Malware Analysis Report

2025-08-05 21:39

Sample ID 221110-m2n9qsbbbp
Target 805fd6b7e2544d28b74c00d4233cd26d9b6938f48362e370543579a3786f71ac.xls
SHA256 805fd6b7e2544d28b74c00d4233cd26d9b6938f48362e370543579a3786f71ac
Tags
macro xlm
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

805fd6b7e2544d28b74c00d4233cd26d9b6938f48362e370543579a3786f71ac

Threat Level: Known bad

The file 805fd6b7e2544d28b74c00d4233cd26d9b6938f48362e370543579a3786f71ac.xls was found to be: Known bad.

Malicious Activity Summary

macro xlm

Process spawned unexpected child process

Suspicious Office macro

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Checks processor information in registry

Enumerates system info in registry

Suspicious behavior: AddClipboardFormatListener

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-11-10 10:57

Signatures

Suspicious Office macro

macro xlm
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-11-10 10:57

Reported

2022-11-10 11:00

Platform

win10-20220812-en

Max time kernel

128s

Max time network

152s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\805fd6b7e2544d28b74c00d4233cd26d9b6938f48362e370543579a3786f71ac.xls"

Signatures

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\805fd6b7e2544d28b74c00d4233cd26d9b6938f48362e370543579a3786f71ac.xls"

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.conceptagency.net udp
N/A 100.99.82.22:443 www.conceptagency.net tcp
US 8.8.8.8:53 bencevendeghaz.hu udp
N/A 100.92.245.117:443 bencevendeghaz.hu tcp
SG 45.32.114.141:80 45.32.114.141 tcp
US 8.8.8.8:53 ruitaiwz.com udp
N/A 100.97.45.237:80 ruitaiwz.com tcp
US 20.189.173.1:443 tcp

Files

memory/4420-115-0x00007FFC75C00000-0x00007FFC75C10000-memory.dmp

memory/4420-116-0x00007FFC75C00000-0x00007FFC75C10000-memory.dmp

memory/4420-117-0x00007FFC75C00000-0x00007FFC75C10000-memory.dmp

memory/4420-118-0x00007FFC75C00000-0x00007FFC75C10000-memory.dmp

memory/4420-127-0x00007FFC722E0000-0x00007FFC722F0000-memory.dmp

memory/4420-128-0x00007FFC722E0000-0x00007FFC722F0000-memory.dmp

memory/5004-267-0x0000000000000000-mapping.dmp

memory/3388-270-0x0000000000000000-mapping.dmp

memory/5028-271-0x0000000000000000-mapping.dmp

memory/3572-272-0x0000000000000000-mapping.dmp

memory/4420-309-0x00007FFC75C00000-0x00007FFC75C10000-memory.dmp

memory/4420-310-0x00007FFC75C00000-0x00007FFC75C10000-memory.dmp

memory/4420-311-0x00007FFC75C00000-0x00007FFC75C10000-memory.dmp

memory/4420-312-0x00007FFC75C00000-0x00007FFC75C10000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-11-10 10:57

Reported

2022-11-10 11:00

Platform

win10-20220812-en

Max time kernel

102s

Max time network

139s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\805fd6b7e2544d28b74c00d4233cd26d9b6938f48362e370543579a3786f71ac.xls"

Signatures

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\805fd6b7e2544d28b74c00d4233cd26d9b6938f48362e370543579a3786f71ac.xls"

Network

Country Destination Domain Proto
IE 13.69.239.74:443 tcp

Files

memory/2300-120-0x00007FF9AC6D0000-0x00007FF9AC6E0000-memory.dmp

memory/2300-121-0x00007FF9AC6D0000-0x00007FF9AC6E0000-memory.dmp

memory/2300-122-0x00007FF9AC6D0000-0x00007FF9AC6E0000-memory.dmp

memory/2300-123-0x00007FF9AC6D0000-0x00007FF9AC6E0000-memory.dmp

memory/2300-132-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp

memory/2300-133-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp

memory/2300-294-0x00007FF9AC6D0000-0x00007FF9AC6E0000-memory.dmp

memory/2300-295-0x00007FF9AC6D0000-0x00007FF9AC6E0000-memory.dmp

memory/2300-296-0x00007FF9AC6D0000-0x00007FF9AC6E0000-memory.dmp

memory/2300-297-0x00007FF9AC6D0000-0x00007FF9AC6E0000-memory.dmp