Analysis Overview
SHA256
9ba11b7c72163ba403152d58384ffe5879d5abda2c30c7fb8a4ad868a2ba0aa5
Threat Level: Known bad
The file 9ba11b7c72163ba403152d58384ffe5879d5abda2c30c7fb8a4ad868a2ba0aa5 was found to be: Known bad.
Malicious Activity Summary
Process spawned unexpected child process
Suspicious Office macro
System Location Discovery: System Language Discovery
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Suspicious use of FindShellTrayWindow
Enumerates system info in registry
Suspicious use of WriteProcessMemory
Checks processor information in registry
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-11 17:49
Signatures
Suspicious Office macro
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-11 17:49
Reported
2024-11-11 17:52
Platform
win7-20240903-en
Max time kernel
145s
Max time network
153s
Command Line
Signatures
Process spawned unexpected child process
| Description | Indicator | Process | Target |
| Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\SysWOW64\regsvr32.exe | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE |
| Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\SysWOW64\regsvr32.exe | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE |
| Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\SysWOW64\regsvr32.exe | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE |
| Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\SysWOW64\regsvr32.exe | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\9ba11b7c72163ba403152d58384ffe5879d5abda2c30c7fb8a4ad868a2ba0aa5.xls
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci1.ocx
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci2.ocx
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci3.ocx
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci4.ocx
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | fisika.mipa.uns.ac.id | udp |
| US | 8.8.8.8:53 | greycoconut.com | udp |
| IN | 180.149.241.246:80 | greycoconut.com | tcp |
| US | 8.8.8.8:53 | www.greycoconut.com | udp |
| IN | 180.149.241.246:80 | www.greycoconut.com | tcp |
| US | 8.8.8.8:53 | zonainformatica.es | udp |
| ES | 82.98.170.50:80 | zonainformatica.es | tcp |
| ES | 82.98.170.50:443 | zonainformatica.es | tcp |
| US | 8.8.8.8:53 | balletmagazine.ro | udp |
| RO | 188.215.244.191:80 | balletmagazine.ro | tcp |
| US | 8.8.8.8:53 | crl.microsoft.com | udp |
| GB | 2.19.117.18:80 | crl.microsoft.com | tcp |
Files
memory/2248-0-0x000000005FFF0000-0x0000000060000000-memory.dmp
memory/2248-1-0x00000000721DD000-0x00000000721E8000-memory.dmp
C:\Users\Admin\soci2.ocx
| MD5 | 3b79e62476916ff33ddc0668a0898e6d |
| SHA1 | fe4f73a8019a0407cec5e2eb0c344adc4ab73bae |
| SHA256 | 418099d0e61f486fc52144bd0b16c8833b893eb9203163835c59045ca9782b81 |
| SHA512 | 3b42ec3d6c8d68824e43ea8bd0b62c4434fd995f8dc93c3a278e229168b080c5920b226c02236bd98cd7ddadab19536dd05a4e4f35323393ac9ef766b0759bfa |
memory/2248-18-0x00000000721DD000-0x00000000721E8000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-11 17:49
Reported
2024-11-11 17:52
Platform
win10v2004-20241007-en
Max time kernel
133s
Max time network
138s
Command Line
Signatures
Process spawned unexpected child process
| Description | Indicator | Process | Target |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\BIOS | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9ba11b7c72163ba403152d58384ffe5879d5abda2c30c7fb8a4ad868a2ba0aa5.xls"
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci1.ocx
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci2.ocx
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci3.ocx
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci4.ocx
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | roaming.officeapps.live.com | udp |
| US | 8.8.8.8:53 | fisika.mipa.uns.ac.id | udp |
| IE | 52.109.76.243:443 | roaming.officeapps.live.com | tcp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.32.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | greycoconut.com | udp |
| IN | 180.149.241.246:80 | greycoconut.com | tcp |
| US | 8.8.8.8:53 | www.greycoconut.com | udp |
| US | 8.8.8.8:53 | 88.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 243.76.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 246.241.149.180.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| IN | 180.149.241.246:80 | www.greycoconut.com | tcp |
| US | 8.8.8.8:53 | zonainformatica.es | udp |
| ES | 82.98.170.50:80 | zonainformatica.es | tcp |
| ES | 82.98.170.50:443 | zonainformatica.es | tcp |
| US | 8.8.8.8:53 | balletmagazine.ro | udp |
| US | 8.8.8.8:53 | 50.170.98.82.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 32.169.19.2.in-addr.arpa | udp |
| RO | 188.215.244.191:80 | balletmagazine.ro | tcp |
| US | 8.8.8.8:53 | 191.244.215.188.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.178.89.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
Files
memory/4556-1-0x00007FFB0CA0D000-0x00007FFB0CA0E000-memory.dmp
memory/4556-0-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp
memory/4556-3-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp
memory/4556-4-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp
memory/4556-2-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp
memory/4556-6-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp
memory/4556-7-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp
memory/4556-5-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp
memory/4556-9-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp
memory/4556-11-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp
memory/4556-12-0x00007FFACA700000-0x00007FFACA710000-memory.dmp
memory/4556-10-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp
memory/4556-8-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp
memory/4556-13-0x00007FFACA700000-0x00007FFACA710000-memory.dmp
memory/4556-14-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp
memory/4556-17-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp
memory/4556-20-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp
memory/4556-19-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp
memory/4556-18-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp
memory/4556-16-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp
memory/4556-15-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp
C:\Users\Admin\soci2.ocx
| MD5 | 3b79e62476916ff33ddc0668a0898e6d |
| SHA1 | fe4f73a8019a0407cec5e2eb0c344adc4ab73bae |
| SHA256 | 418099d0e61f486fc52144bd0b16c8833b893eb9203163835c59045ca9782b81 |
| SHA512 | 3b42ec3d6c8d68824e43ea8bd0b62c4434fd995f8dc93c3a278e229168b080c5920b226c02236bd98cd7ddadab19536dd05a4e4f35323393ac9ef766b0759bfa |
memory/4556-39-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp
memory/4556-40-0x00007FFB0CA0D000-0x00007FFB0CA0E000-memory.dmp
memory/4556-41-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp
memory/4556-42-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp