Malware Analysis Report

2024-08-06 18:13

Sample ID 240702-zvjf5aygmh
Target 0f25b2dba81f1a344f613a7aedecd247980324529fa1d7f2a1d2937f1fa0627e
SHA256 0f25b2dba81f1a344f613a7aedecd247980324529fa1d7f2a1d2937f1fa0627e
Tags
macro macro_on_action xenorat rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0f25b2dba81f1a344f613a7aedecd247980324529fa1d7f2a1d2937f1fa0627e

Threat Level: Known bad

The file 0f25b2dba81f1a344f613a7aedecd247980324529fa1d7f2a1d2937f1fa0627e was found to be: Known bad.

Malicious Activity Summary

macro macro_on_action xenorat rat trojan

XenorRat

Office macro that triggers on suspicious action

Suspicious Office macro

Downloads MZ/PE file

Loads dropped DLL

Executes dropped EXE

Suspicious use of SetThreadContext

Enumerates physical storage devices

Office loads VBA resources, possible macro or embedded object present

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

Modifies registry class

Enumerates system info in registry

Checks processor information in registry

Suspicious behavior: AddClipboardFormatListener

Modifies Internet Explorer settings

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-07-02 21:02

Signatures

Office macro that triggers on suspicious action

macro macro_on_action
Description Indicator Process Target
N/A N/A N/A N/A

Suspicious Office macro

macro
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-02 21:02

Reported

2024-07-02 21:03

Platform

win7-20240611-en

Max time kernel

39s

Max time network

44s

Command Line

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\0f25b2dba81f1a344f613a7aedecd247980324529fa1d7f2a1d2937f1fa0627e.xls

Signatures

XenorRat

trojan rat xenorat

Downloads MZ/PE file

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
N/A N/A C:\Users\Admin\AppData\Roaming\frt.exe N/A

Enumerates physical storage devices

Office loads VBA resources, possible macro or embedded object present

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\frt.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2944 wrote to memory of 2932 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Users\Admin\AppData\Roaming\frt.exe
PID 2944 wrote to memory of 2932 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Users\Admin\AppData\Roaming\frt.exe
PID 2944 wrote to memory of 2932 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Users\Admin\AppData\Roaming\frt.exe
PID 2944 wrote to memory of 2932 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2932 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\frt.exe
PID 2796 wrote to memory of 1656 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 2796 wrote to memory of 1656 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 2796 wrote to memory of 1656 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 2796 wrote to memory of 1656 N/A C:\Users\Admin\AppData\Roaming\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 2140 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 2140 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 2140 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 2140 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 2140 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 2140 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 2140 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 2140 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 2140 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 428 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 428 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 428 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 428 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 428 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 428 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 428 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 428 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe
PID 1656 wrote to memory of 428 N/A C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe

Processes

C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\0f25b2dba81f1a344f613a7aedecd247980324529fa1d7f2a1d2937f1fa0627e.xls

C:\Users\Admin\AppData\Roaming\frt.exe

"C:\Users\Admin\AppData\Roaming\frt.exe"

C:\Users\Admin\AppData\Roaming\frt.exe

C:\Users\Admin\AppData\Roaming\frt.exe

C:\Users\Admin\AppData\Roaming\frt.exe

C:\Users\Admin\AppData\Roaming\frt.exe

C:\Users\Admin\AppData\Roaming\frt.exe

C:\Users\Admin\AppData\Roaming\frt.exe

C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe

"C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe"

C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe

C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe

C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe

C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe

C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe

C:\Users\Admin\AppData\Roaming\XenoManager\frt.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 requimacofradian.site udp
LT 185.216.70.19:443 requimacofradian.site tcp
US 8.8.8.8:53 r11.o.lencr.org udp
NL 23.63.101.171:80 r11.o.lencr.org tcp

Files

memory/2944-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

memory/2944-1-0x0000000072AED000-0x0000000072AF8000-memory.dmp

memory/2944-2-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-16-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-6-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-5-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-4-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-3-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-7-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-25-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-8-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-9-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-10-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-11-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-36-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-12-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-13-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-14-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-15-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-18-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-17-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-19-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-24-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-29-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-46-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-45-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-44-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-43-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-41-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-42-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-57-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-61-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-39-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-63-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-66-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-38-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-37-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-35-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-34-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-33-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-32-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-31-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-30-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-28-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-27-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-65-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-76-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-75-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-74-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-64-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-62-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-60-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-59-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-58-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-56-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-55-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-53-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-54-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-52-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-51-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-50-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-49-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-48-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-47-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-26-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-23-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-22-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-21-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-20-0x00000000006A0000-0x00000000007A0000-memory.dmp

C:\Users\Admin\AppData\Roaming\frt.exe

MD5 f92f9efc4bac413bd25cbe666369b0a8
SHA1 65d8151bef6ee4e4f621664a1f179173c4097fd8
SHA256 f149ded66aaca1cd8de3e9455c5d93d38cc2ed18cf4c5d5e761f3bde39ce90d4
SHA512 755f615e2a17cd73e160f3b536ef59cf045d1c0f6e6b56f815c185f2b1833ab5fa07c532e8e7256f0e4639d42880a9bb5435e0acf69eb3bf80b8ffcdd2e06994

memory/2932-102-0x000000006C57E000-0x000000006C57F000-memory.dmp

memory/2932-103-0x0000000000E70000-0x0000000000EB0000-memory.dmp

memory/2932-104-0x0000000000590000-0x0000000000596000-memory.dmp

memory/2932-105-0x0000000000490000-0x00000000004CE000-memory.dmp

memory/2932-106-0x00000000004D0000-0x00000000004D6000-memory.dmp

memory/3012-117-0x0000000000400000-0x0000000000412000-memory.dmp

memory/1656-125-0x0000000000BE0000-0x0000000000C20000-memory.dmp

memory/2944-136-0x0000000072AED000-0x0000000072AF8000-memory.dmp

memory/2944-137-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-138-0x00000000006A0000-0x00000000007A0000-memory.dmp

memory/2944-139-0x00000000006A0000-0x00000000007A0000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-02 21:02

Reported

2024-07-02 21:03

Platform

win10v2004-20240611-en

Max time kernel

55s

Max time network

56s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0f25b2dba81f1a344f613a7aedecd247980324529fa1d7f2a1d2937f1fa0627e.xls"

Signatures

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0f25b2dba81f1a344f613a7aedecd247980324529fa1d7f2a1d2937f1fa0627e.xls"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4288,i,12594301322143882025,16832588342008839449,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 roaming.officeapps.live.com udp
GB 52.109.28.47:443 roaming.officeapps.live.com tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 97.32.109.52.in-addr.arpa udp
US 8.8.8.8:53 47.28.109.52.in-addr.arpa udp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 123.10.44.20.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 35.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp

Files

memory/4660-0-0x00007FFF8AB50000-0x00007FFF8AB60000-memory.dmp

memory/4660-2-0x00007FFF8AB50000-0x00007FFF8AB60000-memory.dmp

memory/4660-1-0x00007FFF8AB50000-0x00007FFF8AB60000-memory.dmp

memory/4660-4-0x00007FFF8AB50000-0x00007FFF8AB60000-memory.dmp

memory/4660-3-0x00007FFF8AB50000-0x00007FFF8AB60000-memory.dmp

memory/4660-6-0x00007FFFCAAD0000-0x00007FFFCACC5000-memory.dmp

memory/4660-5-0x00007FFFCAB6D000-0x00007FFFCAB6E000-memory.dmp

memory/4660-9-0x00007FFFCAAD0000-0x00007FFFCACC5000-memory.dmp

memory/4660-8-0x00007FFFCAAD0000-0x00007FFFCACC5000-memory.dmp

memory/4660-7-0x00007FFFCAAD0000-0x00007FFFCACC5000-memory.dmp

memory/4660-13-0x00007FFFCAAD0000-0x00007FFFCACC5000-memory.dmp

memory/4660-16-0x00007FFFCAAD0000-0x00007FFFCACC5000-memory.dmp

memory/4660-17-0x00007FFF881F0000-0x00007FFF88200000-memory.dmp

memory/4660-15-0x00007FFFCAAD0000-0x00007FFFCACC5000-memory.dmp

memory/4660-19-0x00007FFFCAAD0000-0x00007FFFCACC5000-memory.dmp

memory/4660-18-0x00007FFFCAAD0000-0x00007FFFCACC5000-memory.dmp

memory/4660-14-0x00007FFFCAAD0000-0x00007FFFCACC5000-memory.dmp

memory/4660-12-0x00007FFFCAAD0000-0x00007FFFCACC5000-memory.dmp

memory/4660-11-0x00007FFFCAAD0000-0x00007FFFCACC5000-memory.dmp

memory/4660-10-0x00007FFF881F0000-0x00007FFF88200000-memory.dmp

memory/4660-34-0x00007FFFCAAD0000-0x00007FFFCACC5000-memory.dmp