Malware Analysis Report

2024-10-16 06:27

Sample ID 240925-264ybatakn
Target d918e3e78a25986e395c1c2ac02fe322d3cdb887e6ace4ce0a9a4bfdad695410
SHA256 d918e3e78a25986e395c1c2ac02fe322d3cdb887e6ace4ce0a9a4bfdad695410
Tags
macro macro_on_action ta505 discovery upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d918e3e78a25986e395c1c2ac02fe322d3cdb887e6ace4ce0a9a4bfdad695410

Threat Level: Known bad

The file d918e3e78a25986e395c1c2ac02fe322d3cdb887e6ace4ce0a9a4bfdad695410 was found to be: Known bad.

Malicious Activity Summary

macro macro_on_action ta505 discovery upx

TA505

Suspicious Office macro

Office macro that triggers on suspicious action

Loads dropped DLL

UPX packed file

System Location Discovery: System Language Discovery

Office loads VBA resources, possible macro or embedded object present

Checks processor information in registry

Suspicious use of SetWindowsHookEx

Enumerates system info in registry

Modifies registry class

NTFS ADS

Uses Volume Shadow Copy service COM API

Uses Volume Shadow Copy WMI provider

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: AddClipboardFormatListener

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Uses Task Scheduler COM API

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-09-25 23:12

Signatures

Office macro that triggers on suspicious action

macro macro_on_action
Description Indicator Process Target
N/A N/A N/A N/A

Suspicious Office macro

macro
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-09-25 23:12

Reported

2024-09-25 23:16

Platform

win7-20240903-en

Max time kernel

200s

Max time network

121s

Command Line

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\d918e3e78a25986e395c1c2ac02fe322d3cdb887e6ace4ce0a9a4bfdad695410.xls

Signatures

TA505

ta505

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Office loads VBA resources, possible macro or embedded object present

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF}\ = "Controls" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF}\ = "IScrollbar" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLImage" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\TypeLib\{8BD778C4-B266-479C-AA28-BD7D5DC230BB}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSubmitButton" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9}\ = "ImageEvents" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29}\ = "ControlEvents" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080}\ = "Tabs" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF}\ = "ITabStrip" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcText" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF}\ = "IScrollbar" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{92E11A03-7358-11CE-80CB-00AA00611080} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F}\ = "MultiPageEvents" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074}\ = "IReturnBoolean" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF}\ = "_UserForm" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}\ = "ISpinbutton" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{4C599243-6926-101B-9992-00000B65C6F9} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLHidden" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D}\ = "WHTMLControlEvents" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF}\ = "ITabStrip" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0}\ = "LabelControlEvents" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3}\ = "MdcListEvents" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCheckBox" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3}\ = "MdcToggleButtonEvents" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF}\ = "ILabelControl" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\TypeLib\{8BD778C4-B266-479C-AA28-BD7D5DC230BB}\2.0\FLAGS\ = "6" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcToggleButton" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents5" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcList" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{92E11A03-7358-11CE-80CB-00AA00611080}\ = "Pages" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{47FF8FE5-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents6" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Processes

C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\d918e3e78a25986e395c1c2ac02fe322d3cdb887e6ace4ce0a9a4bfdad695410.xls

Network

Country Destination Domain Proto
US 8.8.8.8:53 xbox-en-cnd.com udp

Files

memory/1416-1-0x000000007248D000-0x0000000072498000-memory.dmp

memory/1416-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

memory/1416-7-0x0000000000470000-0x0000000000570000-memory.dmp

memory/1416-9-0x0000000000470000-0x0000000000570000-memory.dmp

memory/1416-8-0x0000000000470000-0x0000000000570000-memory.dmp

memory/1416-10-0x0000000007120000-0x0000000007220000-memory.dmp

memory/1416-11-0x0000000000470000-0x0000000000570000-memory.dmp

memory/1416-12-0x0000000000470000-0x0000000000570000-memory.dmp

memory/1416-13-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-14-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-15-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-19-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-18-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-17-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-16-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-20-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-38-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-40-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-48-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-42-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-41-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-39-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-37-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-30-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-28-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-26-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-56-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-55-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-54-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-53-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-52-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-51-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-50-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-49-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-27-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-25-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-24-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-23-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-47-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-22-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-29-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-21-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-66-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-63-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-79-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-78-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-74-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-68-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-67-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-65-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-64-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-62-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-61-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-97-0x0000000000470000-0x0000000000570000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\copy13.xlsx

MD5 31a6ba5d186614c2be8969b79c4303c8
SHA1 304bc5bfb4a5eef7027bfe76c114d4524bf7444c
SHA256 56f45130c5e7700317ebe2f358cdaded2e1b3cc22e859b87bfde272e44cad4c3
SHA512 c3a5e468856c4a83331f496e473f97b10f3dac74e69c01b1a230eeab3bec5ca4ec3aeccab309a3204771abb9f6f045918c7702a5c113d8aa8b9feea79065e01a

memory/1416-160-0x000000007248D000-0x0000000072498000-memory.dmp

memory/1416-161-0x0000000006310000-0x0000000006311000-memory.dmp

memory/1416-187-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-186-0x0000000000470000-0x0000000000570000-memory.dmp

memory/1416-189-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-196-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-202-0x0000000006470000-0x0000000006570000-memory.dmp

\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\sample_.dll

MD5 b84b32149c8ca555e6b9a693bfe02dfb
SHA1 39f6770a0a204c7ad34f9c801f8161f74d9ba7d6
SHA256 3e9787ece4961e7bb5b08cc6a99657befd47b5c53ed3ce8f6394a21d009ed195
SHA512 bcae4116c6b59dc1147164edc36e9f89e280d56597c8954ae823abb193139fbc1e63f2bacdc09171b78814aff33aa02ce096eb20a18e3c2de817ed2884ab15c9

memory/1416-209-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-208-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-207-0x0000000010000000-0x0000000010044000-memory.dmp

memory/1416-206-0x00000000077C0000-0x00000000077C1000-memory.dmp

memory/1416-205-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-210-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-211-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-212-0x0000000000470000-0x0000000000570000-memory.dmp

memory/1416-213-0x0000000006310000-0x0000000006311000-memory.dmp

memory/1416-214-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-216-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-217-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-218-0x0000000006470000-0x0000000006570000-memory.dmp

memory/1416-219-0x0000000010000000-0x0000000010044000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-09-25 23:12

Reported

2024-09-25 23:15

Platform

win10v2004-20240802-en

Max time kernel

149s

Max time network

153s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d918e3e78a25986e395c1c2ac02fe322d3cdb887e6ace4ce0a9a4bfdad695410.xls"

Signatures

TA505

ta505

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

NTFS ADS

Description Indicator Process Target
File opened for modification C:\Users\Admin\AppData\Local\Temp\{64FA84BE-657D-48E2-BAAA-6F763DCFFDD8}\627A2645.tmp:Zone.Identifier C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3492 wrote to memory of 5000 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\splwow64.exe
PID 3492 wrote to memory of 5000 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\splwow64.exe

Uses Task Scheduler COM API

persistence

Uses Volume Shadow Copy WMI provider

ransomware

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d918e3e78a25986e395c1c2ac02fe322d3cdb887e6ace4ce0a9a4bfdad695410.xls"

C:\Windows\splwow64.exe

C:\Windows\splwow64.exe 12288

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 97.32.109.52.in-addr.arpa udp
US 8.8.8.8:53 roaming.officeapps.live.com udp
US 8.8.8.8:53 101.209.201.84.in-addr.arpa udp
IE 52.109.76.243:443 roaming.officeapps.live.com tcp
US 8.8.8.8:53 243.76.109.52.in-addr.arpa udp
US 8.8.8.8:53 xbox-en-cnd.com udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 77.239.69.13.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 67.112.168.52.in-addr.arpa udp

Files

memory/3492-1-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp

memory/3492-2-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp

memory/3492-0-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp

memory/3492-3-0x00007FFA89ECD000-0x00007FFA89ECE000-memory.dmp

memory/3492-5-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp

memory/3492-9-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-8-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-7-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-6-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-10-0x00007FFA47D50000-0x00007FFA47D60000-memory.dmp

memory/3492-4-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp

memory/3492-12-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-11-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-13-0x00007FFA47D50000-0x00007FFA47D60000-memory.dmp

memory/3492-14-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-15-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-18-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-19-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-20-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-17-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-16-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-29-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-30-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-77-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\copy13.xlsx

MD5 c0b90c288e7f475b39fd1c5f1adcf9f8
SHA1 4a86715726cde17263805749fb3d91b5432be53c
SHA256 8d9c350504278b7abd52446b42f0e883261f481ad04c5d78034f1e80c2848aea
SHA512 dafbf63bdd9aab1878159493973ec2a303e3cd95ec04c2a1dfbcfac62f8ca3a490115c40a243effaf1b71a2299267e9197ea7675bdebc8e9e73ea5ea891c741e

memory/3492-94-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\sample_.dll

MD5 6264d92d659888cf34dbb0c32f431754
SHA1 ed6066021529d0839f4b6afba2188a35ff295d69
SHA256 86a5c5ba4f2a63fa5b6ae1f6e6b57d52a44ee41bf1c9bacae55fe51ed9f1b080
SHA512 7196bf23d966b0c8709b0ec9d5be692ce9cea3fdb0e185b2bea4c7b09d5effe142060618b0964ad48cb02022b0406e54d5641ae56d20fb16cd915b7d07a2e52d

memory/3492-195-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-196-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-197-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-198-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

memory/3492-199-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

MD5 09a9af016441c3095a0dc321e0615e7d
SHA1 9b96db48204409ecdcf22254fd22b27559c349ae
SHA256 67d78422a59185f26acf7a39d62e0230e759f9e0ea7243e56d8a5144f9bf5913
SHA512 4ac7a4eaedcf4638c19646dbe3a4fa9bdfd082ee90135e88224f980677c0ce6e09c037cc255c68861d5cb9643a0598ba0765aca2329c8a36dbb36fed0e9163b8

memory/3492-233-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp

memory/3492-235-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp

memory/3492-234-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp

memory/3492-232-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp

memory/3492-236-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp