Malware Analysis Report

2025-01-22 15:48

Sample ID 231226-gw4jksdeaj
Target 58bd8b77b4fcae2fb89ddaad5ca7be60
SHA256 38e2585c7b534432ae59660f16f819a1a730f5d46d72988958f1f36b142b5a0e
Tags
macro xlm
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

38e2585c7b534432ae59660f16f819a1a730f5d46d72988958f1f36b142b5a0e

Threat Level: Known bad

The file 58bd8b77b4fcae2fb89ddaad5ca7be60 was found to be: Known bad.

Malicious Activity Summary

macro xlm

Process spawned unexpected child process

Suspicious Office macro

Modifies Internet Explorer settings

Checks processor information in registry

Enumerates system info in registry

Suspicious behavior: AddClipboardFormatListener

Suspicious use of FindShellTrayWindow

Views/modifies file attributes

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-12-26 06:10

Signatures

Suspicious Office macro

macro xlm
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-26 06:10

Reported

2023-12-27 10:09

Platform

win7-20231215-en

Max time kernel

1s

Max time network

126s

Command Line

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\58bd8b77b4fcae2fb89ddaad5ca7be60.xls

Signatures

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\SysWOW64\wscript.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\58bd8b77b4fcae2fb89ddaad5ca7be60.xls

C:\Windows\SysWOW64\attrib.exe

attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"

C:\Windows\SysWOW64\wscript.exe

"C:\Windows\System32\wscript.exe" E:\KK\58bd8b77b4fcae2fb89ddaad5ca7be60_Search.vbs

Network

N/A

Files

memory/2408-1-0x0000000072D4D000-0x0000000072D58000-memory.dmp

memory/2408-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

memory/2408-2-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-4-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-6-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-10-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-15-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-25-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-30-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-31-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-29-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-33-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-32-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-56-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-55-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-28-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-80-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-27-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-26-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-103-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-24-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-23-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-22-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-21-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-19-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-125-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-20-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-18-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-17-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-16-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-163-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-14-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-172-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-13-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-12-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-196-0x0000000072D4D000-0x0000000072D58000-memory.dmp

memory/2408-198-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-11-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-9-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-220-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-8-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-7-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-242-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-5-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-3-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-270-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-290-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-338-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-360-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-387-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-388-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-389-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-390-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-391-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-392-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-393-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-394-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2408-398-0x0000000072D4D000-0x0000000072D58000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-26 06:10

Reported

2023-12-27 10:10

Platform

win10v2004-20231215-en

Max time kernel

41s

Max time network

159s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\58bd8b77b4fcae2fb89ddaad5ca7be60.xls"

Signatures

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\system32\cmd.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\system32\cmd.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\system32\cmd.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

Suspicious Office macro

macro xlm
Description Indicator Process Target
N/A N/A N/A N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\58bd8b77b4fcae2fb89ddaad5ca7be60.xls"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"

C:\Windows\system32\attrib.exe

attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"

Network

Country Destination Domain Proto
US 8.8.8.8:53 84.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 180.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 46.28.109.52.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 16.53.126.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 5.173.189.20.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 www.microsoft.com udp
US 2.17.5.133:80 www.microsoft.com tcp
US 2.17.5.133:80 www.microsoft.com tcp
US 8.8.8.8:53 133.5.17.2.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 173.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 253.15.104.51.in-addr.arpa udp

Files

memory/4540-0-0x00007FFF58A70000-0x00007FFF58A80000-memory.dmp

memory/4540-1-0x00007FFF58A70000-0x00007FFF58A80000-memory.dmp

memory/4540-3-0x00007FFF58A70000-0x00007FFF58A80000-memory.dmp

memory/4540-5-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-4-0x00007FFF58A70000-0x00007FFF58A80000-memory.dmp

memory/4540-2-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-6-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-9-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-10-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-8-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-13-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-16-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-17-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-18-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-19-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-21-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-23-0x00007FFF56140000-0x00007FFF56150000-memory.dmp

memory/4540-22-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-20-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-15-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-14-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-12-0x00007FFF56140000-0x00007FFF56150000-memory.dmp

memory/4540-11-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-7-0x00007FFF58A70000-0x00007FFF58A80000-memory.dmp

memory/4540-27-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-44-0x0000022488FE0000-0x00000224897E0000-memory.dmp

memory/4540-47-0x0000022488FE0000-0x00000224897E0000-memory.dmp

memory/4540-52-0x000002248E4D0000-0x000002248F4A0000-memory.dmp

memory/4540-57-0x000002248E4D0000-0x000002248F4A0000-memory.dmp

memory/4540-60-0x000002248E4D0000-0x000002248F4A0000-memory.dmp

memory/4540-61-0x000002248E4D0000-0x000002248F4A0000-memory.dmp

memory/4540-62-0x000002248E4D0000-0x000002248F4A0000-memory.dmp

memory/4540-65-0x000002248E4D0000-0x000002248F4A0000-memory.dmp

memory/4540-73-0x000002248E4D0000-0x000002248F4A0000-memory.dmp

memory/4540-76-0x000002248E4D0000-0x000002248F4A0000-memory.dmp

memory/4540-80-0x0000022488FE0000-0x00000224897E0000-memory.dmp

memory/4540-85-0x000002248E4D0000-0x000002248F4A0000-memory.dmp

memory/4540-91-0x000002248E4D0000-0x000002248F4A0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\58bd8b77b4fcae2fb89ddaad5ca7be60.xls

MD5 6fd9063350884af7ca43d3c5eb6380fd
SHA1 2b2bdd25b94279b6387cf3bbb4e7cdca128903d9
SHA256 0e677f456638fb5d99d100c9171eda168a8a0dcea91b8be04353e7f22bbc6e92
SHA512 9025fdd49fa1ed17d0e351182ba8593b2334c863be26ad883b95f0e82ee6298db71bc97cf76966788888bfa4a93752613c50a63235f3916b32205b8f06c2e8b4

memory/4540-116-0x0000022488FE0000-0x00000224897E0000-memory.dmp

memory/4540-117-0x0000022488FE0000-0x00000224897E0000-memory.dmp

memory/4540-118-0x000002248E4D0000-0x000002248F4A0000-memory.dmp

memory/4540-121-0x000002248E4D0000-0x000002248F4A0000-memory.dmp

memory/4540-122-0x000002248E4D0000-0x000002248F4A0000-memory.dmp

memory/4540-123-0x000002248E4D0000-0x000002248F4A0000-memory.dmp

memory/4540-124-0x000002248E4D0000-0x000002248F4A0000-memory.dmp

memory/4540-125-0x0000022488FE0000-0x00000224897E0000-memory.dmp

memory/4540-126-0x000002248E4D0000-0x000002248F4A0000-memory.dmp

memory/4540-145-0x00007FFF989F0000-0x00007FFF98BE5000-memory.dmp

memory/4540-144-0x00007FFF58A70000-0x00007FFF58A80000-memory.dmp

memory/4540-143-0x00007FFF58A70000-0x00007FFF58A80000-memory.dmp

memory/4540-142-0x00007FFF58A70000-0x00007FFF58A80000-memory.dmp

memory/4540-141-0x00007FFF58A70000-0x00007FFF58A80000-memory.dmp