Analysis

  • max time kernel
    134s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 19:09

General

  • Target

    7a37316960d73bef2321dbd74a2e5a5ccc7eb6c6f245fb50d32e371b6fb04bc8.xls

  • Size

    40KB

  • MD5

    d1245f3fb9af8d7ac5fcd6c162bdc2f2

  • SHA1

    3a98e5a18838576ad8c0eccdd5c95d1456082998

  • SHA256

    7a37316960d73bef2321dbd74a2e5a5ccc7eb6c6f245fb50d32e371b6fb04bc8

  • SHA512

    efbb7d5e67542b26cd2cabfcdd9eaff048644ee90cc9fd9e8e30ac0c8e58db7f3d61a3f0ba6c97e0c0b89fd842d21dce195945f5e6891901f9d98e3526e8545e

  • SSDEEP

    768:pkZKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgAdCBn9kC+xbqc6q+otrvEVLcAo:p+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/d5

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.itesmeitic.com/term/IFjx5ElE0ldr8wDDHjub/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\7a37316960d73bef2321dbd74a2e5a5ccc7eb6c6f245fb50d32e371b6fb04bc8.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe ..\wurod.ocx
      2⤵
      • Process spawned unexpected child process
      PID:4948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    4ce68d09742ee6e694c377b7c693b6e2

    SHA1

    3cd0673f88f0c10bfb944e4e2f6a2eb4464ccb27

    SHA256

    54e2bfa43446de69962d3067f795c7cf7484f52ab21aa7dadb5ea7d54c089dc7

    SHA512

    49f11f034fdf497c60ab01ac72c61872cb953f1fe7f2eaf50f16e5636b3e82426e2837c655b8e5095f72e72d028ef39f6aa42a7d3852cf9a9db63b1ae41f0d04

  • C:\Users\Admin\wurod.ocx

    Filesize

    62B

    MD5

    ec66f7f0da293c14d1ec051ab12dc4b2

    SHA1

    cc7c57f49917f5b76034d36ca181f9b21c223359

    SHA256

    46bc6e73a86ffb0bd0a01cdca281c4c18dde6ceae509a70621e91d10e128f9f0

    SHA512

    56a145f571243a8db4eb28752f45ecf1e89f7db1f3bd387aef5f54c262db2361649e1e0fdd06910b5ab63a91dc2fdf9587ca494e56233cdb30fee2b92a9856f3

  • memory/2252-13-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-2-0x00007FFBD91B0000-0x00007FFBD91C0000-memory.dmp

    Filesize

    64KB

  • memory/2252-1-0x00007FFC191CD000-0x00007FFC191CE000-memory.dmp

    Filesize

    4KB

  • memory/2252-0-0x00007FFBD91B0000-0x00007FFBD91C0000-memory.dmp

    Filesize

    64KB

  • memory/2252-9-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-12-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-11-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-15-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-14-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-8-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-5-0x00007FFBD91B0000-0x00007FFBD91C0000-memory.dmp

    Filesize

    64KB

  • memory/2252-4-0x00007FFBD91B0000-0x00007FFBD91C0000-memory.dmp

    Filesize

    64KB

  • memory/2252-16-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-7-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-6-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-17-0x00007FFBD6F70000-0x00007FFBD6F80000-memory.dmp

    Filesize

    64KB

  • memory/2252-18-0x00007FFBD6F70000-0x00007FFBD6F80000-memory.dmp

    Filesize

    64KB

  • memory/2252-3-0x00007FFBD91B0000-0x00007FFBD91C0000-memory.dmp

    Filesize

    64KB

  • memory/2252-36-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-37-0x00007FFC191CD000-0x00007FFC191CE000-memory.dmp

    Filesize

    4KB

  • memory/2252-38-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-39-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-10-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB