Analysis

  • max time kernel
    55s
  • max time network
    46s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2025, 21:13

General

  • Target

    a91f7282472d704822644a1305cbd2fa3d71f1880d969c5e5c2332fb1e83ff94.xls

  • Size

    231KB

  • MD5

    4bd33bcfa7c54af519c632d5fa26f571

  • SHA1

    f8cd2bb9cec5ebd6db5715a636a54002d8fd3637

  • SHA256

    a91f7282472d704822644a1305cbd2fa3d71f1880d969c5e5c2332fb1e83ff94

  • SHA512

    4b2cb5415d314eef601d6f46e9c5bdebf2492e98626186cafd214a28663c3be3d482a6a29d5c3565826bcd7f04e792bd4aaf558afbd3968368c99f8fa872f4cd

  • SSDEEP

    6144:eKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgJ2IS7FgiJsJ4BR5043yVuBCMmnqLsCM:UzGiK4504Sy/mnqoCM

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://188.127.235.244/45734.8846040509.dat

xlm40.dropper

http://193.38.54.244/45734.8846040509.dat

xlm40.dropper

http://185.82.217.213/45734.8846040509.dat

xlm40.dropper

http://45734.8846040509.dat

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a91f7282472d704822644a1305cbd2fa3d71f1880d969c5e5c2332fb1e83ff94.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4700
    • C:\Windows\SYSTEM32\Rundll32.exe
      Rundll32 ..\Kiod.hod,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:1756
    • C:\Windows\SYSTEM32\Rundll32.exe
      Rundll32 ..\Kiod.hod1,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:1656
    • C:\Windows\SYSTEM32\Rundll32.exe
      Rundll32 ..\Kiod.hod2,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    7ff662b3eebd62d155b18b683aa9a706

    SHA1

    4ca91ef0072809315e679f75ad19a437f5ba248b

    SHA256

    f010a9b2004e09f3155d2c4ea7689c6e24d3d745797004316f193bed71a2b0c1

    SHA512

    8d7cea88ed4a2252a3ee676949bce42d45278e6746bdd1494353ca26ef502ffb3f74a972641f96e4986aaa019e829756789f6e86e984abd8d42028d62b0e8d28

  • memory/4700-12-0x00007FF99AF50000-0x00007FF99B145000-memory.dmp

    Filesize

    2.0MB

  • memory/4700-11-0x00007FF99AF50000-0x00007FF99B145000-memory.dmp

    Filesize

    2.0MB

  • memory/4700-2-0x00007FF95AFD0000-0x00007FF95AFE0000-memory.dmp

    Filesize

    64KB

  • memory/4700-0-0x00007FF95AFD0000-0x00007FF95AFE0000-memory.dmp

    Filesize

    64KB

  • memory/4700-7-0x00007FF95AFD0000-0x00007FF95AFE0000-memory.dmp

    Filesize

    64KB

  • memory/4700-6-0x00007FF99AF50000-0x00007FF99B145000-memory.dmp

    Filesize

    2.0MB

  • memory/4700-4-0x00007FF95AFD0000-0x00007FF95AFE0000-memory.dmp

    Filesize

    64KB

  • memory/4700-9-0x00007FF99AF50000-0x00007FF99B145000-memory.dmp

    Filesize

    2.0MB

  • memory/4700-3-0x00007FF95AFD0000-0x00007FF95AFE0000-memory.dmp

    Filesize

    64KB

  • memory/4700-10-0x00007FF99AF50000-0x00007FF99B145000-memory.dmp

    Filesize

    2.0MB

  • memory/4700-5-0x00007FF99AF50000-0x00007FF99B145000-memory.dmp

    Filesize

    2.0MB

  • memory/4700-13-0x00007FF958C20000-0x00007FF958C30000-memory.dmp

    Filesize

    64KB

  • memory/4700-8-0x00007FF99AF50000-0x00007FF99B145000-memory.dmp

    Filesize

    2.0MB

  • memory/4700-14-0x00007FF99AF50000-0x00007FF99B145000-memory.dmp

    Filesize

    2.0MB

  • memory/4700-15-0x00007FF958C20000-0x00007FF958C30000-memory.dmp

    Filesize

    64KB

  • memory/4700-22-0x00007FF99AF50000-0x00007FF99B145000-memory.dmp

    Filesize

    2.0MB

  • memory/4700-23-0x00007FF99AFED000-0x00007FF99AFEE000-memory.dmp

    Filesize

    4KB

  • memory/4700-24-0x00007FF99AF50000-0x00007FF99B145000-memory.dmp

    Filesize

    2.0MB

  • memory/4700-1-0x00007FF99AFED000-0x00007FF99AFEE000-memory.dmp

    Filesize

    4KB