Malware Analysis Report

2025-08-05 21:38

Sample ID 221110-mn29fababj
Target 8adada5aa4d30926b43d052e6cb4168f6ba5f91b0670a922c0f5b5be17696eb5.xls
SHA256 8adada5aa4d30926b43d052e6cb4168f6ba5f91b0670a922c0f5b5be17696eb5
Tags
macro xlm
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8adada5aa4d30926b43d052e6cb4168f6ba5f91b0670a922c0f5b5be17696eb5

Threat Level: Known bad

The file 8adada5aa4d30926b43d052e6cb4168f6ba5f91b0670a922c0f5b5be17696eb5.xls was found to be: Known bad.

Malicious Activity Summary

macro xlm

Process spawned unexpected child process

Suspicious Office macro

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Checks processor information in registry

Enumerates system info in registry

Suspicious behavior: AddClipboardFormatListener

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-11-10 10:37

Signatures

Suspicious Office macro

macro xlm
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-11-10 10:37

Reported

2022-11-10 10:40

Platform

win10-20220901-en

Max time kernel

145s

Max time network

148s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\8adada5aa4d30926b43d052e6cb4168f6ba5f91b0670a922c0f5b5be17696eb5.xls"

Signatures

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\8adada5aa4d30926b43d052e6cb4168f6ba5f91b0670a922c0f5b5be17696eb5.xls"

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.conceptagency.net udp
N/A 100.65.162.122:443 www.conceptagency.net tcp
US 8.8.8.8:53 bencevendeghaz.hu udp
N/A 100.87.84.202:443 bencevendeghaz.hu tcp
SG 45.32.114.141:80 45.32.114.141 tcp
US 8.8.8.8:53 ruitaiwz.com udp
N/A 100.84.245.184:80 ruitaiwz.com tcp
US 13.89.179.8:443 tcp

Files

memory/372-120-0x00007FF9D0A10000-0x00007FF9D0A20000-memory.dmp

memory/372-121-0x00007FF9D0A10000-0x00007FF9D0A20000-memory.dmp

memory/372-122-0x00007FF9D0A10000-0x00007FF9D0A20000-memory.dmp

memory/372-123-0x00007FF9D0A10000-0x00007FF9D0A20000-memory.dmp

memory/372-132-0x00007FF9CDEC0000-0x00007FF9CDED0000-memory.dmp

memory/372-133-0x00007FF9CDEC0000-0x00007FF9CDED0000-memory.dmp

memory/4296-256-0x0000000000000000-mapping.dmp

memory/3472-259-0x0000000000000000-mapping.dmp

memory/4716-260-0x0000000000000000-mapping.dmp

memory/1972-261-0x0000000000000000-mapping.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-11-10 10:37

Reported

2022-11-10 10:40

Platform

win10-20220812-en

Max time kernel

100s

Max time network

124s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\8adada5aa4d30926b43d052e6cb4168f6ba5f91b0670a922c0f5b5be17696eb5.xls"

Signatures

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\8adada5aa4d30926b43d052e6cb4168f6ba5f91b0670a922c0f5b5be17696eb5.xls"

Network

Country Destination Domain Proto
US 8.252.118.126:80 tcp
NL 13.69.109.131:443 tcp
US 8.252.118.126:80 tcp

Files

memory/2500-117-0x00007FFA4D760000-0x00007FFA4D770000-memory.dmp

memory/2500-118-0x00007FFA4D760000-0x00007FFA4D770000-memory.dmp

memory/2500-119-0x00007FFA4D760000-0x00007FFA4D770000-memory.dmp

memory/2500-120-0x00007FFA4D760000-0x00007FFA4D770000-memory.dmp

memory/2500-129-0x00007FFA49C60000-0x00007FFA49C70000-memory.dmp

memory/2500-130-0x00007FFA49C60000-0x00007FFA49C70000-memory.dmp

memory/2500-293-0x00007FFA4D760000-0x00007FFA4D770000-memory.dmp

memory/2500-294-0x00007FFA4D760000-0x00007FFA4D770000-memory.dmp

memory/2500-295-0x00007FFA4D760000-0x00007FFA4D770000-memory.dmp

memory/2500-296-0x00007FFA4D760000-0x00007FFA4D770000-memory.dmp