Analysis

  • max time kernel
    133s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 21:05

General

  • Target

    724d1bdcf9e517c2055105448044b7c8427dd4b6bd9d3f626c1b8c284c797b86.xls

  • Size

    91KB

  • MD5

    0a20ad996d7c9d8f811a0a3f74b74c77

  • SHA1

    4402fbe9a6ef86ac86a90767a7a61acc6e09012f

  • SHA256

    724d1bdcf9e517c2055105448044b7c8427dd4b6bd9d3f626c1b8c284c797b86

  • SHA512

    f82da7d607e5fc58f49a53006a9e8dd21cab074a3771fe3ac839478ab9cb207e20435c0d77ec8a3ad850a5cae8ec59283a6f70491426eaf11d6372d7a7c60f1b

  • SSDEEP

    1536:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEbCXuZH4gb4CEn9J4ZcEM:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.muyehuayi.com/cmp/8asA99KPsyA/v6lUsWbLen/

xlm40.dropper

http://concivilpa.com.py/wp-admin/i3CQu9dzDrMW/

xlm40.dropper

https://wijsneusmedia.nl/cgi-bin/kFB/

xlm40.dropper

http://www.angloextrema.com.br/assets/oEt1yYckHKlnNIq/

Signatures

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\724d1bdcf9e517c2055105448044b7c8427dd4b6bd9d3f626c1b8c284c797b86.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx
      2⤵
      • Process spawned unexpected child process
      PID:348
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx
      2⤵
      • Process spawned unexpected child process
      PID:32
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx
      2⤵
      • Process spawned unexpected child process
      PID:868
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx
      2⤵
      • Process spawned unexpected child process
      PID:5052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    b1a8e67756797ec7f96113751306f70c

    SHA1

    ec8b7dfc3da5ec991d7f488dfc634d8e7d7badf7

    SHA256

    57ce8e436a5ef1a79ddaf8afd9c27c403bda1e0335b2a5b2b92ad507d47cbd04

    SHA512

    f84b5238de60549aabe5571d41b69f0954e656320b003539ad4851a7d0775b4c66ab507129a2e52e80c15a1530f6424168e7f07d8ed0fea87de79b1a0e04371e

  • memory/780-16-0x00007FF988270000-0x00007FF988465000-memory.dmp

    Filesize

    2.0MB

  • memory/780-6-0x00007FF988270000-0x00007FF988465000-memory.dmp

    Filesize

    2.0MB

  • memory/780-7-0x00007FF988270000-0x00007FF988465000-memory.dmp

    Filesize

    2.0MB

  • memory/780-18-0x00007FF988270000-0x00007FF988465000-memory.dmp

    Filesize

    2.0MB

  • memory/780-8-0x00007FF988270000-0x00007FF988465000-memory.dmp

    Filesize

    2.0MB

  • memory/780-11-0x00007FF988270000-0x00007FF988465000-memory.dmp

    Filesize

    2.0MB

  • memory/780-12-0x00007FF988270000-0x00007FF988465000-memory.dmp

    Filesize

    2.0MB

  • memory/780-13-0x00007FF988270000-0x00007FF988465000-memory.dmp

    Filesize

    2.0MB

  • memory/780-14-0x00007FF946150000-0x00007FF946160000-memory.dmp

    Filesize

    64KB

  • memory/780-10-0x00007FF988270000-0x00007FF988465000-memory.dmp

    Filesize

    2.0MB

  • memory/780-15-0x00007FF946150000-0x00007FF946160000-memory.dmp

    Filesize

    64KB

  • memory/780-1-0x00007FF98830D000-0x00007FF98830E000-memory.dmp

    Filesize

    4KB

  • memory/780-3-0x00007FF9482F0000-0x00007FF948300000-memory.dmp

    Filesize

    64KB

  • memory/780-4-0x00007FF9482F0000-0x00007FF948300000-memory.dmp

    Filesize

    64KB

  • memory/780-5-0x00007FF9482F0000-0x00007FF948300000-memory.dmp

    Filesize

    64KB

  • memory/780-20-0x00007FF988270000-0x00007FF988465000-memory.dmp

    Filesize

    2.0MB

  • memory/780-19-0x00007FF988270000-0x00007FF988465000-memory.dmp

    Filesize

    2.0MB

  • memory/780-17-0x00007FF988270000-0x00007FF988465000-memory.dmp

    Filesize

    2.0MB

  • memory/780-2-0x00007FF9482F0000-0x00007FF948300000-memory.dmp

    Filesize

    64KB

  • memory/780-21-0x00007FF988270000-0x00007FF988465000-memory.dmp

    Filesize

    2.0MB

  • memory/780-0-0x00007FF9482F0000-0x00007FF948300000-memory.dmp

    Filesize

    64KB

  • memory/780-37-0x00007FF988270000-0x00007FF988465000-memory.dmp

    Filesize

    2.0MB

  • memory/780-38-0x00007FF98830D000-0x00007FF98830E000-memory.dmp

    Filesize

    4KB

  • memory/780-39-0x00007FF988270000-0x00007FF988465000-memory.dmp

    Filesize

    2.0MB

  • memory/780-43-0x00007FF988270000-0x00007FF988465000-memory.dmp

    Filesize

    2.0MB

  • memory/780-9-0x00007FF988270000-0x00007FF988465000-memory.dmp

    Filesize

    2.0MB