Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 00:25

General

  • Target

    da626549f7d06e4d44a3463bbf52b016b9d0be8513beda521f9fb94ed1852562.xlsm

  • Size

    40KB

  • MD5

    f711f2f8094788cc92d5774492136ea2

  • SHA1

    471c1782f8942849131630e91ea0116c70a2f35c

  • SHA256

    da626549f7d06e4d44a3463bbf52b016b9d0be8513beda521f9fb94ed1852562

  • SHA512

    d1ecf8bd2ff6bda8fae070581e8712466685fedb0a8c4cafd786d47e6b4875f8936794c87fdc9d5e9deaef7402c4da277484e2a059d68d008c66317b14e7beed

  • SSDEEP

    768:2bomCS/DOevZCwt7OyKfcrND59V+L9Rw4eWrXcTqZ0VfddDhw:+omd/DmylND59V4jwmXc2CVfdxi

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://linkmys.com/stats/nnF/

xlm40.dropper

https://livejagat.com/h/UDwLU4FTwf/

xlm40.dropper

https://ticsnp.azurewebsites.net/anko-agust/treN2T/

xlm40.dropper

https://paintingsouq.com/l93mxsk/Ich7kJF7n3Fu5v/

xlm40.dropper

https://sanvicente.group/wp-content/dBsh5232WHIsiwyQAln/

xlm40.dropper

https://novinex.net/wp-admin/p9FV5/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\da626549f7d06e4d44a3463bbf52b016b9d0be8513beda521f9fb94ed1852562.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:3120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    066f452af999d5f51b281b38df87d9f6

    SHA1

    f1d318472da0d25d3fcd7ce9b56489e80c61286e

    SHA256

    002ac32cbaa2de84708e00643f7250af95973506615172e20d2100f8aab43a78

    SHA512

    a4205732ee50d49e697e8929ca3c7bb0e2eb48c2d8dc2d94e5ff89e4e27a7ad3096aafbaf562ea9553cb3281880b6ae1865934df0c66cdc367a2c2740bc0c12e

  • memory/3120-13-0x00007FFBE8B70000-0x00007FFBE8B80000-memory.dmp

    Filesize

    64KB

  • memory/3120-0-0x00007FFBEB410000-0x00007FFBEB420000-memory.dmp

    Filesize

    64KB

  • memory/3120-9-0x00007FFC2B390000-0x00007FFC2B585000-memory.dmp

    Filesize

    2.0MB

  • memory/3120-8-0x00007FFC2B390000-0x00007FFC2B585000-memory.dmp

    Filesize

    2.0MB

  • memory/3120-7-0x00007FFC2B390000-0x00007FFC2B585000-memory.dmp

    Filesize

    2.0MB

  • memory/3120-11-0x00007FFC2B390000-0x00007FFC2B585000-memory.dmp

    Filesize

    2.0MB

  • memory/3120-12-0x00007FFBE8B70000-0x00007FFBE8B80000-memory.dmp

    Filesize

    64KB

  • memory/3120-10-0x00007FFC2B390000-0x00007FFC2B585000-memory.dmp

    Filesize

    2.0MB

  • memory/3120-4-0x00007FFBEB410000-0x00007FFBEB420000-memory.dmp

    Filesize

    64KB

  • memory/3120-2-0x00007FFBEB410000-0x00007FFBEB420000-memory.dmp

    Filesize

    64KB

  • memory/3120-14-0x00007FFC2B390000-0x00007FFC2B585000-memory.dmp

    Filesize

    2.0MB

  • memory/3120-6-0x00007FFC2B390000-0x00007FFC2B585000-memory.dmp

    Filesize

    2.0MB

  • memory/3120-5-0x00007FFBEB410000-0x00007FFBEB420000-memory.dmp

    Filesize

    64KB

  • memory/3120-1-0x00007FFBEB410000-0x00007FFBEB420000-memory.dmp

    Filesize

    64KB

  • memory/3120-17-0x00007FFC2B390000-0x00007FFC2B585000-memory.dmp

    Filesize

    2.0MB

  • memory/3120-16-0x00007FFC2B390000-0x00007FFC2B585000-memory.dmp

    Filesize

    2.0MB

  • memory/3120-15-0x00007FFC2B390000-0x00007FFC2B585000-memory.dmp

    Filesize

    2.0MB

  • memory/3120-40-0x00007FFC2B390000-0x00007FFC2B585000-memory.dmp

    Filesize

    2.0MB

  • memory/3120-3-0x00007FFC2B42D000-0x00007FFC2B42E000-memory.dmp

    Filesize

    4KB