Malware Analysis Report

2025-08-05 21:38

Sample ID 221110-mv9l4ahbf4
Target 9124b898fa06f9508e130b1f1b61ae6a4cd513bdf100d79b54fdc722d3604b8d.xls
SHA256 9124b898fa06f9508e130b1f1b61ae6a4cd513bdf100d79b54fdc722d3604b8d
Tags
macro xlm
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

9124b898fa06f9508e130b1f1b61ae6a4cd513bdf100d79b54fdc722d3604b8d

Threat Level: Known bad

The file 9124b898fa06f9508e130b1f1b61ae6a4cd513bdf100d79b54fdc722d3604b8d.xls was found to be: Known bad.

Malicious Activity Summary

macro xlm

Process spawned unexpected child process

Suspicious Office macro

Enumerates system info in registry

Suspicious use of WriteProcessMemory

Checks processor information in registry

Suspicious behavior: AddClipboardFormatListener

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-11-10 10:48

Signatures

Suspicious Office macro

macro xlm
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-11-10 10:48

Reported

2022-11-10 10:50

Platform

win10-20220812-en

Max time kernel

125s

Max time network

149s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9124b898fa06f9508e130b1f1b61ae6a4cd513bdf100d79b54fdc722d3604b8d.xls"

Signatures

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9124b898fa06f9508e130b1f1b61ae6a4cd513bdf100d79b54fdc722d3604b8d.xls"

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx

Network

Country Destination Domain Proto
US 8.8.8.8:53 bosny.com udp
N/A 100.108.236.8:443 bosny.com tcp
US 8.8.8.8:53 navylin.com udp
N/A 100.89.116.122:80 navylin.com tcp
US 8.8.8.8:53 asrani.garudaputih.com udp
N/A 100.89.36.57:80 asrani.garudaputih.com tcp
US 8.8.8.8:53 db.rikaz.tech udp
N/A 100.91.34.14:80 db.rikaz.tech tcp
US 20.189.173.10:443 tcp

Files

memory/3804-115-0x00007FFF9CED0000-0x00007FFF9CEE0000-memory.dmp

memory/3804-116-0x00007FFF9CED0000-0x00007FFF9CEE0000-memory.dmp

memory/3804-117-0x00007FFF9CED0000-0x00007FFF9CEE0000-memory.dmp

memory/3804-118-0x00007FFF9CED0000-0x00007FFF9CEE0000-memory.dmp

memory/3804-127-0x00007FFF994D0000-0x00007FFF994E0000-memory.dmp

memory/3804-128-0x00007FFF994D0000-0x00007FFF994E0000-memory.dmp

memory/4748-251-0x0000000000000000-mapping.dmp

memory/3204-252-0x0000000000000000-mapping.dmp

memory/4848-253-0x0000000000000000-mapping.dmp

memory/3228-254-0x0000000000000000-mapping.dmp

memory/3804-291-0x00007FFF9CED0000-0x00007FFF9CEE0000-memory.dmp

memory/3804-292-0x00007FFF9CED0000-0x00007FFF9CEE0000-memory.dmp

memory/3804-293-0x00007FFF9CED0000-0x00007FFF9CEE0000-memory.dmp

memory/3804-294-0x00007FFF9CED0000-0x00007FFF9CEE0000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-11-10 10:48

Reported

2022-11-10 10:50

Platform

win10-20220812-en

Max time kernel

99s

Max time network

140s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9124b898fa06f9508e130b1f1b61ae6a4cd513bdf100d79b54fdc722d3604b8d.xls"

Signatures

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9124b898fa06f9508e130b1f1b61ae6a4cd513bdf100d79b54fdc722d3604b8d.xls"

Network

Country Destination Domain Proto
US 52.168.112.66:443 tcp
US 93.184.221.240:80 tcp

Files

memory/2340-120-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp

memory/2340-121-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp

memory/2340-122-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp

memory/2340-123-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp

memory/2340-132-0x00007FF9A5910000-0x00007FF9A5920000-memory.dmp

memory/2340-133-0x00007FF9A5910000-0x00007FF9A5920000-memory.dmp

memory/2340-294-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp

memory/2340-295-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp

memory/2340-296-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp

memory/2340-297-0x00007FF9A9380000-0x00007FF9A9390000-memory.dmp