Analysis

  • max time kernel
    133s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 13:22

General

  • Target

    29fbeba317c077ced0b4499ecb27bb60018fef203e3f91f5994fcaed428bc81b.xls

  • Size

    142KB

  • MD5

    e787b425215fc5be9ef579d4836a1d33

  • SHA1

    3279ad077f74f7002eb297c0cfefdc632f064b1b

  • SHA256

    29fbeba317c077ced0b4499ecb27bb60018fef203e3f91f5994fcaed428bc81b

  • SHA512

    88deba27c664ddf70b2744dc7270a0c245d6299a15abe7a4bd620dddf4b769509616c36bb57d3e5b40c5e427ce147e93703d15628b4c3d02e44d58f070946942

  • SSDEEP

    3072:3aKpbdrHYrMue8q7QPX+5xtekE86W8UM+g/c/mrWmngyYXnMJelsSKThsdskl4WF:qKpbdrHYrMue8q7QPX+5xtFE86W8UM+J

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://deardarcy.com/css/NHGyTTCK/

xlm40.dropper

https://debroadlink.com/brochure/D/

xlm40.dropper

https://dijicom.net/error/5xzXdD/

xlm40.dropper

https://ftp.compribe.com/wp-admin/Pzgr8qexn/

xlm40.dropper

https://hranenie.pereezd-24.com/1/uEibuIqhZi4oua/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\29fbeba317c077ced0b4499ecb27bb60018fef203e3f91f5994fcaed428bc81b.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    6d052224eb36db0a185d3c4134ea8af5

    SHA1

    9c9d4891713300848e8ddcdc9330b6799ca16b4d

    SHA256

    d3d08709cd4650fb018509289efed63418f82c5ff899f33cef6b6de0e19869ca

    SHA512

    4770199673bacb3c323c8e6f6ada4ed54c3db0c3519a75e4570e6669736f3eab9c544c5fb6e892cd0eb19d8b2ddfa4e38df4a8d76a26cfe6af1ef11e9efb2001

  • memory/1504-7-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-11-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-3-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp

    Filesize

    64KB

  • memory/1504-4-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp

    Filesize

    64KB

  • memory/1504-5-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp

    Filesize

    64KB

  • memory/1504-9-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-10-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-14-0x00007FFC5B910000-0x00007FFC5B920000-memory.dmp

    Filesize

    64KB

  • memory/1504-0-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp

    Filesize

    64KB

  • memory/1504-13-0x00007FFC5B910000-0x00007FFC5B920000-memory.dmp

    Filesize

    64KB

  • memory/1504-2-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp

    Filesize

    64KB

  • memory/1504-8-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-12-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-6-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-18-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-17-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-16-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-15-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-34-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-39-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-38-0x00007FFC9E28D000-0x00007FFC9E28E000-memory.dmp

    Filesize

    4KB

  • memory/1504-43-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-1-0x00007FFC9E28D000-0x00007FFC9E28E000-memory.dmp

    Filesize

    4KB