Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 19:03

General

  • Target

    d3bdc88768234f44048d4fcbb335b681ebeb937c263827ce751cbbe0d44b680d.xlsm

  • Size

    45KB

  • MD5

    1786bb670abfd760607243d905d828bc

  • SHA1

    611c91e19bb875705a89e33844f548f852f95ea0

  • SHA256

    d3bdc88768234f44048d4fcbb335b681ebeb937c263827ce751cbbe0d44b680d

  • SHA512

    8e35a2168c31485d19a1f5b2d73a58cf6d02e65f386e866b64f4e5b87c0439e56e94f8754c8240df8aa5c993ea6253389731b1c25be2ad2c81f37ca37a8ed160

  • SSDEEP

    768:++oDxDOevZCwrvt8zdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Ud0U2XCnM:BoDxD8tT5fTR4Lh1NisFYBc3cr+U2USz

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://api.zmotpro.com/totalenvironment/logs/8wdgNaq0x/

xlm40.dropper

http://aetoaluminium.com/wp-admin/gkqyKlzXoc/

xlm40.dropper

http://24studypoint.com/wp-admin/3uEUtb/

xlm40.dropper

https://baicc-ct.org/wp-admin/IwhcfC2sdxoToa/

xlm40.dropper

https://mustknew.com/lovecalculator/osDBhPqx0tB1Vtp/

xlm40.dropper

http://kiski023.com/wp-includes/Requests/Cookie/C/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d3bdc88768234f44048d4fcbb335b681ebeb937c263827ce751cbbe0d44b680d.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    2KB

    MD5

    5955a6e2ea17b88e5e3493a7460321e0

    SHA1

    6d565fe5a0202bfbd0ff0432fd8b3cc5a3f75e77

    SHA256

    c5c831b220eb0444c704b0770b0f569207d008fe0d72a202e41f94b7314f96f1

    SHA512

    21e4e39f3c74ee80fd3b5fdc488ec4f63976e2359882017cd795588a167eefb616dbedf45a6a6f5932ab4e883390f654b9a3efe1e2abca9f1450a5e49d932d61

  • memory/384-14-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/384-1-0x00007FFE368B0000-0x00007FFE368C0000-memory.dmp

    Filesize

    64KB

  • memory/384-13-0x00007FFE34000000-0x00007FFE34010000-memory.dmp

    Filesize

    64KB

  • memory/384-2-0x00007FFE368B0000-0x00007FFE368C0000-memory.dmp

    Filesize

    64KB

  • memory/384-5-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/384-6-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/384-8-0x00007FFE368B0000-0x00007FFE368C0000-memory.dmp

    Filesize

    64KB

  • memory/384-7-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/384-9-0x00007FFE34000000-0x00007FFE34010000-memory.dmp

    Filesize

    64KB

  • memory/384-17-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/384-4-0x00007FFE368B0000-0x00007FFE368C0000-memory.dmp

    Filesize

    64KB

  • memory/384-3-0x00007FFE368B0000-0x00007FFE368C0000-memory.dmp

    Filesize

    64KB

  • memory/384-10-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/384-18-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/384-16-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/384-15-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/384-12-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/384-11-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/384-29-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/384-30-0x00007FFE768CD000-0x00007FFE768CE000-memory.dmp

    Filesize

    4KB

  • memory/384-31-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/384-32-0x00007FFE76830000-0x00007FFE76A25000-memory.dmp

    Filesize

    2.0MB

  • memory/384-0-0x00007FFE768CD000-0x00007FFE768CE000-memory.dmp

    Filesize

    4KB