Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-05-2022 06:31
Behavioral task
behavioral1
Sample
NOTICE_74572.xls
Resource
win7-20220414-en
General
-
Target
NOTICE_74572.xls
-
Size
73KB
-
MD5
c64292e4b093228141d3531fc50d3faf
-
SHA1
eacc3c8c7cbdc3ec385615c7485ada4c5cc09af4
-
SHA256
db606ab69b263ca51c4b5148f7bd8388278a4954234bd1dbe70bfb358e77420a
-
SHA512
c50c3c29125051d481d723ab7a7eb6dd717ae9e3694dbf09b65b43a974895e17d682331d8b00b9b340f7bc2b0f0b7795af2c83c90a6c6e4c321722ebfece86b7
Malware Config
Extracted
http://ilriparatutto.eu/tmp/0K1NupyKPeX/
Extracted
emotet
Epoch5
93.104.209.107:8080
195.154.146.35:443
202.134.4.210:7080
17.20.148.183:8907
185.148.168.220:8080
68.183.93.250:443
175.126.176.79:8080
77.31.27.120:26351
203.153.216.46:443
202.28.34.99:8080
210.57.209.142:8080
18.229.236.50:18850
36.67.23.59:443
159.69.237.188:443
107.22.159.198:7774
207.148.81.119:8080
54.38.143.246:7080
45.71.195.104:8080
108.159.107.249:48268
45.230.140.156:22366
103.56.149.105:8080
78.46.73.125:443
85.214.67.203:8080
66.42.57.149:443
51.68.141.164:8080
62.182.16.151:39225
54.37.106.167:8080
88.217.172.165:8080
190.90.233.66:443
5.56.132.177:8080
68.183.91.111:8080
188.225.32.231:4143
110.235.83.107:7080
217.182.143.207:443
54.37.228.122:443
103.41.204.169:8080
28.49.84.29:23589
104.248.225.227:8080
118.98.72.86:443
85.25.120.45:8080
54.38.242.185:443
37.44.244.177:8080
87.106.97.83:7080
50.189.40.86:7016
196.44.98.190:8080
108.158.100.139:6752
195.77.239.39:8080
80.11.183.113:63407
194.9.172.107:8080
62.171.178.147:8080
202.29.239.162:443
78.47.204.80:443
103.42.58.120:7080
37.59.209.141:8080
116.124.128.206:8080
139.196.72.155:8080
59.148.253.194:443
178.62.112.199:8080
54.12.95.56:36323
103.133.214.242:8080
72.98.79.0:64683
57.91.102.32:39354
89.99.222.230:14940
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4076 4256 regsvr32.exe 80 -
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 4076 regsvr32.exe 3528 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4256 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3528 regsvr32.exe 3528 regsvr32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4256 EXCEL.EXE 4256 EXCEL.EXE 4256 EXCEL.EXE 4256 EXCEL.EXE 4256 EXCEL.EXE 4256 EXCEL.EXE 4256 EXCEL.EXE 4256 EXCEL.EXE 4256 EXCEL.EXE 4256 EXCEL.EXE 4256 EXCEL.EXE 4256 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4256 wrote to memory of 4076 4256 EXCEL.EXE 87 PID 4256 wrote to memory of 4076 4256 EXCEL.EXE 87 PID 4076 wrote to memory of 3528 4076 regsvr32.exe 89 PID 4076 wrote to memory of 3528 4076 regsvr32.exe 89
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\NOTICE_74572.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe ..\vhdxw.ocx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\IrOSF\EULR.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD5686ab43a0256d0ead904632d5ad3af7c
SHA1491b48e625c3f3828cd197695a6c571fce97811e
SHA25680d754e43df27c9fc6fc6525ddbd6b96e66459200a966b93c2be80936b8e5e37
SHA5129a7cda29794aa07ca61501368f3607fc8c1ecb461725ff98f38a8ea4d38172f64bc4a20d7aeb2046c53d98690d2fcf25050dfadfe5ddfa4f0ed7c2211ac3400c
-
Filesize
364KB
MD5686ab43a0256d0ead904632d5ad3af7c
SHA1491b48e625c3f3828cd197695a6c571fce97811e
SHA25680d754e43df27c9fc6fc6525ddbd6b96e66459200a966b93c2be80936b8e5e37
SHA5129a7cda29794aa07ca61501368f3607fc8c1ecb461725ff98f38a8ea4d38172f64bc4a20d7aeb2046c53d98690d2fcf25050dfadfe5ddfa4f0ed7c2211ac3400c
-
Filesize
364KB
MD5686ab43a0256d0ead904632d5ad3af7c
SHA1491b48e625c3f3828cd197695a6c571fce97811e
SHA25680d754e43df27c9fc6fc6525ddbd6b96e66459200a966b93c2be80936b8e5e37
SHA5129a7cda29794aa07ca61501368f3607fc8c1ecb461725ff98f38a8ea4d38172f64bc4a20d7aeb2046c53d98690d2fcf25050dfadfe5ddfa4f0ed7c2211ac3400c