Malware Analysis Report

2025-01-22 19:08

Sample ID 240723-1nqsaszhll
Target 55a78e4c2f59100d881daeff60f1d5a70a7f5b15b3126c1bdf670f3437163f9f
SHA256 55a78e4c2f59100d881daeff60f1d5a70a7f5b15b3126c1bdf670f3437163f9f
Tags
macro macro_on_action discovery
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

55a78e4c2f59100d881daeff60f1d5a70a7f5b15b3126c1bdf670f3437163f9f

Threat Level: Likely malicious

The file 55a78e4c2f59100d881daeff60f1d5a70a7f5b15b3126c1bdf670f3437163f9f was found to be: Likely malicious.

Malicious Activity Summary

macro macro_on_action discovery

Office macro that triggers on suspicious action

Suspicious Office macro

System Location Discovery: System Language Discovery

Office loads VBA resources, possible macro or embedded object present

Enumerates system info in registry

Suspicious behavior: AddClipboardFormatListener

Suspicious use of SetWindowsHookEx

Checks processor information in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-07-23 21:48

Signatures

Office macro that triggers on suspicious action

macro macro_on_action
Description Indicator Process Target
N/A N/A N/A N/A

Suspicious Office macro

macro
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-23 21:48

Reported

2024-07-23 21:49

Platform

win7-20240705-en

Max time kernel

24s

Max time network

17s

Command Line

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\55a78e4c2f59100d881daeff60f1d5a70a7f5b15b3126c1bdf670f3437163f9f.xls

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Office loads VBA resources, possible macro or embedded object present

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Processes

C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\55a78e4c2f59100d881daeff60f1d5a70a7f5b15b3126c1bdf670f3437163f9f.xls

Network

N/A

Files

memory/448-1-0x0000000073C1D000-0x0000000073C28000-memory.dmp

memory/448-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

memory/448-6-0x0000000000730000-0x0000000000830000-memory.dmp

memory/448-8-0x0000000000730000-0x0000000000830000-memory.dmp

memory/448-7-0x0000000000730000-0x0000000000830000-memory.dmp

memory/448-5-0x0000000000730000-0x0000000000830000-memory.dmp

memory/448-3-0x0000000000730000-0x0000000000830000-memory.dmp

memory/448-2-0x0000000000730000-0x0000000000830000-memory.dmp

memory/448-4-0x0000000000730000-0x0000000000830000-memory.dmp

memory/448-9-0x0000000073C1D000-0x0000000073C28000-memory.dmp

memory/448-10-0x0000000000730000-0x0000000000830000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-23 21:48

Reported

2024-07-23 21:49

Platform

win10v2004-20240709-en

Max time kernel

46s

Max time network

37s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\55a78e4c2f59100d881daeff60f1d5a70a7f5b15b3126c1bdf670f3437163f9f.xls"

Signatures

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\55a78e4c2f59100d881daeff60f1d5a70a7f5b15b3126c1bdf670f3437163f9f.xls"

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 roaming.officeapps.live.com udp
NL 52.109.89.19:443 roaming.officeapps.live.com tcp
US 8.8.8.8:53 46.28.109.52.in-addr.arpa udp
US 8.8.8.8:53 19.89.109.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 91.16.208.104.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 147.142.123.92.in-addr.arpa udp

Files

memory/4760-1-0x00007FF9334F0000-0x00007FF933500000-memory.dmp

memory/4760-2-0x00007FF9334F0000-0x00007FF933500000-memory.dmp

memory/4760-4-0x00007FF9334F0000-0x00007FF933500000-memory.dmp

memory/4760-0-0x00007FF9334F0000-0x00007FF933500000-memory.dmp

memory/4760-5-0x00007FF973470000-0x00007FF973665000-memory.dmp

memory/4760-3-0x00007FF97350D000-0x00007FF97350E000-memory.dmp

memory/4760-8-0x00007FF973470000-0x00007FF973665000-memory.dmp

memory/4760-10-0x00007FF973470000-0x00007FF973665000-memory.dmp

memory/4760-9-0x00007FF973470000-0x00007FF973665000-memory.dmp

memory/4760-11-0x00007FF9312D0000-0x00007FF9312E0000-memory.dmp

memory/4760-7-0x00007FF973470000-0x00007FF973665000-memory.dmp

memory/4760-6-0x00007FF9334F0000-0x00007FF933500000-memory.dmp

memory/4760-12-0x00007FF973470000-0x00007FF973665000-memory.dmp

memory/4760-13-0x00007FF973470000-0x00007FF973665000-memory.dmp

memory/4760-15-0x00007FF9312D0000-0x00007FF9312E0000-memory.dmp

memory/4760-18-0x00007FF973470000-0x00007FF973665000-memory.dmp

memory/4760-17-0x00007FF973470000-0x00007FF973665000-memory.dmp

memory/4760-20-0x00007FF973470000-0x00007FF973665000-memory.dmp

memory/4760-19-0x00007FF973470000-0x00007FF973665000-memory.dmp

memory/4760-16-0x00007FF973470000-0x00007FF973665000-memory.dmp

memory/4760-14-0x00007FF973470000-0x00007FF973665000-memory.dmp

memory/4760-35-0x00007FF973470000-0x00007FF973665000-memory.dmp

memory/4760-37-0x00007FF973470000-0x00007FF973665000-memory.dmp

memory/4760-36-0x00007FF973470000-0x00007FF973665000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

MD5 4f08cf6fa83a0af5cb10c12a293f1548
SHA1 bdfe98e5e2446d273ec9bc1394d9a398c2232920
SHA256 570b30d407f65875db3a8ee57e087b353d77b6dd63fb05940db7a2982181a617
SHA512 7f8421fdc4ebd1ae15cf07e4b5fd40360965e3c13c65463107ebe788e5875d45bf7916963906153e0366124ae0b1f453ec8e6f77df51f55f2a3cf9c773f97ca5

memory/4760-51-0x00007FF973470000-0x00007FF973665000-memory.dmp

memory/4760-52-0x00007FF973470000-0x00007FF973665000-memory.dmp