68d39acfcd55c7009d5a0693e155af5101e16c3f7e865a143aeb10741d93a4c8
68d39acfcd55c7009d5a0693e155af5101e16c3f7e865a143aeb10741d93a4c8.xlsm
83KB
15-01-2022 01:47
4f7df170dc3f0afd4c6de1371b6e46d5
0fcc0c1e8f9b496cbebdef3a71a3bb656f75b4ad
68d39acfcd55c7009d5a0693e155af5101e16c3f7e865a143aeb10741d93a4c8
Extracted
Language | xlm4.0 |
Source |
|
URLs |
xlm40.dropper
http://mail.emilyanncain.com/cgi-bin/A7NT3ENvn/ |
Filter: none
-
Process spawned unexpected child processrundll32.exe
Description
This typically indicates the parent process was compromised via an exploit or macro.
Reported IOCs
description pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3592 3988 rundll32.exe EXCEL.EXE -
suricata: ET MALWARE W32/Emotet CnC Beacon 3
Description
suricata: ET MALWARE W32/Emotet CnC Beacon 3
Tags
-
Blocklisted process makes network requestrundll32.exe
Reported IOCs
flow pid process 43 2328 rundll32.exe 44 2328 rundll32.exe -
Downloads MZ/PE file
-
Loads dropped DLLrundll32.exerundll32.exe
Reported IOCs
pid process 3592 rundll32.exe 840 rundll32.exe -
Drops file in System32 directoryrundll32.exe
Reported IOCs
description ioc process File opened for modification C:\Windows\SysWOW64\Daepwk\rwvknxbjsnhao.yav rundll32.exe -
Enumerates physical storage devices
Description
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
TTPs
-
Checks processor information in registryEXCEL.EXE
Description
Processor information is often read in order to detect sandboxing environments.
TTPs
Reported IOCs
description ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registryEXCEL.EXE
TTPs
Reported IOCs
description ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListenerEXCEL.EXE
Reported IOCs
pid process 3988 EXCEL.EXE -
Suspicious behavior: EnumeratesProcessesrundll32.exe
Reported IOCs
pid process 2328 rundll32.exe 2328 rundll32.exe -
Suspicious use of FindShellTrayWindowEXCEL.EXE
Reported IOCs
pid process 3988 EXCEL.EXE 3988 EXCEL.EXE -
Suspicious use of SetWindowsHookExEXCEL.EXE
Reported IOCs
pid process 3988 EXCEL.EXE 3988 EXCEL.EXE 3988 EXCEL.EXE 3988 EXCEL.EXE 3988 EXCEL.EXE 3988 EXCEL.EXE 3988 EXCEL.EXE 3988 EXCEL.EXE 3988 EXCEL.EXE 3988 EXCEL.EXE 3988 EXCEL.EXE 3988 EXCEL.EXE -
Suspicious use of WriteProcessMemoryEXCEL.EXErundll32.exerundll32.exerundll32.exe
Reported IOCs
description pid process target process PID 3988 wrote to memory of 3592 3988 EXCEL.EXE rundll32.exe PID 3988 wrote to memory of 3592 3988 EXCEL.EXE rundll32.exe PID 3988 wrote to memory of 3592 3988 EXCEL.EXE rundll32.exe PID 3592 wrote to memory of 840 3592 rundll32.exe rundll32.exe PID 3592 wrote to memory of 840 3592 rundll32.exe rundll32.exe PID 3592 wrote to memory of 840 3592 rundll32.exe rundll32.exe PID 840 wrote to memory of 3832 840 rundll32.exe rundll32.exe PID 840 wrote to memory of 3832 840 rundll32.exe rundll32.exe PID 840 wrote to memory of 3832 840 rundll32.exe rundll32.exe PID 3832 wrote to memory of 2328 3832 rundll32.exe rundll32.exe PID 3832 wrote to memory of 2328 3832 rundll32.exe rundll32.exe PID 3832 wrote to memory of 2328 3832 rundll32.exe rundll32.exe
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\68d39acfcd55c7009d5a0693e155af5101e16c3f7e865a143aeb10741d93a4c8.xlsm"Checks processor information in registryEnumerates system info in registrySuspicious behavior: AddClipboardFormatListenerSuspicious use of FindShellTrayWindowSuspicious use of SetWindowsHookExSuspicious use of WriteProcessMemory
-
C:\Windows\SysWow64\rundll32.exeC:\Windows\SysWow64\rundll32.exe ..\erum.ocx,D"&"l"&"lR"&"egister"&"Serve"&"rProcess spawned unexpected child processLoads dropped DLLSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\erum.ocx",DllRegisterServerLoads dropped DLLDrops file in System32 directorySuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Daepwk\rwvknxbjsnhao.yav",rcrXxnJzndlcSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Daepwk\rwvknxbjsnhao.yav",DllRegisterServerBlocklisted process makes network requestSuspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\erum.ocx
MD5fd9a257bffd063031a70d7d3b543d907
SHA12ff28e5249d20bfd5da6acc636f75b971afe1f79
SHA256f99aab0ac2b80b02b8a1ba70b86ff16e9aac1bff1451df307946feb0a42780ee
SHA512d381c098b653627e4f32d4d6a3cb15efab90fa149d0eaa5548a9dfc7f8a9e98ba126d35df0e8ec1b7c226b760bc0c63606b3534a2b8f1324e6da3f719bb7eec1
-
\Users\Admin\erum.ocx
MD5fd9a257bffd063031a70d7d3b543d907
SHA12ff28e5249d20bfd5da6acc636f75b971afe1f79
SHA256f99aab0ac2b80b02b8a1ba70b86ff16e9aac1bff1451df307946feb0a42780ee
SHA512d381c098b653627e4f32d4d6a3cb15efab90fa149d0eaa5548a9dfc7f8a9e98ba126d35df0e8ec1b7c226b760bc0c63606b3534a2b8f1324e6da3f719bb7eec1
-
\Users\Admin\erum.ocx
MD5fd9a257bffd063031a70d7d3b543d907
SHA12ff28e5249d20bfd5da6acc636f75b971afe1f79
SHA256f99aab0ac2b80b02b8a1ba70b86ff16e9aac1bff1451df307946feb0a42780ee
SHA512d381c098b653627e4f32d4d6a3cb15efab90fa149d0eaa5548a9dfc7f8a9e98ba126d35df0e8ec1b7c226b760bc0c63606b3534a2b8f1324e6da3f719bb7eec1
-
memory/840-258-0x0000000000000000-mapping.dmp
-
memory/2328-284-0x0000000000000000-mapping.dmp
-
memory/3592-253-0x0000000000000000-mapping.dmp
-
memory/3832-279-0x0000000000000000-mapping.dmp
-
memory/3988-128-0x00007FFF61D50000-0x00007FFF61D60000-memory.dmp
-
memory/3988-122-0x0000011E21B10000-0x0000011E21B12000-memory.dmp
-
memory/3988-129-0x00007FFF61D50000-0x00007FFF61D60000-memory.dmp
-
memory/3988-121-0x00007FFF65860000-0x00007FFF65870000-memory.dmp
-
memory/3988-120-0x0000011E21B10000-0x0000011E21B12000-memory.dmp
-
memory/3988-119-0x0000011E21B10000-0x0000011E21B12000-memory.dmp
-
memory/3988-118-0x00007FFF65860000-0x00007FFF65870000-memory.dmp
-
memory/3988-117-0x00007FFF65860000-0x00007FFF65870000-memory.dmp
-
memory/3988-116-0x00007FFF65860000-0x00007FFF65870000-memory.dmp
-
memory/3988-115-0x00007FFF65860000-0x00007FFF65870000-memory.dmp