Analysis

  • max time kernel
    133s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 20:17

General

  • Target

    7e6fd44bb791b039e56151106afd5a99de35ad9cb476adfdb1d7f00cb422a1bc.xls

  • Size

    91KB

  • MD5

    60f807360b85cdbb3ff6649ed3c5b843

  • SHA1

    f40c0287dc4823f2003882360724972abc82fceb

  • SHA256

    7e6fd44bb791b039e56151106afd5a99de35ad9cb476adfdb1d7f00cb422a1bc

  • SHA512

    8bd29ebeaab2daf358a0843159655f715e303d0f9fcbed092365582b619f1f8732b76309cfeb6ce10d955e9d7485d5b855109f99761dd7ae1cbb101d524b63ee

  • SSDEEP

    1536:eKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgCbCXuZH4gb4CEn9J4ZGL5:eKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgl

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://helpeve.com/wp-admin/sOdeuF1c4DV2h/

xlm40.dropper

http://christplanet.com/wp-admin/maint/mtlsi/TxsAE7TAAb/

xlm40.dropper

http://www.chawkyfrenn.com/icon/LRWYSefRL7/

xlm40.dropper

http://chist.com/dir-/N5zALqqTmf/

Signatures

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\7e6fd44bb791b039e56151106afd5a99de35ad9cb476adfdb1d7f00cb422a1bc.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx
      2⤵
      • Process spawned unexpected child process
      PID:3392
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx
      2⤵
      • Process spawned unexpected child process
      PID:856
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx
      2⤵
      • Process spawned unexpected child process
      PID:2224
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx
      2⤵
      • Process spawned unexpected child process
      PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    4eeab92e3bfc2a8228f1aa63d07671de

    SHA1

    0a82b34bec4f81b1a228901d48cff867fe661cfb

    SHA256

    2cb74add866e77e04ad6d79fdd84680314657eb992d79e1b51cddaada1cdd7f5

    SHA512

    90464d262c08d0c6d171f551dc67f419645142eebdc5de810ce6a95d855266f10ec428265ffd77c6972eefb964a399646b20556adbfabdb2be7473938bd1e7f6

  • memory/4696-13-0x00007FFB87570000-0x00007FFB87765000-memory.dmp

    Filesize

    2.0MB

  • memory/4696-3-0x00007FFB475F0000-0x00007FFB47600000-memory.dmp

    Filesize

    64KB

  • memory/4696-15-0x00007FFB87570000-0x00007FFB87765000-memory.dmp

    Filesize

    2.0MB

  • memory/4696-14-0x00007FFB44CF0000-0x00007FFB44D00000-memory.dmp

    Filesize

    64KB

  • memory/4696-6-0x00007FFB87570000-0x00007FFB87765000-memory.dmp

    Filesize

    2.0MB

  • memory/4696-7-0x00007FFB87570000-0x00007FFB87765000-memory.dmp

    Filesize

    2.0MB

  • memory/4696-9-0x00007FFB87570000-0x00007FFB87765000-memory.dmp

    Filesize

    2.0MB

  • memory/4696-8-0x00007FFB87570000-0x00007FFB87765000-memory.dmp

    Filesize

    2.0MB

  • memory/4696-10-0x00007FFB44CF0000-0x00007FFB44D00000-memory.dmp

    Filesize

    64KB

  • memory/4696-11-0x00007FFB87570000-0x00007FFB87765000-memory.dmp

    Filesize

    2.0MB

  • memory/4696-12-0x00007FFB87570000-0x00007FFB87765000-memory.dmp

    Filesize

    2.0MB

  • memory/4696-0-0x00007FFB475F0000-0x00007FFB47600000-memory.dmp

    Filesize

    64KB

  • memory/4696-1-0x00007FFB8760D000-0x00007FFB8760E000-memory.dmp

    Filesize

    4KB

  • memory/4696-2-0x00007FFB475F0000-0x00007FFB47600000-memory.dmp

    Filesize

    64KB

  • memory/4696-4-0x00007FFB475F0000-0x00007FFB47600000-memory.dmp

    Filesize

    64KB

  • memory/4696-17-0x00007FFB87570000-0x00007FFB87765000-memory.dmp

    Filesize

    2.0MB

  • memory/4696-21-0x00007FFB87570000-0x00007FFB87765000-memory.dmp

    Filesize

    2.0MB

  • memory/4696-20-0x00007FFB87570000-0x00007FFB87765000-memory.dmp

    Filesize

    2.0MB

  • memory/4696-19-0x00007FFB87570000-0x00007FFB87765000-memory.dmp

    Filesize

    2.0MB

  • memory/4696-18-0x00007FFB87570000-0x00007FFB87765000-memory.dmp

    Filesize

    2.0MB

  • memory/4696-16-0x00007FFB87570000-0x00007FFB87765000-memory.dmp

    Filesize

    2.0MB

  • memory/4696-40-0x00007FFB87570000-0x00007FFB87765000-memory.dmp

    Filesize

    2.0MB

  • memory/4696-41-0x00007FFB8760D000-0x00007FFB8760E000-memory.dmp

    Filesize

    4KB

  • memory/4696-42-0x00007FFB87570000-0x00007FFB87765000-memory.dmp

    Filesize

    2.0MB

  • memory/4696-43-0x00007FFB87570000-0x00007FFB87765000-memory.dmp

    Filesize

    2.0MB

  • memory/4696-5-0x00007FFB475F0000-0x00007FFB47600000-memory.dmp

    Filesize

    64KB