Analysis Overview
SHA256
55a78e4c2f59100d881daeff60f1d5a70a7f5b15b3126c1bdf670f3437163f9f
Threat Level: Likely malicious
The file 55a78e4c2f59100d881daeff60f1d5a70a7f5b15b3126c1bdf670f3437163f9f was found to be: Likely malicious.
Malicious Activity Summary
Office macro that triggers on suspicious action
Suspicious Office macro
System Location Discovery: System Language Discovery
Office loads VBA resources, possible macro or embedded object present
Enumerates system info in registry
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Checks processor information in registry
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-07-23 21:48
Signatures
Office macro that triggers on suspicious action
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious Office macro
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-07-23 21:48
Reported
2024-07-23 21:49
Platform
win7-20240705-en
Max time kernel
24s
Max time network
17s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
Office loads VBA resources, possible macro or embedded object present
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
Processes
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\55a78e4c2f59100d881daeff60f1d5a70a7f5b15b3126c1bdf670f3437163f9f.xls
Network
Files
memory/448-1-0x0000000073C1D000-0x0000000073C28000-memory.dmp
memory/448-0-0x000000005FFF0000-0x0000000060000000-memory.dmp
memory/448-6-0x0000000000730000-0x0000000000830000-memory.dmp
memory/448-8-0x0000000000730000-0x0000000000830000-memory.dmp
memory/448-7-0x0000000000730000-0x0000000000830000-memory.dmp
memory/448-5-0x0000000000730000-0x0000000000830000-memory.dmp
memory/448-3-0x0000000000730000-0x0000000000830000-memory.dmp
memory/448-2-0x0000000000730000-0x0000000000830000-memory.dmp
memory/448-4-0x0000000000730000-0x0000000000830000-memory.dmp
memory/448-9-0x0000000073C1D000-0x0000000073C28000-memory.dmp
memory/448-10-0x0000000000730000-0x0000000000830000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-07-23 21:48
Reported
2024-07-23 21:49
Platform
win10v2004-20240709-en
Max time kernel
46s
Max time network
37s
Command Line
Signatures
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\BIOS | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Processes
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\55a78e4c2f59100d881daeff60f1d5a70a7f5b15b3126c1bdf670f3437163f9f.xls"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | roaming.officeapps.live.com | udp |
| NL | 52.109.89.19:443 | roaming.officeapps.live.com | tcp |
| US | 8.8.8.8:53 | 46.28.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.89.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 91.16.208.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 147.142.123.92.in-addr.arpa | udp |
Files
memory/4760-1-0x00007FF9334F0000-0x00007FF933500000-memory.dmp
memory/4760-2-0x00007FF9334F0000-0x00007FF933500000-memory.dmp
memory/4760-4-0x00007FF9334F0000-0x00007FF933500000-memory.dmp
memory/4760-0-0x00007FF9334F0000-0x00007FF933500000-memory.dmp
memory/4760-5-0x00007FF973470000-0x00007FF973665000-memory.dmp
memory/4760-3-0x00007FF97350D000-0x00007FF97350E000-memory.dmp
memory/4760-8-0x00007FF973470000-0x00007FF973665000-memory.dmp
memory/4760-10-0x00007FF973470000-0x00007FF973665000-memory.dmp
memory/4760-9-0x00007FF973470000-0x00007FF973665000-memory.dmp
memory/4760-11-0x00007FF9312D0000-0x00007FF9312E0000-memory.dmp
memory/4760-7-0x00007FF973470000-0x00007FF973665000-memory.dmp
memory/4760-6-0x00007FF9334F0000-0x00007FF933500000-memory.dmp
memory/4760-12-0x00007FF973470000-0x00007FF973665000-memory.dmp
memory/4760-13-0x00007FF973470000-0x00007FF973665000-memory.dmp
memory/4760-15-0x00007FF9312D0000-0x00007FF9312E0000-memory.dmp
memory/4760-18-0x00007FF973470000-0x00007FF973665000-memory.dmp
memory/4760-17-0x00007FF973470000-0x00007FF973665000-memory.dmp
memory/4760-20-0x00007FF973470000-0x00007FF973665000-memory.dmp
memory/4760-19-0x00007FF973470000-0x00007FF973665000-memory.dmp
memory/4760-16-0x00007FF973470000-0x00007FF973665000-memory.dmp
memory/4760-14-0x00007FF973470000-0x00007FF973665000-memory.dmp
memory/4760-35-0x00007FF973470000-0x00007FF973665000-memory.dmp
memory/4760-37-0x00007FF973470000-0x00007FF973665000-memory.dmp
memory/4760-36-0x00007FF973470000-0x00007FF973665000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
| MD5 | 4f08cf6fa83a0af5cb10c12a293f1548 |
| SHA1 | bdfe98e5e2446d273ec9bc1394d9a398c2232920 |
| SHA256 | 570b30d407f65875db3a8ee57e087b353d77b6dd63fb05940db7a2982181a617 |
| SHA512 | 7f8421fdc4ebd1ae15cf07e4b5fd40360965e3c13c65463107ebe788e5875d45bf7916963906153e0366124ae0b1f453ec8e6f77df51f55f2a3cf9c773f97ca5 |
memory/4760-51-0x00007FF973470000-0x00007FF973665000-memory.dmp
memory/4760-52-0x00007FF973470000-0x00007FF973665000-memory.dmp