Analysis

  • max time kernel
    133s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 13:41

General

  • Target

    2e77cdf05ad44ccd326db60a29e5141f366c06b74c7d5efc3d9ce97596afd15e.xlsm

  • Size

    46KB

  • MD5

    bc00302b829243d357d9635c4564d4fd

  • SHA1

    b41fd9c7f89f49f0fae10115b4a708da38ad1682

  • SHA256

    2e77cdf05ad44ccd326db60a29e5141f366c06b74c7d5efc3d9ce97596afd15e

  • SHA512

    98e90f8f9fe683c50e5b87ef2082c8775038e1e90f0c11942cafc8a327abd068fdd5e388000816bf4ac4dfb1525d7fc8b1f7008c23eec42135b3a16d805b4c0a

  • SSDEEP

    768:lF0oGDOevZCwrvtq+9zdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Uh0VU2j3l:j0oGDttT5fTR4Lh1NisFYBc3cr+UqVU+

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://izdehar-alwatan.com/coupled/dqQ6kPEWHFfX/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2e77cdf05ad44ccd326db60a29e5141f366c06b74c7d5efc3d9ce97596afd15e.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3108
    • C:\Windows\SysWow64\regsvr32.exe
      C:\Windows\SysWow64\regsvr32.exe /s ..\enu.ocx
      2⤵
      • Process spawned unexpected child process
      • System Location Discovery: System Language Discovery
      PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\enu.ocx

    Filesize

    7KB

    MD5

    75fe5b0aa0c076b5b1d1b6f159129717

    SHA1

    bd35a21ca5d5faaf1c485dc334030bd6883a6bc5

    SHA256

    b68898ee7a036b6de70e8d81eec261a0c5ae91e7dd369ae344355805640ff89c

    SHA512

    4c6277ddc624bc736c944f6d6b168e5c9e26e82bbde97a0f51c5dd3d2525ab42e9c650dfadb6cdac1a62023fd700f8e02f3ad47fcf21d7f6aa840e9e3394b8f1

  • memory/3108-8-0x00007FFC7D0B0000-0x00007FFC7D0C0000-memory.dmp

    Filesize

    64KB

  • memory/3108-10-0x00007FFCBF990000-0x00007FFCBFB85000-memory.dmp

    Filesize

    2.0MB

  • memory/3108-3-0x00007FFC7FA10000-0x00007FFC7FA20000-memory.dmp

    Filesize

    64KB

  • memory/3108-6-0x00007FFCBF990000-0x00007FFCBFB85000-memory.dmp

    Filesize

    2.0MB

  • memory/3108-5-0x00007FFCBF990000-0x00007FFCBFB85000-memory.dmp

    Filesize

    2.0MB

  • memory/3108-4-0x00007FFC7FA10000-0x00007FFC7FA20000-memory.dmp

    Filesize

    64KB

  • memory/3108-7-0x00007FFC7FA10000-0x00007FFC7FA20000-memory.dmp

    Filesize

    64KB

  • memory/3108-0-0x00007FFC7FA10000-0x00007FFC7FA20000-memory.dmp

    Filesize

    64KB

  • memory/3108-1-0x00007FFC7FA10000-0x00007FFC7FA20000-memory.dmp

    Filesize

    64KB

  • memory/3108-11-0x00007FFCBF990000-0x00007FFCBFB85000-memory.dmp

    Filesize

    2.0MB

  • memory/3108-9-0x00007FFCBF990000-0x00007FFCBFB85000-memory.dmp

    Filesize

    2.0MB

  • memory/3108-13-0x00007FFC7D0B0000-0x00007FFC7D0C0000-memory.dmp

    Filesize

    64KB

  • memory/3108-12-0x00007FFCBF990000-0x00007FFCBFB85000-memory.dmp

    Filesize

    2.0MB

  • memory/3108-2-0x00007FFCBFA2D000-0x00007FFCBFA2E000-memory.dmp

    Filesize

    4KB

  • memory/3108-28-0x00007FFCBFA2D000-0x00007FFCBFA2E000-memory.dmp

    Filesize

    4KB

  • memory/3108-29-0x00007FFCBF990000-0x00007FFCBFB85000-memory.dmp

    Filesize

    2.0MB

  • memory/3108-30-0x00007FFCBF990000-0x00007FFCBFB85000-memory.dmp

    Filesize

    2.0MB