Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 00:02

General

  • Target

    d95c7221349ca5e930e50be274f3cae6597206f6ca6b18ed5c74d95ae39590b6.xls

  • Size

    126KB

  • MD5

    3bfd1b1f172eab72bc8d62966952de23

  • SHA1

    69b147bc0bfa77fe31adf4318e7311c3df606473

  • SHA256

    d95c7221349ca5e930e50be274f3cae6597206f6ca6b18ed5c74d95ae39590b6

  • SHA512

    0ea5a6cba4cc603ad7da4a0956d8976eb8f450265948f72c1d13e00f565d63828277b2ea7c2b6dcf2c7c3a9d63df69d437216985c760a3f113bb35b6f8019a79

  • SSDEEP

    3072:LsKpbdrHYrMue8q7QPX+5xtekEdi8/dgR3Syz+nzQIceCRlCd:QKpbdrHYrMue8q7QPX+5xtFEdi8/dgR8

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://med.devsrm.com/wp-content/gtOOTHi3zkUbn8U6/

xlm40.dropper

http://izytalab.com/includes/1mafAX0kOa/

xlm40.dropper

https://pcsolutionss.com/zSlT4HR92TiOpw5NM/

xlm40.dropper

http://www.doctorcasenave.com/wp-content/O2Z1HMebIXiHYBBS/

xlm40.dropper

https://wpl28.realtyna.com/wp-content/0b0ny5cPM/

xlm40.dropper

http://www.efcballjoint.com/Template/AxEZPOfAa9/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d95c7221349ca5e930e50be274f3cae6597206f6ca6b18ed5c74d95ae39590b6.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    cd6b068854480e00462d44587cd075b5

    SHA1

    2e311024a7463b3eed83c540c264a0e1116f1ad4

    SHA256

    4db6c4cc846f3bf6d8f593f084e3d9a2a73ee83ba048d8a791743f454713dc9f

    SHA512

    33053aeb94e91a6e240dfa115730b848021ffba2b501d51de514e0f255de2b74e82f2945dc881dba43f8edcdb41e4c29a0a6e3bed252c14a5b562becefdf97e9

  • memory/4872-16-0x00007FF902290000-0x00007FF902485000-memory.dmp

    Filesize

    2.0MB

  • memory/4872-3-0x00007FF8C2310000-0x00007FF8C2320000-memory.dmp

    Filesize

    64KB

  • memory/4872-15-0x00007FF8BFE00000-0x00007FF8BFE10000-memory.dmp

    Filesize

    64KB

  • memory/4872-2-0x00007FF90232D000-0x00007FF90232E000-memory.dmp

    Filesize

    4KB

  • memory/4872-5-0x00007FF8C2310000-0x00007FF8C2320000-memory.dmp

    Filesize

    64KB

  • memory/4872-10-0x00007FF902290000-0x00007FF902485000-memory.dmp

    Filesize

    2.0MB

  • memory/4872-11-0x00007FF902290000-0x00007FF902485000-memory.dmp

    Filesize

    2.0MB

  • memory/4872-13-0x00007FF902290000-0x00007FF902485000-memory.dmp

    Filesize

    2.0MB

  • memory/4872-14-0x00007FF902290000-0x00007FF902485000-memory.dmp

    Filesize

    2.0MB

  • memory/4872-9-0x00007FF902290000-0x00007FF902485000-memory.dmp

    Filesize

    2.0MB

  • memory/4872-4-0x00007FF8C2310000-0x00007FF8C2320000-memory.dmp

    Filesize

    64KB

  • memory/4872-1-0x00007FF8C2310000-0x00007FF8C2320000-memory.dmp

    Filesize

    64KB

  • memory/4872-12-0x00007FF902290000-0x00007FF902485000-memory.dmp

    Filesize

    2.0MB

  • memory/4872-8-0x00007FF902290000-0x00007FF902485000-memory.dmp

    Filesize

    2.0MB

  • memory/4872-7-0x00007FF902290000-0x00007FF902485000-memory.dmp

    Filesize

    2.0MB

  • memory/4872-6-0x00007FF902290000-0x00007FF902485000-memory.dmp

    Filesize

    2.0MB

  • memory/4872-17-0x00007FF8BFE00000-0x00007FF8BFE10000-memory.dmp

    Filesize

    64KB

  • memory/4872-21-0x00007FF902290000-0x00007FF902485000-memory.dmp

    Filesize

    2.0MB

  • memory/4872-20-0x00007FF902290000-0x00007FF902485000-memory.dmp

    Filesize

    2.0MB

  • memory/4872-19-0x00007FF902290000-0x00007FF902485000-memory.dmp

    Filesize

    2.0MB

  • memory/4872-18-0x00007FF902290000-0x00007FF902485000-memory.dmp

    Filesize

    2.0MB

  • memory/4872-41-0x00007FF902290000-0x00007FF902485000-memory.dmp

    Filesize

    2.0MB

  • memory/4872-0-0x00007FF8C2310000-0x00007FF8C2320000-memory.dmp

    Filesize

    64KB