Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 00:28

General

  • Target

    28e2a587439b687fbb213fa32d3ddc8edd92e295cd788d5e42005dac1159cf69.xlsm

  • Size

    32KB

  • MD5

    96edfaa4cc37d7db9713cc2a68de53c8

  • SHA1

    74b26a8ecae65ebf51cd182e3926e80dae428e1b

  • SHA256

    28e2a587439b687fbb213fa32d3ddc8edd92e295cd788d5e42005dac1159cf69

  • SHA512

    bbc7ebc84a4615b892c32163a4365296f7ab1a85ad26d6ae266b8cfe1f942f3db29493f1c141bc9d8ae23d1b8c87418336c9f219bd600ca449db079845f9a4e6

  • SSDEEP

    768:gjf8WFhN7beEizXT2LxdFfPdkqstJVE6D:6EsTXrgXUndkq8E6D

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.alejandrovillar.com/MSL/eKDWjpa4OHRxpysOTFe/

xlm40.dropper

https://alejandrastamateas.com/web/ZxA3zHwsH3r/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\28e2a587439b687fbb213fa32d3ddc8edd92e295cd788d5e42005dac1159cf69.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Windows\SysWow64\regsvr32.exe
      C:\Windows\SysWow64\regsvr32.exe -s ..\rfs.dll
      2⤵
      • Process spawned unexpected child process
      • System Location Discovery: System Language Discovery
      PID:1772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    d911d5cdb4d0380a4f7019447486b8c1

    SHA1

    bdf48d963efdf4ac60331e1a2ceb290707b355d7

    SHA256

    c8f17235fe205e1c136519a2f13e0ca1e0aa9b438efe4bbf08076a91a3bdf1a2

    SHA512

    d43e0bd3056e2ffd8e561ca017535c93db3610288a28e4bdb5e2eacaff06225fa65c37d2d2d91f6e52f4ea3666497eb94accad0e1957059e4bcc9f5c3026f1e3

  • C:\Users\Admin\rfs.dll

    Filesize

    202KB

    MD5

    5579d9981ff17d710d7b515a21ccaf31

    SHA1

    c6c9ca2a98ecb18feeb5768c8284f9b9e86fc624

    SHA256

    9865ad1fb0be0397e7d1d50042983e5620257a0e1642ef4c247ebd017312ee4a

    SHA512

    d8b9aa9dfc576f1a3891a22c0ee244068bf5cb13650b0cf554b311de6f4833bfabfd4811fa999613f0d5d5ab2279a29143b317d31a8fb66d06611ba526251c37

  • memory/4812-8-0x00007FFF09D90000-0x00007FFF09F85000-memory.dmp

    Filesize

    2.0MB

  • memory/4812-5-0x00007FFEC9E10000-0x00007FFEC9E20000-memory.dmp

    Filesize

    64KB

  • memory/4812-7-0x00007FFF09D90000-0x00007FFF09F85000-memory.dmp

    Filesize

    2.0MB

  • memory/4812-18-0x00007FFF09D90000-0x00007FFF09F85000-memory.dmp

    Filesize

    2.0MB

  • memory/4812-11-0x00007FFF09D90000-0x00007FFF09F85000-memory.dmp

    Filesize

    2.0MB

  • memory/4812-12-0x00007FFF09D90000-0x00007FFF09F85000-memory.dmp

    Filesize

    2.0MB

  • memory/4812-10-0x00007FFF09D90000-0x00007FFF09F85000-memory.dmp

    Filesize

    2.0MB

  • memory/4812-13-0x00007FFEC7D00000-0x00007FFEC7D10000-memory.dmp

    Filesize

    64KB

  • memory/4812-14-0x00007FFF09D90000-0x00007FFF09F85000-memory.dmp

    Filesize

    2.0MB

  • memory/4812-16-0x00007FFF09D90000-0x00007FFF09F85000-memory.dmp

    Filesize

    2.0MB

  • memory/4812-15-0x00007FFF09D90000-0x00007FFF09F85000-memory.dmp

    Filesize

    2.0MB

  • memory/4812-9-0x00007FFF09D90000-0x00007FFF09F85000-memory.dmp

    Filesize

    2.0MB

  • memory/4812-0-0x00007FFF09E2D000-0x00007FFF09E2E000-memory.dmp

    Filesize

    4KB

  • memory/4812-2-0x00007FFEC9E10000-0x00007FFEC9E20000-memory.dmp

    Filesize

    64KB

  • memory/4812-4-0x00007FFEC9E10000-0x00007FFEC9E20000-memory.dmp

    Filesize

    64KB

  • memory/4812-21-0x00007FFF09D90000-0x00007FFF09F85000-memory.dmp

    Filesize

    2.0MB

  • memory/4812-20-0x00007FFF09D90000-0x00007FFF09F85000-memory.dmp

    Filesize

    2.0MB

  • memory/4812-19-0x00007FFEC7D00000-0x00007FFEC7D10000-memory.dmp

    Filesize

    64KB

  • memory/4812-17-0x00007FFF09D90000-0x00007FFF09F85000-memory.dmp

    Filesize

    2.0MB

  • memory/4812-6-0x00007FFF09D90000-0x00007FFF09F85000-memory.dmp

    Filesize

    2.0MB

  • memory/4812-3-0x00007FFEC9E10000-0x00007FFEC9E20000-memory.dmp

    Filesize

    64KB

  • memory/4812-45-0x00007FFF09E2D000-0x00007FFF09E2E000-memory.dmp

    Filesize

    4KB

  • memory/4812-46-0x00007FFF09D90000-0x00007FFF09F85000-memory.dmp

    Filesize

    2.0MB

  • memory/4812-47-0x00007FFF09D90000-0x00007FFF09F85000-memory.dmp

    Filesize

    2.0MB

  • memory/4812-48-0x00007FFF09D90000-0x00007FFF09F85000-memory.dmp

    Filesize

    2.0MB

  • memory/4812-1-0x00007FFEC9E10000-0x00007FFEC9E20000-memory.dmp

    Filesize

    64KB