Analysis Overview
SHA256
b7876f48fe052460bed5800bed8b990dc04610a86dd7da26a44e50c3486dbfdc
Threat Level: Known bad
The file b7876f48fe052460bed5800bed8b990dc04610a86dd7da26a44e50c3486dbfdc was found to be: Known bad.
Malicious Activity Summary
Process spawned unexpected child process
Suspicious Office macro
System Location Discovery: System Language Discovery
Suspicious use of WriteProcessMemory
Checks processor information in registry
Enumerates system info in registry
Suspicious behavior: AddClipboardFormatListener
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-11 21:09
Signatures
Suspicious Office macro
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-11 21:09
Reported
2024-11-11 21:12
Platform
win10v2004-20241007-en
Max time kernel
133s
Max time network
139s
Command Line
Signatures
Process spawned unexpected child process
| Description | Indicator | Process | Target |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\BIOS | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b7876f48fe052460bed5800bed8b990dc04610a86dd7da26a44e50c3486dbfdc.xls"
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci1.ocx
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci2.ocx
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci3.ocx
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci4.ocx
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 46.28.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | roaming.officeapps.live.com | udp |
| IE | 52.109.76.243:443 | roaming.officeapps.live.com | tcp |
| US | 8.8.8.8:53 | fisika.mipa.uns.ac.id | udp |
| US | 8.8.8.8:53 | greycoconut.com | udp |
| US | 8.8.8.8:53 | 98.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 243.76.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.31.126.40.in-addr.arpa | udp |
| IN | 180.149.241.246:80 | greycoconut.com | tcp |
| US | 8.8.8.8:53 | www.greycoconut.com | udp |
| IN | 180.149.241.246:80 | www.greycoconut.com | tcp |
| US | 8.8.8.8:53 | 246.241.149.180.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | zonainformatica.es | udp |
| ES | 82.98.170.50:80 | zonainformatica.es | tcp |
| ES | 82.98.170.50:443 | zonainformatica.es | tcp |
| US | 8.8.8.8:53 | 50.170.98.82.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 32.169.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | balletmagazine.ro | udp |
| RO | 188.215.244.191:80 | balletmagazine.ro | tcp |
| US | 8.8.8.8:53 | 191.244.215.188.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.73.42.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 72.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
Files
memory/4404-0-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp
memory/4404-2-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp
memory/4404-3-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp
memory/4404-1-0x00007FFC9E28D000-0x00007FFC9E28E000-memory.dmp
memory/4404-6-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp
memory/4404-5-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp
memory/4404-4-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp
memory/4404-7-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp
memory/4404-9-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp
memory/4404-8-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp
memory/4404-10-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp
memory/4404-11-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp
memory/4404-12-0x00007FFC5B910000-0x00007FFC5B920000-memory.dmp
memory/4404-14-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp
memory/4404-16-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp
memory/4404-15-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp
memory/4404-17-0x00007FFC5B910000-0x00007FFC5B920000-memory.dmp
memory/4404-13-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp
memory/4404-19-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp
memory/4404-18-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp
C:\Users\Admin\soci2.ocx
| MD5 | 3b79e62476916ff33ddc0668a0898e6d |
| SHA1 | fe4f73a8019a0407cec5e2eb0c344adc4ab73bae |
| SHA256 | 418099d0e61f486fc52144bd0b16c8833b893eb9203163835c59045ca9782b81 |
| SHA512 | 3b42ec3d6c8d68824e43ea8bd0b62c4434fd995f8dc93c3a278e229168b080c5920b226c02236bd98cd7ddadab19536dd05a4e4f35323393ac9ef766b0759bfa |
memory/4404-38-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp
memory/4404-39-0x00007FFC9E28D000-0x00007FFC9E28E000-memory.dmp
memory/4404-40-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp
memory/4404-44-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
| MD5 | afc625d5c9b24a392e63801650af663f |
| SHA1 | 81bb176106802198a54dd652601a47d803dc9828 |
| SHA256 | 2b134e10a588944aa1ae05d84b3e5b87547f071fbf6368213c8b0b139c97cb64 |
| SHA512 | 4533fa73dfa4df5e32393031d8d18ee5e9e88df680e5e418315086ba75a6b5b4c9b3127920254c93b75b7c9d18be2ec7566d98d8b71a8e8d2e86eefe43993139 |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-11 21:09
Reported
2024-11-11 21:12
Platform
win7-20240903-en
Max time kernel
141s
Max time network
146s
Command Line
Signatures
Process spawned unexpected child process
| Description | Indicator | Process | Target |
| Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\SysWOW64\regsvr32.exe | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE |
| Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\SysWOW64\regsvr32.exe | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE |
| Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\SysWOW64\regsvr32.exe | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE |
| Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\SysWOW64\regsvr32.exe | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\b7876f48fe052460bed5800bed8b990dc04610a86dd7da26a44e50c3486dbfdc.xls
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci1.ocx
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci2.ocx
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci3.ocx
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\soci4.ocx
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | fisika.mipa.uns.ac.id | udp |
| US | 8.8.8.8:53 | greycoconut.com | udp |
| IN | 180.149.241.246:80 | greycoconut.com | tcp |
| US | 8.8.8.8:53 | www.greycoconut.com | udp |
| IN | 180.149.241.246:80 | www.greycoconut.com | tcp |
| US | 8.8.8.8:53 | zonainformatica.es | udp |
| ES | 82.98.170.50:80 | zonainformatica.es | tcp |
| ES | 82.98.170.50:443 | zonainformatica.es | tcp |
| US | 8.8.8.8:53 | balletmagazine.ro | udp |
| RO | 188.215.244.191:80 | balletmagazine.ro | tcp |
| US | 8.8.8.8:53 | crl.microsoft.com | udp |
| GB | 2.19.117.22:80 | crl.microsoft.com | tcp |
Files
memory/1940-0-0x000000005FFF0000-0x0000000060000000-memory.dmp
memory/1940-1-0x000000007228D000-0x0000000072298000-memory.dmp
C:\Users\Admin\soci2.ocx
| MD5 | 3b79e62476916ff33ddc0668a0898e6d |
| SHA1 | fe4f73a8019a0407cec5e2eb0c344adc4ab73bae |
| SHA256 | 418099d0e61f486fc52144bd0b16c8833b893eb9203163835c59045ca9782b81 |
| SHA512 | 3b42ec3d6c8d68824e43ea8bd0b62c4434fd995f8dc93c3a278e229168b080c5920b226c02236bd98cd7ddadab19536dd05a4e4f35323393ac9ef766b0759bfa |
memory/1940-18-0x000000007228D000-0x0000000072298000-memory.dmp