Analysis

  • max time kernel
    133s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 13:42

General

  • Target

    fe8984bc30b68ea5202a8aca988433e0f899c5fe3666a3d05775bd9966d9a3bf.xls

  • Size

    142KB

  • MD5

    089e912e66a8f762318e1a0769bccc8d

  • SHA1

    65ad8c458913bf2d6cef819218618ff92419e7dd

  • SHA256

    fe8984bc30b68ea5202a8aca988433e0f899c5fe3666a3d05775bd9966d9a3bf

  • SHA512

    826ca6be6745425e3cfb77f4627e3e6ea88bb41941f9d9c4479af00de3e87ceca6d40e6af929067ab42acfe8f44b77fd63068e99addbaf6fa2959f19980afe1d

  • SSDEEP

    3072:kfKpbdrHYrMue8q7QPX+5xtekEdi8/dgA/c/mrWmngyYXnMJelsSKThsdskl4WjS:8KpbdrHYrMue8q7QPX+5xtFEdi8/dgAr

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.greenvalleyschool.com/rand_images/1R9sqGnZOFKmQi/

xlm40.dropper

https://www.travellers-autobarnrv.com/new/m9E2A5lQQ2noHkMP/

xlm40.dropper

https://www.campusconindigital.org/moodle311/oWZgMvUttcPDFNn/

xlm40.dropper

https://www.destinocuenca.com/libraries/oHuqdP31/

xlm40.dropper

https://www.defsalabs.com/videos/i1Dde2yzrONF5Nmhs28j/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\fe8984bc30b68ea5202a8aca988433e0f899c5fe3666a3d05775bd9966d9a3bf.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    3KB

    MD5

    3e93c870ffd5b9aefa35046e98e37c2e

    SHA1

    622e58774129a2d2e610e64afc72983d8206c1e4

    SHA256

    43119a0f50a466ca9475a24bf77151132f30218f0f27e6ebec9d810d26b7fb8d

    SHA512

    9ed270d208277c520cc0fd7aea37847624b3acf1bb4cfd9cfc3c95ef99dca0e7b40dd038f3eaf93f15349ccf433f92c845145867d81ae7df8e0187dac2783904

  • memory/4608-11-0x00007FFECCBE0000-0x00007FFECCBF0000-memory.dmp

    Filesize

    64KB

  • memory/4608-14-0x00007FFECCBE0000-0x00007FFECCBF0000-memory.dmp

    Filesize

    64KB

  • memory/4608-5-0x00007FFECF2B0000-0x00007FFECF2C0000-memory.dmp

    Filesize

    64KB

  • memory/4608-2-0x00007FFECF2B0000-0x00007FFECF2C0000-memory.dmp

    Filesize

    64KB

  • memory/4608-0-0x00007FFECF2B0000-0x00007FFECF2C0000-memory.dmp

    Filesize

    64KB

  • memory/4608-9-0x00007FFF0F230000-0x00007FFF0F425000-memory.dmp

    Filesize

    2.0MB

  • memory/4608-10-0x00007FFF0F230000-0x00007FFF0F425000-memory.dmp

    Filesize

    2.0MB

  • memory/4608-8-0x00007FFF0F230000-0x00007FFF0F425000-memory.dmp

    Filesize

    2.0MB

  • memory/4608-7-0x00007FFF0F230000-0x00007FFF0F425000-memory.dmp

    Filesize

    2.0MB

  • memory/4608-15-0x00007FFF0F230000-0x00007FFF0F425000-memory.dmp

    Filesize

    2.0MB

  • memory/4608-4-0x00007FFECF2B0000-0x00007FFECF2C0000-memory.dmp

    Filesize

    64KB

  • memory/4608-6-0x00007FFF0F230000-0x00007FFF0F425000-memory.dmp

    Filesize

    2.0MB

  • memory/4608-3-0x00007FFF0F2CD000-0x00007FFF0F2CE000-memory.dmp

    Filesize

    4KB

  • memory/4608-13-0x00007FFF0F230000-0x00007FFF0F425000-memory.dmp

    Filesize

    2.0MB

  • memory/4608-16-0x00007FFF0F230000-0x00007FFF0F425000-memory.dmp

    Filesize

    2.0MB

  • memory/4608-12-0x00007FFF0F230000-0x00007FFF0F425000-memory.dmp

    Filesize

    2.0MB

  • memory/4608-18-0x00007FFF0F230000-0x00007FFF0F425000-memory.dmp

    Filesize

    2.0MB

  • memory/4608-19-0x00007FFF0F230000-0x00007FFF0F425000-memory.dmp

    Filesize

    2.0MB

  • memory/4608-17-0x00007FFF0F230000-0x00007FFF0F425000-memory.dmp

    Filesize

    2.0MB

  • memory/4608-20-0x00007FFF0F230000-0x00007FFF0F425000-memory.dmp

    Filesize

    2.0MB

  • memory/4608-52-0x00007FFF0F230000-0x00007FFF0F425000-memory.dmp

    Filesize

    2.0MB

  • memory/4608-1-0x00007FFECF2B0000-0x00007FFECF2C0000-memory.dmp

    Filesize

    64KB