Analysis
-
max time kernel
149s -
max time network
194s -
platform
windows10_x64 -
resource
win10-20220331-en -
submitted
31-03-2022 19:55
Behavioral task
behavioral1
Sample
64d92f79a2d87571d428b7b19ef4f5c1680c24c8952a2f46b84f217cfba19766.xlsm
Resource
win10-20220331-en
General
-
Target
64d92f79a2d87571d428b7b19ef4f5c1680c24c8952a2f46b84f217cfba19766.xlsm
-
Size
46KB
-
MD5
363495acb4327435709de91edaef8338
-
SHA1
11ea485cddc9de2db0397f02f00a564a9468f032
-
SHA256
64d92f79a2d87571d428b7b19ef4f5c1680c24c8952a2f46b84f217cfba19766
-
SHA512
1502abfa4494c69541cbaf3f00b176f04a45802b35a0818f0a46cd229a99dd675a7b8746efa946ea37efd7305c18a00eaba4a48c251d19d084fcbf4e575cf10e
Malware Config
Extracted
http://eles-tech.com/css/KzMysMqFMs/
Extracted
emotet
Epoch4
68.183.94.239:80
104.131.11.205:443
138.197.109.175:8080
187.84.80.182:443
79.143.187.147:443
216.158.226.206:443
167.99.115.35:8080
212.24.98.99:8080
1.234.21.73:7080
206.189.28.199:8080
158.69.222.101:443
164.68.99.3:8080
188.44.20.25:443
185.157.82.211:8080
134.122.66.193:8080
196.218.30.83:443
72.15.201.15:8080
5.9.116.246:8080
176.104.106.96:8080
153.126.146.25:7080
46.55.222.11:443
91.207.28.33:8080
192.99.251.50:443
203.114.109.124:443
51.91.7.5:8080
103.70.28.102:8080
209.250.246.206:443
82.165.152.127:8080
101.50.0.91:8080
151.106.112.196:8080
119.193.124.41:7080
94.23.45.86:4143
51.254.140.238:7080
173.212.193.249:8080
58.227.42.236:80
212.237.17.99:8080
1.234.2.232:8080
45.118.115.99:8080
110.232.117.186:8080
172.104.251.154:8080
159.65.88.10:8080
185.8.212.130:7080
129.232.188.93:443
103.43.46.182:443
103.75.201.2:443
131.100.24.231:80
201.94.166.162:443
45.176.232.124:443
146.59.226.45:443
103.132.242.26:8080
209.126.98.206:8080
197.242.150.244:8080
51.91.76.89:8080
160.16.142.56:8080
176.56.128.118:443
167.172.253.162:8080
189.126.111.200:7080
79.172.212.216:8080
107.182.225.142:8080
50.30.40.196:8080
183.111.227.137:8080
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4684 2160 regsvr32.exe 65 -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/1852-275-0x0000000000400000-0x000000000045F000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4256-277-0x0000000001134179-mapping.dmp WebBrowserPassView behavioral2/memory/4256-281-0x0000000000400000-0x000000000047C000-memory.dmp WebBrowserPassView -
Nirsoft 3 IoCs
resource yara_rule behavioral2/memory/1852-275-0x0000000000400000-0x000000000045F000-memory.dmp Nirsoft behavioral2/memory/4256-277-0x0000000001134179-mapping.dmp Nirsoft behavioral2/memory/4256-281-0x0000000000400000-0x000000000047C000-memory.dmp Nirsoft -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1852 xqpeujyixgfqj.exe 4256 kwjyvmlo.exe -
Loads dropped DLL 1 IoCs
pid Process 4684 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2768928936-1532084270-2243561071-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts xqpeujyixgfqj.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Qgggdqiw\lsooesjbndgvg.cpp regsvr32.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3580 set thread context of 1852 3580 regsvr32.exe 76 PID 3580 set thread context of 4256 3580 regsvr32.exe 77 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3996 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 4068 systeminfo.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2160 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3580 regsvr32.exe 3580 regsvr32.exe 3580 regsvr32.exe 3580 regsvr32.exe 4256 kwjyvmlo.exe 4256 kwjyvmlo.exe 4256 kwjyvmlo.exe 4256 kwjyvmlo.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2160 EXCEL.EXE 2160 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2160 EXCEL.EXE 2160 EXCEL.EXE 2160 EXCEL.EXE 2160 EXCEL.EXE 2160 EXCEL.EXE 2160 EXCEL.EXE 2160 EXCEL.EXE 2160 EXCEL.EXE 2160 EXCEL.EXE 2160 EXCEL.EXE 2160 EXCEL.EXE 2160 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2160 wrote to memory of 4684 2160 EXCEL.EXE 68 PID 2160 wrote to memory of 4684 2160 EXCEL.EXE 68 PID 2160 wrote to memory of 4684 2160 EXCEL.EXE 68 PID 4684 wrote to memory of 3580 4684 regsvr32.exe 70 PID 4684 wrote to memory of 3580 4684 regsvr32.exe 70 PID 4684 wrote to memory of 3580 4684 regsvr32.exe 70 PID 3580 wrote to memory of 4068 3580 regsvr32.exe 71 PID 3580 wrote to memory of 4068 3580 regsvr32.exe 71 PID 3580 wrote to memory of 4068 3580 regsvr32.exe 71 PID 3580 wrote to memory of 3996 3580 regsvr32.exe 74 PID 3580 wrote to memory of 3996 3580 regsvr32.exe 74 PID 3580 wrote to memory of 3996 3580 regsvr32.exe 74 PID 3580 wrote to memory of 1852 3580 regsvr32.exe 76 PID 3580 wrote to memory of 1852 3580 regsvr32.exe 76 PID 3580 wrote to memory of 1852 3580 regsvr32.exe 76 PID 3580 wrote to memory of 1852 3580 regsvr32.exe 76 PID 3580 wrote to memory of 4256 3580 regsvr32.exe 77 PID 3580 wrote to memory of 4256 3580 regsvr32.exe 77 PID 3580 wrote to memory of 4256 3580 regsvr32.exe 77 PID 3580 wrote to memory of 4256 3580 regsvr32.exe 77
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\64d92f79a2d87571d428b7b19ef4f5c1680c24c8952a2f46b84f217cfba19766.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWow64\regsvr32.exeC:\Windows\SysWow64\regsvr32.exe -s ..\xewn.dll2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Qgggdqiw\lsooesjbndgvg.cpp"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:4068
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:3996
-
-
C:\Users\Admin\AppData\Local\Temp\xqpeujyixgfqj.exe"C:\Users\Admin\AppData\Local\Temp\\xqpeujyixgfqj.exe" /scomma "C:\Users\Admin\AppData\Local\Temp\BF8A.tmp"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\kwjyvmlo.exe"C:\Users\Admin\AppData\Local\Temp\\kwjyvmlo.exe" /scomma "C:\Users\Admin\AppData\Local\Temp\3A49.tmp"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4256
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
682B
MD5f272d3d884219b6eca89c9733f10a82b
SHA14fa157f2e6f0c8ba5c07182a64db5d0b174df3e1
SHA25663dc85a4d92ebf20271d969915a65fdc7f8749cc0247599cdbfe5a1dd1665a47
SHA512b5b123d763a4df7112af3d43d6a87855b7ebd5266b040cdf384c36c468277ff28727e0db527c67b4a25357b463d8ad9eeed9505d087e370fa2c8f9b91c485c07
-
Filesize
1.1MB
MD56dd295c9f31ea47b1490e8f95d328c21
SHA13337c8b3e8e6755cbb65f674fc075446bf7ef346
SHA25605323733c0c5d08f3cfc83bc80cb67de74a20a2364fffa5a893bc2eed7600bfe
SHA5125c199f3c5d1fa719c775c96ee1aafd9d10d7450598d84b0c650766967a815e463bc75571a23e35bdd48a0316d01553234bab85328b903159a9c842d40b7cb149
-
Filesize
1.1MB
MD56dd295c9f31ea47b1490e8f95d328c21
SHA13337c8b3e8e6755cbb65f674fc075446bf7ef346
SHA25605323733c0c5d08f3cfc83bc80cb67de74a20a2364fffa5a893bc2eed7600bfe
SHA5125c199f3c5d1fa719c775c96ee1aafd9d10d7450598d84b0c650766967a815e463bc75571a23e35bdd48a0316d01553234bab85328b903159a9c842d40b7cb149
-
Filesize
1.1MB
MD56dd295c9f31ea47b1490e8f95d328c21
SHA13337c8b3e8e6755cbb65f674fc075446bf7ef346
SHA25605323733c0c5d08f3cfc83bc80cb67de74a20a2364fffa5a893bc2eed7600bfe
SHA5125c199f3c5d1fa719c775c96ee1aafd9d10d7450598d84b0c650766967a815e463bc75571a23e35bdd48a0316d01553234bab85328b903159a9c842d40b7cb149
-
Filesize
848KB
MD52147348766671d2c1bec6e78b1b07a7c
SHA1bad65baa7bb7c41379e2c09fad045b973d73683c
SHA25695020cbfd02951720069898bf265f027aa9082b8e7a3fe2468a169c087a5c450
SHA512a6f9aef48e5fc922e8ad0948b88acc22793d644d2cf9eb81e6a9f8d550e9e6a631a99d0b90bfbe533496bca273d76b568667850343535b211c1024f636d4b9e0
-
Filesize
848KB
MD52147348766671d2c1bec6e78b1b07a7c
SHA1bad65baa7bb7c41379e2c09fad045b973d73683c
SHA25695020cbfd02951720069898bf265f027aa9082b8e7a3fe2468a169c087a5c450
SHA512a6f9aef48e5fc922e8ad0948b88acc22793d644d2cf9eb81e6a9f8d550e9e6a631a99d0b90bfbe533496bca273d76b568667850343535b211c1024f636d4b9e0