Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 04:44
Behavioral task
behavioral1
Sample
KL-5216 report.xls
Resource
win7-20220414-en
General
-
Target
KL-5216 report.xls
-
Size
67KB
-
MD5
06f5b0abbdbc2f81e68ead7782176ee1
-
SHA1
4408e9220b0a5e88f5e190958ed70c45f965d2a3
-
SHA256
1e2c8ebf40d4102193dd68bcfecc15dee112321c579e9bf88bac19a13f1f8ce3
-
SHA512
3802814eb60c2ef400bad36642a3821d32139266680b8df134e96632ee059cf743eeb1709890a0ab00b77e07607f15f4c2830b92cb129d53ad92b08b1a4bc77d
Malware Config
Extracted
https://microlent.com/admin/3/
http://kuluckaci.com/yarisma/cgi-bin/aIuI4Ukdtl730sP1F/
http://mcapublicschool.com/Achievements/r4psv/
http://moorworld.com/aspnet_client/fTDJOdTa1USKl43wFtnb/
Extracted
emotet
Epoch4
212.24.98.99:8080
51.91.76.89:8080
94.23.45.86:4143
101.50.0.91:8080
103.43.75.120:443
212.237.17.99:8080
158.69.222.101:443
51.254.140.238:7080
1.234.2.232:8080
91.207.28.33:8080
167.172.253.162:8080
45.235.8.30:8080
115.68.227.76:8080
134.122.66.193:8080
89.29.244.7:443
197.242.150.244:8080
164.68.99.3:8080
5.9.116.246:8080
1.234.21.73:7080
131.100.24.231:80
185.4.135.165:8080
72.15.201.15:8080
206.189.28.199:8080
203.114.109.124:443
149.56.131.28:8080
45.176.232.124:443
103.75.201.2:443
58.227.42.236:80
53.61.228.110:19290
172.104.251.154:8080
82.165.152.127:8080
45.118.115.99:8080
201.94.166.162:443
103.70.28.102:8080
213.241.20.155:443
129.232.188.93:443
146.59.226.45:443
173.82.82.196:8080
209.97.163.214:443
159.65.88.10:8080
159.65.140.115:443
160.16.142.56:8080
151.106.112.196:8080
107.170.39.149:8080
77.81.247.144:8080
173.239.37.178:8080
173.212.193.249:8080
163.44.196.120:8080
150.95.66.124:8080
152.136.229.39:8080
196.218.30.83:443
183.111.227.137:8080
119.193.124.41:7080
188.44.20.25:443
79.137.35.198:8080
102.222.215.74:443
110.232.117.186:8080
46.55.222.11:443
103.132.242.26:8080
159.89.202.34:443
153.126.146.25:7080
209.126.98.206:8080
82.223.21.224:8080
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 5000 3848 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2604 3848 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3880 3848 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 740 3848 regsvr32.exe EXCEL.EXE -
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Downloads MZ/PE file
-
Loads dropped DLL 8 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exepid process 5000 regsvr32.exe 2604 regsvr32.exe 1336 regsvr32.exe 4452 regsvr32.exe 3880 regsvr32.exe 3932 regsvr32.exe 740 regsvr32.exe 2308 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 3848 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exepid process 1336 regsvr32.exe 1336 regsvr32.exe 4452 regsvr32.exe 4452 regsvr32.exe 3932 regsvr32.exe 3932 regsvr32.exe 2308 regsvr32.exe 2308 regsvr32.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
EXCEL.EXEpid process 3848 EXCEL.EXE 3848 EXCEL.EXE 3848 EXCEL.EXE 3848 EXCEL.EXE 3848 EXCEL.EXE 3848 EXCEL.EXE 3848 EXCEL.EXE 3848 EXCEL.EXE 3848 EXCEL.EXE 3848 EXCEL.EXE 3848 EXCEL.EXE 3848 EXCEL.EXE 3848 EXCEL.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
EXCEL.EXEregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exedescription pid process target process PID 3848 wrote to memory of 5000 3848 EXCEL.EXE regsvr32.exe PID 3848 wrote to memory of 5000 3848 EXCEL.EXE regsvr32.exe PID 3848 wrote to memory of 2604 3848 EXCEL.EXE regsvr32.exe PID 3848 wrote to memory of 2604 3848 EXCEL.EXE regsvr32.exe PID 2604 wrote to memory of 4452 2604 regsvr32.exe regsvr32.exe PID 2604 wrote to memory of 4452 2604 regsvr32.exe regsvr32.exe PID 5000 wrote to memory of 1336 5000 regsvr32.exe regsvr32.exe PID 5000 wrote to memory of 1336 5000 regsvr32.exe regsvr32.exe PID 3848 wrote to memory of 3880 3848 EXCEL.EXE regsvr32.exe PID 3848 wrote to memory of 3880 3848 EXCEL.EXE regsvr32.exe PID 3880 wrote to memory of 3932 3880 regsvr32.exe regsvr32.exe PID 3880 wrote to memory of 3932 3880 regsvr32.exe regsvr32.exe PID 3848 wrote to memory of 740 3848 EXCEL.EXE regsvr32.exe PID 3848 wrote to memory of 740 3848 EXCEL.EXE regsvr32.exe PID 740 wrote to memory of 2308 740 regsvr32.exe regsvr32.exe PID 740 wrote to memory of 2308 740 regsvr32.exe regsvr32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\KL-5216 report.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\CBQNjgXcFuG\qOfkP.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\JMxJeWq\BiPCfjl.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\KvwYlqypDYu\JDxaH.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\EVFEPeNvZjQAZObP\AyLSSJmsV.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\uxevr1.ocxFilesize
356KB
MD5f16e5996921b55a153c4766ea22d9032
SHA17337b69eb22e877470c9b5b33040e1103bd19ad7
SHA2565c513bf214f90b066dabbfa3c92eafa7841934f7b682d58a1f383d3e2641fcfe
SHA5129f43cdb30d1ecde4563b6e856fdd688377c4633e736d9287431849f47a2719b69de0ea0489dcecd9873c886de6c8ddbe5fd2d66e9a3d0c656a108d2f8eec14fd
-
C:\Users\Admin\uxevr1.ocxFilesize
356KB
MD5f16e5996921b55a153c4766ea22d9032
SHA17337b69eb22e877470c9b5b33040e1103bd19ad7
SHA2565c513bf214f90b066dabbfa3c92eafa7841934f7b682d58a1f383d3e2641fcfe
SHA5129f43cdb30d1ecde4563b6e856fdd688377c4633e736d9287431849f47a2719b69de0ea0489dcecd9873c886de6c8ddbe5fd2d66e9a3d0c656a108d2f8eec14fd
-
C:\Users\Admin\uxevr2.ocxFilesize
356KB
MD54024be9458eabc878cd263185d7ea007
SHA125fba9d3cbc8543b218ea60cd2e7f9c02f13ddd2
SHA256310135cdfe333a091d400b1939be3a1404d3d6d399632c1848105f1a70c54ef6
SHA5124faea29137f2fb9fef01fd5434861809e251ec8254727bc49bee7aa51386ca33830de89e50c0017833a57a8773ca1deff48637905110d6d03819739e1a82ee78
-
C:\Users\Admin\uxevr2.ocxFilesize
356KB
MD54024be9458eabc878cd263185d7ea007
SHA125fba9d3cbc8543b218ea60cd2e7f9c02f13ddd2
SHA256310135cdfe333a091d400b1939be3a1404d3d6d399632c1848105f1a70c54ef6
SHA5124faea29137f2fb9fef01fd5434861809e251ec8254727bc49bee7aa51386ca33830de89e50c0017833a57a8773ca1deff48637905110d6d03819739e1a82ee78
-
C:\Users\Admin\uxevr3.ocxFilesize
356KB
MD50d77e48d483bc9ee864a93ace7422a94
SHA137aa070677816592fea7f3c645bfb13bc2a480e0
SHA2566dc84795a6fa4389820fa39c402ff296e30c3bea5a736569c3739bbc710a8855
SHA512154d13ce04ea3d74a63764efaf235fbbc1da34ff943b99237a2fa5a76b4fb7c535ed5182fdad70075b5ab92ab141644f4ebf30f9c343f782f56211d53557c6e6
-
C:\Users\Admin\uxevr3.ocxFilesize
356KB
MD50d77e48d483bc9ee864a93ace7422a94
SHA137aa070677816592fea7f3c645bfb13bc2a480e0
SHA2566dc84795a6fa4389820fa39c402ff296e30c3bea5a736569c3739bbc710a8855
SHA512154d13ce04ea3d74a63764efaf235fbbc1da34ff943b99237a2fa5a76b4fb7c535ed5182fdad70075b5ab92ab141644f4ebf30f9c343f782f56211d53557c6e6
-
C:\Users\Admin\uxevr4.ocxFilesize
356KB
MD5e77c54f186a2010102c333fa3a36ce0e
SHA123c20f14d3e054cece17a41fce36d0c65dc35b67
SHA256e2879e6cb0d7b3af3e7d54b84c87a30599b864c7275113a906b63d34d8b3feba
SHA512a8e609c25c9eef1970fb0679477fc6192c7d4d2375c0e10216d1e42f071840a29bacb589790d05c18667f0642b8bcdb3605fd38993f55c24fa9b620c4f039c73
-
C:\Users\Admin\uxevr4.ocxFilesize
356KB
MD5e77c54f186a2010102c333fa3a36ce0e
SHA123c20f14d3e054cece17a41fce36d0c65dc35b67
SHA256e2879e6cb0d7b3af3e7d54b84c87a30599b864c7275113a906b63d34d8b3feba
SHA512a8e609c25c9eef1970fb0679477fc6192c7d4d2375c0e10216d1e42f071840a29bacb589790d05c18667f0642b8bcdb3605fd38993f55c24fa9b620c4f039c73
-
C:\Windows\System32\CBQNjgXcFuG\qOfkP.dllFilesize
356KB
MD5f16e5996921b55a153c4766ea22d9032
SHA17337b69eb22e877470c9b5b33040e1103bd19ad7
SHA2565c513bf214f90b066dabbfa3c92eafa7841934f7b682d58a1f383d3e2641fcfe
SHA5129f43cdb30d1ecde4563b6e856fdd688377c4633e736d9287431849f47a2719b69de0ea0489dcecd9873c886de6c8ddbe5fd2d66e9a3d0c656a108d2f8eec14fd
-
C:\Windows\System32\EVFEPeNvZjQAZObP\AyLSSJmsV.dllFilesize
356KB
MD5e77c54f186a2010102c333fa3a36ce0e
SHA123c20f14d3e054cece17a41fce36d0c65dc35b67
SHA256e2879e6cb0d7b3af3e7d54b84c87a30599b864c7275113a906b63d34d8b3feba
SHA512a8e609c25c9eef1970fb0679477fc6192c7d4d2375c0e10216d1e42f071840a29bacb589790d05c18667f0642b8bcdb3605fd38993f55c24fa9b620c4f039c73
-
C:\Windows\System32\JMxJeWq\BiPCfjl.dllFilesize
356KB
MD54024be9458eabc878cd263185d7ea007
SHA125fba9d3cbc8543b218ea60cd2e7f9c02f13ddd2
SHA256310135cdfe333a091d400b1939be3a1404d3d6d399632c1848105f1a70c54ef6
SHA5124faea29137f2fb9fef01fd5434861809e251ec8254727bc49bee7aa51386ca33830de89e50c0017833a57a8773ca1deff48637905110d6d03819739e1a82ee78
-
C:\Windows\System32\KvwYlqypDYu\JDxaH.dllFilesize
356KB
MD50d77e48d483bc9ee864a93ace7422a94
SHA137aa070677816592fea7f3c645bfb13bc2a480e0
SHA2566dc84795a6fa4389820fa39c402ff296e30c3bea5a736569c3739bbc710a8855
SHA512154d13ce04ea3d74a63764efaf235fbbc1da34ff943b99237a2fa5a76b4fb7c535ed5182fdad70075b5ab92ab141644f4ebf30f9c343f782f56211d53557c6e6
-
memory/740-170-0x0000000000000000-mapping.dmp
-
memory/1336-150-0x0000000000000000-mapping.dmp
-
memory/2308-176-0x0000000000000000-mapping.dmp
-
memory/2604-143-0x0000000000000000-mapping.dmp
-
memory/3848-135-0x00007FFA990C0000-0x00007FFA990D0000-memory.dmpFilesize
64KB
-
memory/3848-134-0x00007FFA9B690000-0x00007FFA9B6A0000-memory.dmpFilesize
64KB
-
memory/3848-133-0x00007FFA9B690000-0x00007FFA9B6A0000-memory.dmpFilesize
64KB
-
memory/3848-132-0x00007FFA9B690000-0x00007FFA9B6A0000-memory.dmpFilesize
64KB
-
memory/3848-130-0x00007FFA9B690000-0x00007FFA9B6A0000-memory.dmpFilesize
64KB
-
memory/3848-136-0x00007FFA990C0000-0x00007FFA990D0000-memory.dmpFilesize
64KB
-
memory/3848-131-0x00007FFA9B690000-0x00007FFA9B6A0000-memory.dmpFilesize
64KB
-
memory/3880-155-0x0000000000000000-mapping.dmp
-
memory/3932-165-0x0000000000000000-mapping.dmp
-
memory/4452-149-0x0000000000000000-mapping.dmp
-
memory/5000-140-0x0000000180000000-0x000000018002F000-memory.dmpFilesize
188KB
-
memory/5000-137-0x0000000000000000-mapping.dmp