Analysis

  • max time kernel
    133s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 00:43

General

  • Target

    967cba123e907af0156ec273b3251fe6a3a806bf8796824430be2a6933bb4f98.xlsm

  • Size

    73KB

  • MD5

    d89b1c00aafff3161434c1893cb946c5

  • SHA1

    c3f7289563e61f2dda763764740102b75edef190

  • SHA256

    967cba123e907af0156ec273b3251fe6a3a806bf8796824430be2a6933bb4f98

  • SHA512

    66ba738ed25bf5b2920d264d62a60fa234bfbe11f7c623739a051f04920ecdc3ee9c3c496a1105ea58ece55c1a25410ec9c45fd1c45b9469da145bf140fdd70c

  • SSDEEP

    1536:z1iiXSto0NSVUINwtzLT7OMuuAe0yOcfpXZGsMlVzc:z1iiCtzSmICpH7OZuvZGsMU

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://andjello.net/wp-includes/O74XNLzsodp/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\967cba123e907af0156ec273b3251fe6a3a806bf8796824430be2a6933bb4f98.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Windows\SysWow64\regsvr32.exe
      C:\Windows\SysWow64\regsvr32.exe -s ..\ujg.dll
      2⤵
      • Process spawned unexpected child process
      • System Location Discovery: System Language Discovery
      PID:1824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    efcca2f434383149ad875a21624030d2

    SHA1

    65badb4ed8039ad673f0f1128ec7f80171b1ace7

    SHA256

    32cb4fc1f41947c2219ec0470b8a9fd24175f4de73faf22153f64b6930894825

    SHA512

    472f473fad1679776363e7bbe0bfaf7a5a386beb0b41db423a70852610e9a48ba44efe8acec9293be20712db534e6081607e9f88ebb267cacd0b526db2edf739

  • C:\Users\Admin\ujg.dll

    Filesize

    48KB

    MD5

    c83a52004ccceb05023b842009c4830a

    SHA1

    39b0afedccccada0c97eff45b2efe33f797f8685

    SHA256

    8b4c27e432a2f74202ec1bbb81c3e8a080726207d4592c9882253f8f6d692c2a

    SHA512

    ad436cad11321799de4f37f72bd6c76bee9256b2d2b2fd3d1bdf44bf113903f21c8700283f84442b705d954817e115199167dc0b45da0e23c154294155970245

  • memory/1400-13-0x00007FFFC1010000-0x00007FFFC1205000-memory.dmp

    Filesize

    2.0MB

  • memory/1400-1-0x00007FFFC10AD000-0x00007FFFC10AE000-memory.dmp

    Filesize

    4KB

  • memory/1400-2-0x00007FFF81090000-0x00007FFF810A0000-memory.dmp

    Filesize

    64KB

  • memory/1400-5-0x00007FFF81090000-0x00007FFF810A0000-memory.dmp

    Filesize

    64KB

  • memory/1400-8-0x00007FFFC1010000-0x00007FFFC1205000-memory.dmp

    Filesize

    2.0MB

  • memory/1400-7-0x00007FFFC1010000-0x00007FFFC1205000-memory.dmp

    Filesize

    2.0MB

  • memory/1400-6-0x00007FFFC1010000-0x00007FFFC1205000-memory.dmp

    Filesize

    2.0MB

  • memory/1400-11-0x00007FFFC1010000-0x00007FFFC1205000-memory.dmp

    Filesize

    2.0MB

  • memory/1400-10-0x00007FFFC1010000-0x00007FFFC1205000-memory.dmp

    Filesize

    2.0MB

  • memory/1400-14-0x00007FFF7EEA0000-0x00007FFF7EEB0000-memory.dmp

    Filesize

    64KB

  • memory/1400-4-0x00007FFF81090000-0x00007FFF810A0000-memory.dmp

    Filesize

    64KB

  • memory/1400-3-0x00007FFF81090000-0x00007FFF810A0000-memory.dmp

    Filesize

    64KB

  • memory/1400-9-0x00007FFFC1010000-0x00007FFFC1205000-memory.dmp

    Filesize

    2.0MB

  • memory/1400-15-0x00007FFF7EEA0000-0x00007FFF7EEB0000-memory.dmp

    Filesize

    64KB

  • memory/1400-16-0x00007FFFC1010000-0x00007FFFC1205000-memory.dmp

    Filesize

    2.0MB

  • memory/1400-18-0x00007FFFC1010000-0x00007FFFC1205000-memory.dmp

    Filesize

    2.0MB

  • memory/1400-17-0x00007FFFC1010000-0x00007FFFC1205000-memory.dmp

    Filesize

    2.0MB

  • memory/1400-0-0x00007FFF81090000-0x00007FFF810A0000-memory.dmp

    Filesize

    64KB

  • memory/1400-39-0x00007FFFC1010000-0x00007FFFC1205000-memory.dmp

    Filesize

    2.0MB

  • memory/1400-40-0x00007FFFC10AD000-0x00007FFFC10AE000-memory.dmp

    Filesize

    4KB

  • memory/1400-41-0x00007FFFC1010000-0x00007FFFC1205000-memory.dmp

    Filesize

    2.0MB

  • memory/1400-42-0x00007FFFC1010000-0x00007FFFC1205000-memory.dmp

    Filesize

    2.0MB

  • memory/1400-12-0x00007FFFC1010000-0x00007FFFC1205000-memory.dmp

    Filesize

    2.0MB