4a0d7e787a0bdfd806d29fe78cb56b3bd257497c59e1f197f72aa51cc91dc696.xls
78KB
21-05-2022 18:00
behavioral2
ce3701bea6edec5491a8fd80388a82fa
4af0feaecc87d1c0a272d5da53196a2789ee4085
4a0d7e787a0bdfd806d29fe78cb56b3bd257497c59e1f197f72aa51cc91dc696
ae8783dcf981e19e7bf760f89f7cc1758cc7273378c9f14dc7c31a5efa3ba6874a634ac2e9b2057e48c0388b863dd11ca894c85b451c390dd909b928c8541bdc
Extracted
Language | xlm4.0 |
Source |
|
URLs |
xlm40.dropper
https://hostal-alfonso12.com/clases/SKtPvv/ xlm40.dropperhttp://howesitgoing.com/images/HyaDnlbl6K7tbh2Lugys/ |
Extracted
Family | emotet |
Botnet | Epoch4 |
C2 |
131.100.24.231:80 103.132.242.26:8080 167.172.253.162:8080 149.56.131.28:8080 209.126.98.206:8080 188.44.20.25:443 212.237.17.99:8080 129.232.188.93:443 160.16.142.56:8080 46.55.222.11:443 1.234.2.232:8080 45.235.8.30:8080 185.157.82.211:8080 158.69.222.101:443 185.4.135.165:8080 27.54.89.58:8080 197.242.150.244:8080 153.126.146.25:7080 183.111.227.137:8080 103.75.201.2:443 45.118.115.99:8080 79.137.35.198:8080 172.104.251.154:8080 159.65.88.10:8080 203.114.109.124:443 101.50.0.91:8080 51.254.140.238:7080 206.189.28.199:8080 72.15.201.15:8080 150.95.66.124:8080 201.94.166.162:443 209.97.163.214:443 103.70.28.102:8080 185.8.212.130:7080 216.158.226.206:443 209.250.246.206:443 23.239.0.12:443 164.68.99.3:8080 102.222.215.74:443 134.122.66.193:8080 82.165.152.127:8080 51.91.76.89:8080 189.126.111.200:7080 146.59.226.45:443 163.44.196.120:8080 51.91.7.5:8080 58.227.42.236:80 167.99.115.35:8080 196.218.30.83:443 107.182.225.142:8080 |
eck1.plain |
|
eck1.plain |
|
Filter: none
-
Emotet
Description
Emotet is a trojan that is primarily spread through spam emails.
Tags
-
Process spawned unexpected child processregsvr32.exe
Description
This typically indicates the parent process was compromised via an exploit or macro.
Reported IOCs
description pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1892 1312 regsvr32.exe EXCEL.EXE -
suricata: ET MALWARE W32/Emotet CnC Beacon 3
Description
suricata: ET MALWARE W32/Emotet CnC Beacon 3
Tags
-
Downloads MZ/PE file
-
Loads dropped DLLregsvr32.exe
Reported IOCs
pid process 1892 regsvr32.exe -
Checks processor information in registryEXCEL.EXE
Description
Processor information is often read in order to detect sandboxing environments.
TTPs
Reported IOCs
description ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registryEXCEL.EXE
TTPs
Reported IOCs
description ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListenerEXCEL.EXE
Reported IOCs
pid process 1312 EXCEL.EXE -
Suspicious behavior: EnumeratesProcessesregsvr32.exe
Reported IOCs
pid process 4916 regsvr32.exe 4916 regsvr32.exe -
Suspicious use of SetWindowsHookExEXCEL.EXE
Reported IOCs
pid process 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE -
Suspicious use of WriteProcessMemoryEXCEL.EXEregsvr32.exe
Reported IOCs
description pid process target process PID 1312 wrote to memory of 1892 1312 EXCEL.EXE regsvr32.exe PID 1312 wrote to memory of 1892 1312 EXCEL.EXE regsvr32.exe PID 1892 wrote to memory of 4916 1892 regsvr32.exe regsvr32.exe PID 1892 wrote to memory of 4916 1892 regsvr32.exe regsvr32.exe
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4a0d7e787a0bdfd806d29fe78cb56b3bd257497c59e1f197f72aa51cc91dc696.xls"Checks processor information in registryEnumerates system info in registrySuspicious behavior: AddClipboardFormatListenerSuspicious use of SetWindowsHookExSuspicious use of WriteProcessMemory
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe ..\wurod.ocxProcess spawned unexpected child processLoads dropped DLLSuspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\VlINXky\ckmmXCTYK.dll"Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\wurod.ocx
MD5ce0df9b58979a3d476082fc2122226de
SHA103487b179efc56057663f40511f449d4d4f041ff
SHA25671fad31e7b696dca9380a03d54b93bd63d8b49e2c113e38821ba1a27d612315e
SHA512c44111591573496261698b6b1236b91c86b7764f76aa46ad138157a7746bf48b4d6990ecd58bf3fd0771c14eb8d87a5883c90647b86362dfef6e1f26fe8eab05
-
\Users\Admin\wurod.ocx
MD5ce0df9b58979a3d476082fc2122226de
SHA103487b179efc56057663f40511f449d4d4f041ff
SHA25671fad31e7b696dca9380a03d54b93bd63d8b49e2c113e38821ba1a27d612315e
SHA512c44111591573496261698b6b1236b91c86b7764f76aa46ad138157a7746bf48b4d6990ecd58bf3fd0771c14eb8d87a5883c90647b86362dfef6e1f26fe8eab05
-
memory/1312-115-0x00007FFE1F3F0000-0x00007FFE1F400000-memory.dmp
-
memory/1312-118-0x00007FFE1F3F0000-0x00007FFE1F400000-memory.dmp
-
memory/1312-127-0x00007FFE1B880000-0x00007FFE1B890000-memory.dmp
-
memory/1312-128-0x00007FFE1B880000-0x00007FFE1B890000-memory.dmp
-
memory/1312-116-0x00007FFE1F3F0000-0x00007FFE1F400000-memory.dmp
-
memory/1312-117-0x00007FFE1F3F0000-0x00007FFE1F400000-memory.dmp
-
memory/1892-257-0x0000000000000000-mapping.dmp
-
memory/1892-262-0x0000000180000000-0x0000000180030000-memory.dmp
-
memory/4916-267-0x0000000000000000-mapping.dmp