Analysis

  • max time kernel
    58s
  • max time network
    42s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/03/2025, 21:45

General

  • Target

    f1d960b2b20569c3e0d69c578ac6963ed1987954a415151706f5210f2cdcfcab.xls

  • Size

    88KB

  • MD5

    ff4e8b8a29cb871a6bf568d41e532fcb

  • SHA1

    2f2ca999564686642023d620a551ef80bedd1d07

  • SHA256

    f1d960b2b20569c3e0d69c578ac6963ed1987954a415151706f5210f2cdcfcab

  • SHA512

    d8f5a5e3c241a6401175c139be380814ebb02f9b86a55808103ce4b8b99e07f5faeb0ed7dc283375f5229d1003fa1d6fce04506562f106168357d3cb00c018e1

  • SSDEEP

    1536:8RpKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgiAezwrMCtvJecvRtbYDlgtCS1K3gtFA:CKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgo

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://ilriparatutto.eu/tmp/0K1NupyKPeX/

xlm40.dropper

http://cubicegg.asia/pKUVQsfSHB/cfF/

xlm40.dropper

http://drviniciusterra.com.br/wp-admin/Z8T84TxcRXPi99/

xlm40.dropper

https://hqsistemas.com.ar/cgi-bin/FMPTFCp/

xlm40.dropper

http://jimmymerida.imd.com.bo/cgi-bin/k9Cnl0bk/

xlm40.dropper

http://ceibadiseno.com.mx/brochure/hnZjHGo1EYITQZ/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f1d960b2b20569c3e0d69c578ac6963ed1987954a415151706f5210f2cdcfcab.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:5516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    2KB

    MD5

    6589bafc1a3b103c412111cd7d8af2ab

    SHA1

    d6b4bb547649d3fbd3dc173f86997371cadbd040

    SHA256

    cbdd0d8b548a5c7ae7b3faee03d4d88983b85108073b2a689ea24f8128f697ff

    SHA512

    0f9159012d1c3719bb16e9ce8d7b57ffea3248611a2576fb7c185d04283693b9786e0a008e4fce61976f0bec527b679387dc71002a532a2647513baf9a8ebd3b

  • memory/5516-0-0x00007FF96A7F0000-0x00007FF96A800000-memory.dmp

    Filesize

    64KB

  • memory/5516-2-0x00007FF96A7F0000-0x00007FF96A800000-memory.dmp

    Filesize

    64KB

  • memory/5516-3-0x00007FF96A7F0000-0x00007FF96A800000-memory.dmp

    Filesize

    64KB

  • memory/5516-1-0x00007FF96A7F0000-0x00007FF96A800000-memory.dmp

    Filesize

    64KB

  • memory/5516-4-0x00007FF9AA2A0000-0x00007FF9AA33B000-memory.dmp

    Filesize

    620KB

  • memory/5516-5-0x00007FF96A7F0000-0x00007FF96A800000-memory.dmp

    Filesize

    64KB

  • memory/5516-6-0x00007FF967E90000-0x00007FF967EA0000-memory.dmp

    Filesize

    64KB

  • memory/5516-7-0x00007FF967E90000-0x00007FF967EA0000-memory.dmp

    Filesize

    64KB

  • memory/5516-19-0x00007FF9AA2A0000-0x00007FF9AA33B000-memory.dmp

    Filesize

    620KB