WMyysPlevgOrNeduXWNOYYYYYYYYYYYYYYYYYYYYYY1:NyrPU4xduGO

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.swaong.com/assets/VV4/

xlm40.dropper

http://vulkanvegasbonus.jeunete.com/wp-content/7uAnLq8I/

xlm40.dropper

http://old.liceum9.ru/images/images/NKeRl/

xlm40.dropper

http://arttop100.cn/wp-admin/DvyJPADMPW/

xlm40.dropper

http://peterjacksoncars.com.au/wp-content/sJ/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\c1615fdd2ba03bfa53afae45b40e32c7820a30675728c0d25cffb9b5e5e7fb95.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:3832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    1ff3eac4da354aab6d04c023fc3c316e

    SHA1

    fa44e72c9ceab80f55501e19bfc4425db6ec9cc7

    SHA256

    b381c9555e90cde18b2e06973e902a7acccc5eab06feb3217a32d3fa5b8e4172

    SHA512

    bc97809a6a88c6e957843ab75dd516232b4cfb6f6f8d3bda7ac81ce8c0360aedd3ed252922c3058a6260e8119691b2bc795d175bb49d8071fdf554756a673d1f

  • memory/3832-10-0x00007FFAE7050000-0x00007FFAE7245000-memory.dmp

    Filesize

    2.0MB

  • memory/3832-14-0x00007FFAE7050000-0x00007FFAE7245000-memory.dmp

    Filesize

    2.0MB

  • memory/3832-2-0x00007FFAA70D0000-0x00007FFAA70E0000-memory.dmp

    Filesize

    64KB

  • memory/3832-4-0x00007FFAA70D0000-0x00007FFAA70E0000-memory.dmp

    Filesize

    64KB

  • memory/3832-5-0x00007FFAA70D0000-0x00007FFAA70E0000-memory.dmp

    Filesize

    64KB

  • memory/3832-7-0x00007FFAE7050000-0x00007FFAE7245000-memory.dmp

    Filesize

    2.0MB

  • memory/3832-9-0x00007FFAE7050000-0x00007FFAE7245000-memory.dmp

    Filesize

    2.0MB

  • memory/3832-6-0x00007FFAE7050000-0x00007FFAE7245000-memory.dmp

    Filesize

    2.0MB

  • memory/3832-11-0x00007FFAE7050000-0x00007FFAE7245000-memory.dmp

    Filesize

    2.0MB

  • memory/3832-16-0x00007FFAE7050000-0x00007FFAE7245000-memory.dmp

    Filesize

    2.0MB

  • memory/3832-3-0x00007FFAA70D0000-0x00007FFAA70E0000-memory.dmp

    Filesize

    64KB

  • memory/3832-8-0x00007FFAE7050000-0x00007FFAE7245000-memory.dmp

    Filesize

    2.0MB

  • memory/3832-1-0x00007FFAE70ED000-0x00007FFAE70EE000-memory.dmp

    Filesize

    4KB

  • memory/3832-17-0x00007FFAE7050000-0x00007FFAE7245000-memory.dmp

    Filesize

    2.0MB

  • memory/3832-13-0x00007FFAE7050000-0x00007FFAE7245000-memory.dmp

    Filesize

    2.0MB

  • memory/3832-18-0x00007FFAA4F20000-0x00007FFAA4F30000-memory.dmp

    Filesize

    64KB

  • memory/3832-12-0x00007FFAA4F20000-0x00007FFAA4F30000-memory.dmp

    Filesize

    64KB

  • memory/3832-15-0x00007FFAE7050000-0x00007FFAE7245000-memory.dmp

    Filesize

    2.0MB

  • memory/3832-28-0x00007FFAE7050000-0x00007FFAE7245000-memory.dmp

    Filesize

    2.0MB

  • memory/3832-29-0x00007FFAE70ED000-0x00007FFAE70EE000-memory.dmp

    Filesize

    4KB

  • memory/3832-30-0x00007FFAE7050000-0x00007FFAE7245000-memory.dmp

    Filesize

    2.0MB

  • memory/3832-0-0x00007FFAA70D0000-0x00007FFAA70E0000-memory.dmp

    Filesize

    64KB