Malware Analysis Report

2025-01-22 15:49

Sample ID 231226-dhsclsccgl
Target 4e85ef2d5fd9fdf69cd3f5b14ccc605f
SHA256 f1f1e8def51105de34cf81192f6fdcc82f652d7f16ee60acdac7638d4ec8c757
Tags
macro xlm
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f1f1e8def51105de34cf81192f6fdcc82f652d7f16ee60acdac7638d4ec8c757

Threat Level: Known bad

The file 4e85ef2d5fd9fdf69cd3f5b14ccc605f was found to be: Known bad.

Malicious Activity Summary

macro xlm

Process spawned unexpected child process

Suspicious Office macro

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-12-26 03:00

Signatures

Suspicious Office macro

macro xlm
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-26 03:00

Reported

2023-12-27 05:23

Platform

win7-20231215-en

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-26 03:00

Reported

2023-12-27 05:24

Platform

win10v2004-20231215-en

Max time kernel

0s

Max time network

69s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4e85ef2d5fd9fdf69cd3f5b14ccc605f.xls"

Signatures

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\explorer.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4e85ef2d5fd9fdf69cd3f5b14ccc605f.xls"

C:\Windows\explorer.exe

C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding

C:\Windows\explorer.exe

explorer.exe C:\Users\Public\Documents\dTHRocsD.vbs

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\dTHRocsD.vbs"

Network

Country Destination Domain Proto
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 180.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 markens.online udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 153.141.79.40.in-addr.arpa udp
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 8.8.8.8:53 183.1.37.23.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 93.184.221.240:80 tcp
GB 88.221.135.88:80 tcp
US 93.184.221.240:80 tcp
GB 88.221.135.88:80 tcp
GB 88.221.135.88:80 tcp
US 8.8.8.8:53 udp

Files

memory/4172-3-0x00007FFE84E10000-0x00007FFE84E20000-memory.dmp

memory/4172-7-0x00007FFE84E10000-0x00007FFE84E20000-memory.dmp

memory/4172-8-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

memory/4172-13-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

memory/4172-14-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

memory/4172-17-0x00007FFE82610000-0x00007FFE82620000-memory.dmp

memory/4172-19-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

memory/4172-21-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

memory/4172-20-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

memory/4172-18-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

memory/4172-16-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

memory/4172-15-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

memory/4172-12-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

memory/4172-11-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

memory/4172-10-0x00007FFE82610000-0x00007FFE82620000-memory.dmp

memory/4172-9-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

memory/4172-6-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

memory/4172-5-0x00007FFE84E10000-0x00007FFE84E20000-memory.dmp

memory/4172-4-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

memory/4172-2-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

memory/4172-1-0x00007FFE84E10000-0x00007FFE84E20000-memory.dmp

memory/4172-0-0x00007FFE84E10000-0x00007FFE84E20000-memory.dmp

memory/4172-33-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

memory/4172-34-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

memory/4172-35-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp