Malware Analysis Report

2025-08-05 21:38

Sample ID 221110-mhnh4aahfp
Target cc78c46b81437376f3e14dba3992aebdf5c58d389a65b4a0749fdce3f4226369.xls
SHA256 cc78c46b81437376f3e14dba3992aebdf5c58d389a65b4a0749fdce3f4226369
Tags
macro xlm
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

cc78c46b81437376f3e14dba3992aebdf5c58d389a65b4a0749fdce3f4226369

Threat Level: Known bad

The file cc78c46b81437376f3e14dba3992aebdf5c58d389a65b4a0749fdce3f4226369.xls was found to be: Known bad.

Malicious Activity Summary

macro xlm

Process spawned unexpected child process

Suspicious Office macro

Suspicious use of SetWindowsHookEx

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Checks processor information in registry

Enumerates system info in registry

Suspicious behavior: AddClipboardFormatListener

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-11-10 10:28

Signatures

Suspicious Office macro

macro xlm
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-11-10 10:28

Reported

2022-11-10 10:30

Platform

win10-20220812-en

Max time kernel

101s

Max time network

147s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cc78c46b81437376f3e14dba3992aebdf5c58d389a65b4a0749fdce3f4226369.xls"

Signatures

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cc78c46b81437376f3e14dba3992aebdf5c58d389a65b4a0749fdce3f4226369.xls"

Network

Country Destination Domain Proto
IE 20.50.80.209:443 tcp

Files

memory/2664-115-0x00007FFABA900000-0x00007FFABA910000-memory.dmp

memory/2664-116-0x00007FFABA900000-0x00007FFABA910000-memory.dmp

memory/2664-117-0x00007FFABA900000-0x00007FFABA910000-memory.dmp

memory/2664-118-0x00007FFABA900000-0x00007FFABA910000-memory.dmp

memory/2664-127-0x00007FFAB7880000-0x00007FFAB7890000-memory.dmp

memory/2664-128-0x00007FFAB7880000-0x00007FFAB7890000-memory.dmp

memory/2664-289-0x00007FFABA900000-0x00007FFABA910000-memory.dmp

memory/2664-290-0x00007FFABA900000-0x00007FFABA910000-memory.dmp

memory/2664-291-0x00007FFABA900000-0x00007FFABA910000-memory.dmp

memory/2664-292-0x00007FFABA900000-0x00007FFABA910000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2022-11-10 10:28

Reported

2022-11-10 10:30

Platform

win10-20220812-en

Max time kernel

127s

Max time network

130s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cc78c46b81437376f3e14dba3992aebdf5c58d389a65b4a0749fdce3f4226369.xls"

Signatures

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cc78c46b81437376f3e14dba3992aebdf5c58d389a65b4a0749fdce3f4226369.xls"

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx

Network

Country Destination Domain Proto
US 8.8.8.8:53 bosny.com udp
N/A 100.112.217.71:443 bosny.com tcp
US 8.8.8.8:53 navylin.com udp
N/A 100.75.81.176:80 navylin.com tcp
US 8.8.8.8:53 asrani.garudaputih.com udp
N/A 100.96.198.147:80 asrani.garudaputih.com tcp
US 8.8.8.8:53 db.rikaz.tech udp
N/A 100.66.4.137:80 db.rikaz.tech tcp

Files

memory/4912-116-0x00007FF840EC0000-0x00007FF840ED0000-memory.dmp

memory/4912-117-0x00007FF840EC0000-0x00007FF840ED0000-memory.dmp

memory/4912-118-0x00007FF840EC0000-0x00007FF840ED0000-memory.dmp

memory/4912-119-0x00007FF840EC0000-0x00007FF840ED0000-memory.dmp

memory/4912-128-0x00007FF83D6F0000-0x00007FF83D700000-memory.dmp

memory/4912-129-0x00007FF83D6F0000-0x00007FF83D700000-memory.dmp

memory/3464-252-0x0000000000000000-mapping.dmp

memory/5028-253-0x0000000000000000-mapping.dmp

memory/4292-254-0x0000000000000000-mapping.dmp

memory/3144-255-0x0000000000000000-mapping.dmp

memory/4912-294-0x00007FF840EC0000-0x00007FF840ED0000-memory.dmp

memory/4912-295-0x00007FF840EC0000-0x00007FF840ED0000-memory.dmp

memory/4912-296-0x00007FF840EC0000-0x00007FF840ED0000-memory.dmp

memory/4912-297-0x00007FF840EC0000-0x00007FF840ED0000-memory.dmp