Analysis

  • max time kernel
    133s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 00:23

General

  • Target

    933fc813f5321f7cf53c0e55357d7f51f7d2fddc2bd36f4d0b53589fc41a8af3.xlsm

  • Size

    40KB

  • MD5

    e370cbe8716f735a56f23bc9a41c7d5b

  • SHA1

    24cd5d913600e14218b342f5de00642c0e7a786d

  • SHA256

    933fc813f5321f7cf53c0e55357d7f51f7d2fddc2bd36f4d0b53589fc41a8af3

  • SHA512

    ae6280c18eb4672a289be54912b67a8275e22a2a4d6f32dde7b5d1403bbcf6507aa6ca2999021cbe261b3e27b1afc377c0e438ece5eb5f90f6813cb8809ea6ca

  • SSDEEP

    768:+tby3nCsqi1O3mnOzyKfcrND59V+L9Rw4eWrXcTqy0y3:mbunC5iymqylND59V4jwmXc2Xy3

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://foroviviendaparaguay.com/wp-admin/hx8U6XMffnkv8HI2Oig/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\933fc813f5321f7cf53c0e55357d7f51f7d2fddc2bd36f4d0b53589fc41a8af3.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3160
    • C:\Windows\SysWow64\regsvr32.exe
      C:\Windows\SysWow64\regsvr32.exe -s ..\xda.ocx
      2⤵
      • Process spawned unexpected child process
      • System Location Discovery: System Language Discovery
      PID:2960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xda.ocx

    Filesize

    1KB

    MD5

    dccf8b2a1fb41f494830027214dad951

    SHA1

    f4e737d70bd8f7ece983a79042ca146326cc3059

    SHA256

    d5fec0951172a5380d49519d1858c6beb0eb6a98ed6c4eb184d1afa783d855a4

    SHA512

    373e925d4f495ce6a15c1fb14f6ff1fe8759ec19217f554a115aee2731493f001eee159ac54333fbf5f3d211157f078f49031e5212d4eff1633295158434fa49

  • memory/3160-8-0x00007FFBFCD80000-0x00007FFBFD049000-memory.dmp

    Filesize

    2.8MB

  • memory/3160-5-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

    Filesize

    64KB

  • memory/3160-10-0x00007FFBFCD80000-0x00007FFBFD049000-memory.dmp

    Filesize

    2.8MB

  • memory/3160-6-0x00007FFBFCD80000-0x00007FFBFD049000-memory.dmp

    Filesize

    2.8MB

  • memory/3160-9-0x00007FFBFCD80000-0x00007FFBFD049000-memory.dmp

    Filesize

    2.8MB

  • memory/3160-7-0x00007FFBFCD80000-0x00007FFBFD049000-memory.dmp

    Filesize

    2.8MB

  • memory/3160-4-0x00007FFBFCD80000-0x00007FFBFD049000-memory.dmp

    Filesize

    2.8MB

  • memory/3160-11-0x00007FFBBD490000-0x00007FFBBD4A0000-memory.dmp

    Filesize

    64KB

  • memory/3160-1-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

    Filesize

    64KB

  • memory/3160-3-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

    Filesize

    64KB

  • memory/3160-0-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

    Filesize

    64KB

  • memory/3160-12-0x00007FFBBD490000-0x00007FFBBD4A0000-memory.dmp

    Filesize

    64KB

  • memory/3160-13-0x00007FFBFCD80000-0x00007FFBFD049000-memory.dmp

    Filesize

    2.8MB

  • memory/3160-14-0x00007FFBFCD80000-0x00007FFBFD049000-memory.dmp

    Filesize

    2.8MB

  • memory/3160-15-0x00007FFBFCD80000-0x00007FFBFD049000-memory.dmp

    Filesize

    2.8MB

  • memory/3160-2-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

    Filesize

    64KB

  • memory/3160-30-0x00007FFBFCD80000-0x00007FFBFD049000-memory.dmp

    Filesize

    2.8MB