Malware Analysis Report

2025-03-15 07:00

Sample ID 231231-h1c3vsddcm
Target 2ce295dcd3764b8618daeade78c6e6c4
SHA256 6de25ca57c86190d89f900b0d6c95bc5484102e46180f39c916e0f6b2ddca9f1
Tags
macro xlm
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6de25ca57c86190d89f900b0d6c95bc5484102e46180f39c916e0f6b2ddca9f1

Threat Level: Known bad

The file 2ce295dcd3764b8618daeade78c6e6c4 was found to be: Known bad.

Malicious Activity Summary

macro xlm

Process spawned unexpected child process

Suspicious Office macro

Suspicious behavior: AddClipboardFormatListener

Suspicious use of SetWindowsHookEx

Enumerates system info in registry

Modifies Internet Explorer settings

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-12-31 07:11

Signatures

Suspicious Office macro

macro xlm
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-31 07:11

Reported

2024-01-02 12:30

Platform

win7-20231215-en

Max time kernel

0s

Max time network

120s

Command Line

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\2ce295dcd3764b8618daeade78c6e6c4.xlsb

Signatures

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\SysWOW64\Wbem\wmic.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\mshta.exe

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MenuExt C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Processes

C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\2ce295dcd3764b8618daeade78c6e6c4.xlsb

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic process call create 'mshta C:\ProgramData\NwLapcDikupcDN.sct'

C:\Windows\system32\mshta.exe

mshta C:\ProgramData\NwLapcDikupcDN.sct

Network

Country Destination Domain Proto
US 8.8.8.8:53 chains.lookarma.com.br udp

Files

memory/2968-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

memory/2968-1-0x000000007240D000-0x0000000072418000-memory.dmp

C:\ProgramData\NwLapcDikupcDN.sct

MD5 47a1984764f641f98646dbbcea540752
SHA1 55db505e8937b8a0785182489cc2eae2416031ec
SHA256 b8800720ee043b8c52ff1f4d485e7b7a6ba2dd357c5cb90e87fb0790a473bb73
SHA512 9be49306a5f3e0a61fb77aef2a96ddb029a50b7adaedab7ad1f3adb4adbc19485bc0f482504ba31c71612e7d65920dc54e700614cd753c9667a08d3d9d204608

memory/2968-9-0x000000007240D000-0x0000000072418000-memory.dmp

memory/2968-12-0x000000005FFF0000-0x0000000060000000-memory.dmp

memory/2968-13-0x000000007240D000-0x0000000072418000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-31 07:11

Reported

2024-01-02 12:30

Platform

win10v2004-20231215-en

Max time kernel

2s

Max time network

117s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2ce295dcd3764b8618daeade78c6e6c4.xlsb"

Signatures

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2ce295dcd3764b8618daeade78c6e6c4.xlsb"

C:\Windows\System32\Wbem\wmic.exe

wmic process call create 'mshta C:\ProgramData\NwLapcDikupcDN.sct'

C:\Windows\system32\mshta.exe

mshta C:\ProgramData\NwLapcDikupcDN.sct

Network

Country Destination Domain Proto
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 19.53.126.40.in-addr.arpa udp
US 8.8.8.8:53 97.32.109.52.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 175.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 chains.lookarma.com.br udp
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 211.143.182.52.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 100.5.17.2.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 18.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 187.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 32.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 204.79.197.200:443 tcp
US 8.8.8.8:53 211.178.17.96.in-addr.arpa udp

Files

memory/3948-2-0x00007FFD36FF0000-0x00007FFD37000000-memory.dmp

memory/3948-1-0x00007FFD36FF0000-0x00007FFD37000000-memory.dmp

memory/3948-0-0x00007FFD36FF0000-0x00007FFD37000000-memory.dmp

memory/3948-3-0x00007FFD36FF0000-0x00007FFD37000000-memory.dmp

memory/3948-5-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-8-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-10-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-14-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-16-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-18-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-21-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-23-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-22-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-20-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-19-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-17-0x00007FFD34B60000-0x00007FFD34B70000-memory.dmp

memory/3948-15-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-13-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-12-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-11-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-9-0x00007FFD34B60000-0x00007FFD34B70000-memory.dmp

memory/3948-7-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-6-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-4-0x00007FFD36FF0000-0x00007FFD37000000-memory.dmp

memory/3948-43-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-64-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-63-0x00007FFD76F70000-0x00007FFD77165000-memory.dmp

memory/3948-62-0x00007FFD36FF0000-0x00007FFD37000000-memory.dmp

memory/3948-61-0x00007FFD36FF0000-0x00007FFD37000000-memory.dmp

memory/3948-60-0x00007FFD36FF0000-0x00007FFD37000000-memory.dmp

memory/3948-59-0x00007FFD36FF0000-0x00007FFD37000000-memory.dmp