Analysis Overview
SHA256
36a402b83becc37e6281529b9db77f71cf9e90adfae87e252c310af627dfe8f2
Threat Level: Known bad
The file 36a402b83becc37e6281529b9db77f71cf9e90adfae87e252c310af627dfe8f2 was found to be: Known bad.
Malicious Activity Summary
Process spawned unexpected child process
Suspicious Office macro
System Location Discovery: System Language Discovery
Suspicious behavior: AddClipboardFormatListener
Checks processor information in registry
Suspicious use of FindShellTrayWindow
Enumerates system info in registry
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-11 20:45
Signatures
Suspicious Office macro
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-11 20:45
Reported
2024-11-11 20:48
Platform
win7-20241010-en
Max time kernel
143s
Max time network
153s
Command Line
Signatures
Process spawned unexpected child process
| Description | Indicator | Process | Target |
| Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\SysWOW64\regsvr32.exe | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE |
| Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\SysWOW64\regsvr32.exe | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE |
| Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\SysWOW64\regsvr32.exe | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE |
| Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\SysWOW64\regsvr32.exe | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\36a402b83becc37e6281529b9db77f71cf9e90adfae87e252c310af627dfe8f2.xls
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci1.ocx
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci2.ocx
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci3.ocx
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci4.ocx
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | fisika.mipa.uns.ac.id | udp |
| US | 8.8.8.8:53 | greycoconut.com | udp |
| IN | 180.149.241.246:80 | greycoconut.com | tcp |
| US | 8.8.8.8:53 | www.greycoconut.com | udp |
| IN | 180.149.241.246:80 | www.greycoconut.com | tcp |
| US | 8.8.8.8:53 | zonainformatica.es | udp |
| ES | 82.98.170.50:80 | zonainformatica.es | tcp |
| ES | 82.98.170.50:443 | zonainformatica.es | tcp |
| US | 8.8.8.8:53 | balletmagazine.ro | udp |
| RO | 188.215.244.191:80 | balletmagazine.ro | tcp |
Files
memory/2792-0-0x000000005FFF0000-0x0000000060000000-memory.dmp
memory/2792-1-0x000000007261D000-0x0000000072628000-memory.dmp
C:\Users\Admin\soci2.ocx
| MD5 | 3b79e62476916ff33ddc0668a0898e6d |
| SHA1 | fe4f73a8019a0407cec5e2eb0c344adc4ab73bae |
| SHA256 | 418099d0e61f486fc52144bd0b16c8833b893eb9203163835c59045ca9782b81 |
| SHA512 | 3b42ec3d6c8d68824e43ea8bd0b62c4434fd995f8dc93c3a278e229168b080c5920b226c02236bd98cd7ddadab19536dd05a4e4f35323393ac9ef766b0759bfa |
memory/2792-20-0x000000007261D000-0x0000000072628000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-11 20:45
Reported
2024-11-11 20:48
Platform
win10v2004-20241007-en
Max time kernel
133s
Max time network
142s
Command Line
Signatures
Process spawned unexpected child process
| Description | Indicator | Process | Target |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\BIOS | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\36a402b83becc37e6281529b9db77f71cf9e90adfae87e252c310af627dfe8f2.xls"
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci1.ocx
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci2.ocx
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci3.ocx
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci4.ocx
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | roaming.officeapps.live.com | udp |
| FR | 52.109.68.129:443 | roaming.officeapps.live.com | tcp |
| US | 8.8.8.8:53 | fisika.mipa.uns.ac.id | udp |
| US | 8.8.8.8:53 | greycoconut.com | udp |
| IN | 180.149.241.246:80 | greycoconut.com | tcp |
| US | 8.8.8.8:53 | 46.28.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 129.68.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 17.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.greycoconut.com | udp |
| IN | 180.149.241.246:80 | www.greycoconut.com | tcp |
| US | 8.8.8.8:53 | 246.241.149.180.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | zonainformatica.es | udp |
| ES | 82.98.170.50:80 | zonainformatica.es | tcp |
| ES | 82.98.170.50:443 | zonainformatica.es | tcp |
| US | 8.8.8.8:53 | balletmagazine.ro | udp |
| RO | 188.215.244.191:80 | balletmagazine.ro | tcp |
| US | 8.8.8.8:53 | 50.170.98.82.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 32.169.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 191.244.215.188.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 137.71.105.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 110.11.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 100.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 30.243.111.52.in-addr.arpa | udp |
Files
memory/2332-0-0x00007FFEEB1B0000-0x00007FFEEB1C0000-memory.dmp
memory/2332-3-0x00007FFEEB1B0000-0x00007FFEEB1C0000-memory.dmp
memory/2332-2-0x00007FFEEB1B0000-0x00007FFEEB1C0000-memory.dmp
memory/2332-1-0x00007FFF2B1CD000-0x00007FFF2B1CE000-memory.dmp
memory/2332-4-0x00007FFEEB1B0000-0x00007FFEEB1C0000-memory.dmp
memory/2332-11-0x00007FFF2B130000-0x00007FFF2B325000-memory.dmp
memory/2332-10-0x00007FFF2B130000-0x00007FFF2B325000-memory.dmp
memory/2332-13-0x00007FFF2B130000-0x00007FFF2B325000-memory.dmp
memory/2332-12-0x00007FFF2B130000-0x00007FFF2B325000-memory.dmp
memory/2332-14-0x00007FFEE8A90000-0x00007FFEE8AA0000-memory.dmp
memory/2332-7-0x00007FFF2B130000-0x00007FFF2B325000-memory.dmp
memory/2332-9-0x00007FFF2B130000-0x00007FFF2B325000-memory.dmp
memory/2332-16-0x00007FFEE8A90000-0x00007FFEE8AA0000-memory.dmp
memory/2332-15-0x00007FFF2B130000-0x00007FFF2B325000-memory.dmp
memory/2332-17-0x00007FFF2B130000-0x00007FFF2B325000-memory.dmp
memory/2332-8-0x00007FFF2B130000-0x00007FFF2B325000-memory.dmp
memory/2332-6-0x00007FFF2B130000-0x00007FFF2B325000-memory.dmp
memory/2332-5-0x00007FFEEB1B0000-0x00007FFEEB1C0000-memory.dmp
memory/2332-20-0x00007FFF2B130000-0x00007FFF2B325000-memory.dmp
memory/2332-21-0x00007FFF2B130000-0x00007FFF2B325000-memory.dmp
memory/2332-19-0x00007FFF2B130000-0x00007FFF2B325000-memory.dmp
memory/2332-18-0x00007FFF2B130000-0x00007FFF2B325000-memory.dmp
C:\Users\Admin\soci2.ocx
| MD5 | 3b79e62476916ff33ddc0668a0898e6d |
| SHA1 | fe4f73a8019a0407cec5e2eb0c344adc4ab73bae |
| SHA256 | 418099d0e61f486fc52144bd0b16c8833b893eb9203163835c59045ca9782b81 |
| SHA512 | 3b42ec3d6c8d68824e43ea8bd0b62c4434fd995f8dc93c3a278e229168b080c5920b226c02236bd98cd7ddadab19536dd05a4e4f35323393ac9ef766b0759bfa |
memory/2332-40-0x00007FFF2B130000-0x00007FFF2B325000-memory.dmp
memory/2332-41-0x00007FFF2B1CD000-0x00007FFF2B1CE000-memory.dmp
memory/2332-42-0x00007FFF2B130000-0x00007FFF2B325000-memory.dmp
memory/2332-46-0x00007FFF2B130000-0x00007FFF2B325000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
| MD5 | a64190fe3426ed4e0969d4468cd5dafc |
| SHA1 | 47e7cdc0fe8f2c27ad6aed4477d8f92d441303cc |
| SHA256 | f8743ca730562c47ffc2e5ef59b52cc884d0839eef4d4eb8d61032960ab5cd84 |
| SHA512 | 3c216147f0b1d2b86688d6afcbf7bfffcd73bb6d52386217d10049770f6379c2d80829092cfcea4aa11e6f4773096ca0fd3a969ad731b1128d87beeb0a6e4def |