Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 19:03

General

  • Target

    18fbb69467fa895a6ae433ca38fa694b54f73d93868894efaca0cb76b441c4b1.xlsm

  • Size

    44KB

  • MD5

    9c7c16e1bc042bc73eaf80fc23e1d5ed

  • SHA1

    1b0b441cc0edf075197997340770d766c2f55115

  • SHA256

    18fbb69467fa895a6ae433ca38fa694b54f73d93868894efaca0cb76b441c4b1

  • SHA512

    987bfda0856933ebfff3a12696c910347fffee0915e5f8810213ae6e51c01dca67e62dd9474760c2f805d883f80a283516e56fae38a9cb727baf56baf035a1d7

  • SSDEEP

    768:S1kICkZNRvmHazrfRmUOcIIGq9hqN6994E3ewNXz8OP6AQPHWZinVd0VhkhB:SKItBvGazLRYIzhqOisNz8OP6Tein0Vo

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.agretto.com/Template/ziasuz5w8pS08Gm2/

xlm40.dropper

http://www.agnesleung.com/raw.backup/j4ry/

xlm40.dropper

https://lifebotl.com/Response/WllkQWM/

xlm40.dropper

https://livejagat.com/h/SjpRvD/

xlm40.dropper

http://185.187.70.35/wordpress_bo/srvoaI2MBFc/

xlm40.dropper

http://188.166.245.112/sipadu/eFi8UiJETZiK1FB/

xlm40.dropper

http://103.85.95.5/v1/uploads/87DtpAEZULSccOn/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\18fbb69467fa895a6ae433ca38fa694b54f73d93868894efaca0cb76b441c4b1.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    2KB

    MD5

    3e0dc0412a26e2128735e59a58551862

    SHA1

    86445ea081f7b3a21b934f8904325a04e20eb4aa

    SHA256

    ceb735ef206a777cc741a708cb5ca28e188ca66ee58759c5639e979497e1bac3

    SHA512

    8089ebeb2be96896996e4a63ea0b629323305c74ef78fa4f67b4636f1e03d7a705fd75ee1fec1e556a4190dd719066e779fa9e66f21c8643ed5ceb474758ef7d

  • memory/1256-12-0x00007FF971A90000-0x00007FF971AA0000-memory.dmp

    Filesize

    64KB

  • memory/1256-7-0x00007FF9B3A70000-0x00007FF9B3C65000-memory.dmp

    Filesize

    2.0MB

  • memory/1256-5-0x00007FF973AF0000-0x00007FF973B00000-memory.dmp

    Filesize

    64KB

  • memory/1256-3-0x00007FF973AF0000-0x00007FF973B00000-memory.dmp

    Filesize

    64KB

  • memory/1256-4-0x00007FF973AF0000-0x00007FF973B00000-memory.dmp

    Filesize

    64KB

  • memory/1256-6-0x00007FF9B3A70000-0x00007FF9B3C65000-memory.dmp

    Filesize

    2.0MB

  • memory/1256-9-0x00007FF9B3A70000-0x00007FF9B3C65000-memory.dmp

    Filesize

    2.0MB

  • memory/1256-13-0x00007FF971A90000-0x00007FF971AA0000-memory.dmp

    Filesize

    64KB

  • memory/1256-1-0x00007FF9B3B0D000-0x00007FF9B3B0E000-memory.dmp

    Filesize

    4KB

  • memory/1256-10-0x00007FF9B3A70000-0x00007FF9B3C65000-memory.dmp

    Filesize

    2.0MB

  • memory/1256-0-0x00007FF973AF0000-0x00007FF973B00000-memory.dmp

    Filesize

    64KB

  • memory/1256-11-0x00007FF9B3A70000-0x00007FF9B3C65000-memory.dmp

    Filesize

    2.0MB

  • memory/1256-8-0x00007FF9B3A70000-0x00007FF9B3C65000-memory.dmp

    Filesize

    2.0MB

  • memory/1256-14-0x00007FF9B3A70000-0x00007FF9B3C65000-memory.dmp

    Filesize

    2.0MB

  • memory/1256-16-0x00007FF9B3A70000-0x00007FF9B3C65000-memory.dmp

    Filesize

    2.0MB

  • memory/1256-18-0x00007FF9B3A70000-0x00007FF9B3C65000-memory.dmp

    Filesize

    2.0MB

  • memory/1256-19-0x00007FF9B3A70000-0x00007FF9B3C65000-memory.dmp

    Filesize

    2.0MB

  • memory/1256-17-0x00007FF9B3A70000-0x00007FF9B3C65000-memory.dmp

    Filesize

    2.0MB

  • memory/1256-15-0x00007FF9B3A70000-0x00007FF9B3C65000-memory.dmp

    Filesize

    2.0MB

  • memory/1256-35-0x00007FF9B3A70000-0x00007FF9B3C65000-memory.dmp

    Filesize

    2.0MB

  • memory/1256-42-0x00007FF9B3B0D000-0x00007FF9B3B0E000-memory.dmp

    Filesize

    4KB

  • memory/1256-43-0x00007FF9B3A70000-0x00007FF9B3C65000-memory.dmp

    Filesize

    2.0MB

  • memory/1256-2-0x00007FF973AF0000-0x00007FF973B00000-memory.dmp

    Filesize

    64KB