Malware Analysis Report

2025-03-15 07:16

Sample ID 220708-z6ay5ahdel
Target form 07.08.2022.xls
SHA256 f9b4e27a2cc73cb78d998a2caec3c4d48d8a81b3ec7c7636e16a1d22e775df2f
Tags
macro xlm emotet epoch4 banker suricata trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f9b4e27a2cc73cb78d998a2caec3c4d48d8a81b3ec7c7636e16a1d22e775df2f

Threat Level: Known bad

The file form 07.08.2022.xls was found to be: Known bad.

Malicious Activity Summary

macro xlm emotet epoch4 banker suricata trojan

Emotet

Process spawned unexpected child process

suricata: ET MALWARE W32/Emotet CnC Beacon 3

Suspicious Office macro

Downloads MZ/PE file

Loads dropped DLL

Modifies Internet Explorer settings

Suspicious use of WriteProcessMemory

Gathers network information

Checks processor information in registry

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

Suspicious behavior: AddClipboardFormatListener

Modifies registry class

Enumerates system info in registry

Gathers system information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-07-08 21:19

Signatures

Suspicious Office macro

macro xlm
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-07-08 21:19

Reported

2022-07-08 21:22

Platform

win7-20220414-en

Max time kernel

150s

Max time network

152s

Command Line

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\form 07.08.2022.xls"

Signatures

Emotet

trojan banker emotet

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\SysWOW64\regsvr32.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\SysWOW64\regsvr32.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\SysWOW64\regsvr32.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\SysWOW64\regsvr32.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE

suricata: ET MALWARE W32/Emotet CnC Beacon 3

suricata

Downloads MZ/PE file

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Gathers network information

Description Indicator Process Target
N/A N/A C:\Windows\system32\ipconfig.exe N/A

Gathers system information

Description Indicator Process Target
N/A N/A C:\Windows\system32\systeminfo.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1808 wrote to memory of 1692 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1692 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1692 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1692 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1692 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1692 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1692 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1692 wrote to memory of 364 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1692 wrote to memory of 364 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1692 wrote to memory of 364 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1692 wrote to memory of 364 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1692 wrote to memory of 364 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1692 wrote to memory of 364 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1692 wrote to memory of 364 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 364 wrote to memory of 2044 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 364 wrote to memory of 2044 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 364 wrote to memory of 2044 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 364 wrote to memory of 2044 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 364 wrote to memory of 2044 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1808 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1992 wrote to memory of 860 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1992 wrote to memory of 860 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1992 wrote to memory of 860 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1992 wrote to memory of 860 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1992 wrote to memory of 860 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1992 wrote to memory of 860 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1992 wrote to memory of 860 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 860 wrote to memory of 112 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 860 wrote to memory of 112 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 860 wrote to memory of 112 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 860 wrote to memory of 112 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 860 wrote to memory of 112 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1808 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 1656 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1656 wrote to memory of 740 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1656 wrote to memory of 740 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1656 wrote to memory of 740 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1656 wrote to memory of 740 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1656 wrote to memory of 740 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1656 wrote to memory of 740 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1656 wrote to memory of 740 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 740 wrote to memory of 1040 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 740 wrote to memory of 1040 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 740 wrote to memory of 1040 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 740 wrote to memory of 1040 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 740 wrote to memory of 1040 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1808 wrote to memory of 672 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 672 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 672 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 672 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 672 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 672 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1808 wrote to memory of 672 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\form 07.08.2022.xls"

C:\Windows\SysWOW64\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\soci1.ocx

C:\Windows\system32\regsvr32.exe

/S ..\soci1.ocx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\BhGfXjBTrj\mdjSGCEquTjETiN.dll"

C:\Windows\SysWOW64\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\soci2.ocx

C:\Windows\system32\regsvr32.exe

/S ..\soci2.ocx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\WKzjmvkStcuAhDWO\xTwXDcy.dll"

C:\Windows\SysWOW64\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\soci3.ocx

C:\Windows\system32\regsvr32.exe

/S ..\soci3.ocx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\VkctLP\qgLtT.dll"

C:\Windows\SysWOW64\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\soci4.ocx

C:\Windows\system32\regsvr32.exe

/S ..\soci4.ocx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XMtDsokjnXCCJw\KYcUejwUlLMdnp.dll"

C:\Windows\system32\systeminfo.exe

systeminfo

C:\Windows\system32\ipconfig.exe

ipconfig /all

C:\Windows\system32\nltest.exe

nltest /dclist:

Network

Country Destination Domain Proto
US 8.8.8.8:53 akdalarabic.com udp
US 198.38.82.11:80 akdalarabic.com tcp
US 8.8.8.8:53 greenlizard.co.za udp
ZA 41.204.199.147:443 greenlizard.co.za tcp
US 8.8.8.8:53 borntobefree.org.za udp
ZA 129.232.138.213:80 borntobefree.org.za tcp
US 8.8.8.8:53 wp.eryaz.net udp
TR 188.132.217.108:80 wp.eryaz.net tcp
DE 164.90.222.65:443 164.90.222.65 tcp
US 8.8.8.8:53 www.microsoft.com udp
DE 164.90.222.65:443 164.90.222.65 tcp
DE 164.90.222.65:443 164.90.222.65 tcp
DE 164.90.222.65:443 164.90.222.65 tcp
DE 164.90.222.65:443 164.90.222.65 tcp
TH 49.231.16.102:8080 49.231.16.102 tcp
DE 164.90.222.65:443 164.90.222.65 tcp

Files

memory/1808-54-0x000000002F951000-0x000000002F954000-memory.dmp

memory/1808-55-0x0000000070E61000-0x0000000070E63000-memory.dmp

memory/1808-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

memory/1808-57-0x0000000075BD1000-0x0000000075BD3000-memory.dmp

memory/1808-58-0x0000000071E4D000-0x0000000071E58000-memory.dmp

memory/1692-59-0x0000000000000000-mapping.dmp

C:\Users\Admin\soci1.ocx

MD5 ab2acc5c2bb26950bc48de9613dfcb62
SHA1 7092d5c080e7b2cd325f20eb13700dc1032bd12c
SHA256 3c8ec62ff98d35b55186a4f47491b8d4b9aa670263dc6bb7441d5e4362cd937c
SHA512 ef3a0d8b6b933ddaecb813a2fe4c3620e5f22e3e95519113195ca676eb9c1f3a3444b3ece975183949284324ba5084e8260c54c05ea5ebd5f20f87e7b2b59074

\Users\Admin\soci1.ocx

MD5 ab2acc5c2bb26950bc48de9613dfcb62
SHA1 7092d5c080e7b2cd325f20eb13700dc1032bd12c
SHA256 3c8ec62ff98d35b55186a4f47491b8d4b9aa670263dc6bb7441d5e4362cd937c
SHA512 ef3a0d8b6b933ddaecb813a2fe4c3620e5f22e3e95519113195ca676eb9c1f3a3444b3ece975183949284324ba5084e8260c54c05ea5ebd5f20f87e7b2b59074

memory/364-63-0x0000000000000000-mapping.dmp

memory/364-64-0x000007FEFB671000-0x000007FEFB673000-memory.dmp

\Users\Admin\soci1.ocx

MD5 ab2acc5c2bb26950bc48de9613dfcb62
SHA1 7092d5c080e7b2cd325f20eb13700dc1032bd12c
SHA256 3c8ec62ff98d35b55186a4f47491b8d4b9aa670263dc6bb7441d5e4362cd937c
SHA512 ef3a0d8b6b933ddaecb813a2fe4c3620e5f22e3e95519113195ca676eb9c1f3a3444b3ece975183949284324ba5084e8260c54c05ea5ebd5f20f87e7b2b59074

memory/364-66-0x0000000180000000-0x000000018002D000-memory.dmp

memory/2044-69-0x0000000000000000-mapping.dmp

memory/1992-74-0x0000000000000000-mapping.dmp

C:\Users\Admin\soci2.ocx

MD5 e0b8452c6bf47cde66ca636734e9ad2d
SHA1 cf188793c59cc1c24bce4a7cd178aecc365a0eda
SHA256 025d5b811d7e87002a33fd5936b408847520f2ff4566a0ccc8415733c548e0e9
SHA512 d32e60b34e77bc8d8ab5b19d7a3ab0cba3933e431af90deaf2916699ce7495d133379cbb4cca2efe7578e6034b7e3d31e90cd1aeb65712a9e8d5d0ee087c2384

memory/860-78-0x0000000000000000-mapping.dmp

\Users\Admin\soci2.ocx

MD5 e0b8452c6bf47cde66ca636734e9ad2d
SHA1 cf188793c59cc1c24bce4a7cd178aecc365a0eda
SHA256 025d5b811d7e87002a33fd5936b408847520f2ff4566a0ccc8415733c548e0e9
SHA512 d32e60b34e77bc8d8ab5b19d7a3ab0cba3933e431af90deaf2916699ce7495d133379cbb4cca2efe7578e6034b7e3d31e90cd1aeb65712a9e8d5d0ee087c2384

\Users\Admin\soci2.ocx

MD5 e0b8452c6bf47cde66ca636734e9ad2d
SHA1 cf188793c59cc1c24bce4a7cd178aecc365a0eda
SHA256 025d5b811d7e87002a33fd5936b408847520f2ff4566a0ccc8415733c548e0e9
SHA512 d32e60b34e77bc8d8ab5b19d7a3ab0cba3933e431af90deaf2916699ce7495d133379cbb4cca2efe7578e6034b7e3d31e90cd1aeb65712a9e8d5d0ee087c2384

memory/112-84-0x0000000000000000-mapping.dmp

memory/1656-89-0x0000000000000000-mapping.dmp

C:\Users\Admin\soci3.ocx

MD5 ff70d119341c3ef874832161f09e62e1
SHA1 c43f8dd484844b8e2842800d7ef6663f19abb9b8
SHA256 93b89c28c781946375effcea800532037ecff69449fe1cf65456b536a12adf21
SHA512 5fee80ae4c0d54853514f0575bcdd1989d48fc78a5826cdec70860b76441bf3213493304ef1228d0c3189f4b212c51ca23cd565f01bd263fb5438e5bb4eecf0f

\Users\Admin\soci3.ocx

MD5 ff70d119341c3ef874832161f09e62e1
SHA1 c43f8dd484844b8e2842800d7ef6663f19abb9b8
SHA256 93b89c28c781946375effcea800532037ecff69449fe1cf65456b536a12adf21
SHA512 5fee80ae4c0d54853514f0575bcdd1989d48fc78a5826cdec70860b76441bf3213493304ef1228d0c3189f4b212c51ca23cd565f01bd263fb5438e5bb4eecf0f

memory/740-93-0x0000000000000000-mapping.dmp

\Users\Admin\soci3.ocx

MD5 ff70d119341c3ef874832161f09e62e1
SHA1 c43f8dd484844b8e2842800d7ef6663f19abb9b8
SHA256 93b89c28c781946375effcea800532037ecff69449fe1cf65456b536a12adf21
SHA512 5fee80ae4c0d54853514f0575bcdd1989d48fc78a5826cdec70860b76441bf3213493304ef1228d0c3189f4b212c51ca23cd565f01bd263fb5438e5bb4eecf0f

memory/1040-99-0x0000000000000000-mapping.dmp

memory/672-104-0x0000000000000000-mapping.dmp

C:\Users\Admin\soci4.ocx

MD5 95aafb6c2192edf2b4a3dd089a5ac7cb
SHA1 66aadbe5fce10b05bee0b7726fc9c5b759c428f7
SHA256 c1bc3f02f23030284c910ca6a7a7c188c8a0dbcd28ed70306405960f98f891cf
SHA512 de8360f66c0a7966f9d02cda91507843e2b8e9d96730e638b850c8a6bf439e06f6fcf9f059d33354a2ef7247085dc963267b8abd4b23fccad634616fc4650c1b

\Users\Admin\soci4.ocx

MD5 95aafb6c2192edf2b4a3dd089a5ac7cb
SHA1 66aadbe5fce10b05bee0b7726fc9c5b759c428f7
SHA256 c1bc3f02f23030284c910ca6a7a7c188c8a0dbcd28ed70306405960f98f891cf
SHA512 de8360f66c0a7966f9d02cda91507843e2b8e9d96730e638b850c8a6bf439e06f6fcf9f059d33354a2ef7247085dc963267b8abd4b23fccad634616fc4650c1b

memory/1324-108-0x0000000000000000-mapping.dmp

\Users\Admin\soci4.ocx

MD5 95aafb6c2192edf2b4a3dd089a5ac7cb
SHA1 66aadbe5fce10b05bee0b7726fc9c5b759c428f7
SHA256 c1bc3f02f23030284c910ca6a7a7c188c8a0dbcd28ed70306405960f98f891cf
SHA512 de8360f66c0a7966f9d02cda91507843e2b8e9d96730e638b850c8a6bf439e06f6fcf9f059d33354a2ef7247085dc963267b8abd4b23fccad634616fc4650c1b

memory/1808-114-0x0000000071E4D000-0x0000000071E58000-memory.dmp

memory/1764-115-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 21afdd6894670b071ce0dffcd6c13353
SHA1 da0a0d681a4f19c0fc065752ff9109e045ea3b13
SHA256 39b5d1f16f8a02574a937474c68d6e50196fcba42e09e552f5e81063a31c51d2
SHA512 c6d43eb499c07565f51bf3e65972687f2314b37f312beb6dfc2cbc15b65ed7e6f88d53c7c77630adad0bab8a1ec501c3bd7dd4ea984e14ff34a865c792db9acd

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2b6aa7fd3f081f0b105c1d2453061351
SHA1 07abe73de563448fbb435308988b9cd49b38fe4f
SHA256 c9cb32c8e06ed61fb28e41bddc2461023e63c376633e5fcae8e659e5c1145aa8
SHA512 245e87bdac4410d123bce7978f8889ece5e12b59c8341114413b229dd0b10b4dc0111d8b4485ca2aaa5c45f461117b6ee311cff6d0ae546c04907b276de1234d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 589c442fc7a0c70dca927115a700d41e
SHA1 66a07dace3afbfd1aa07a47e6875beab62c4bb31
SHA256 2e5cb72e9eb43baafb6c6bfcc573aac92f49a8064c483f9d378a9e8e781a526a
SHA512 1b5fa79e52be495c42cf49618441fb7012e28c02e7a08a91da9213db3ab810f0e83485bc1dd5f625a47d0ba7cfcdd5ea50acc9a8dcebb39f048c40f01e94155b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 b839d154dd6bc3e14db460183d53ae5d
SHA1 0f65160da0fe7c0a2ac7f0ffd4fe7a39ea0a35c0
SHA256 9fc8851b198e2138a8f341c13844e407b942850e4d2bc5c2988e51bc93bf2939
SHA512 79f44a87e9ac098005ccc98091c54ba961aa4a4a77f409ae7948fe72148abc752e85d16b60ca611693a0906133b614ed239eda0140c5947a484537c7863261b5

memory/760-125-0x0000000000000000-mapping.dmp

memory/1040-126-0x0000000001E60000-0x0000000001E83000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2291516a65e6f1e4d021813018064ce1
SHA1 84dddeee3b9462fcd493b74752be195de7e891a4
SHA256 bcb0a7b8aa075e74132d5f76d580ee437654b8a2debfa62e5b6d3be20d8aed46
SHA512 66b4c5d2599508ae025799df60f141df07f4e5430bcdce3e18f4887998fa6b21c38dab9d8f2f290b405a895a3291a2ad79a09b3d11dead9a5814c350a500deb4

memory/1152-128-0x0000000000000000-mapping.dmp

memory/1860-129-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 437c0f5222496720ca1d8da990559a2d
SHA1 f5bc3be11deacb26ee9e5b6b224d114c9dda848b
SHA256 860081acefabbeb648af2fa0d79c00c308949be6eaa53863e2d7c87cb0f73563
SHA512 9b6e2d2ee12c4526af40817de7fcc6d8b3d30fb0a764c6effab38fca94acb87b7e703991f7e9700df4e561646b2e6671bc1f426834f6d0af35063f2a7e594a27

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 88cb2fc38a6f161060c3ab0cb91e3189
SHA1 d11cea62e88dd9a83b9600672fe53f2a52230f3b
SHA256 89db935f4508e87531e0d67fd11ead916f9f717b133e7fa91cc759c8bda1935a
SHA512 c997524633d98d53fec08b2197af535f78a096d636787857ddacb690462a795f25a60af3aa165f5b68b3f76e10dab5c3c07fa1e0ddb9a3a02cd9c81abfd6361a

memory/1040-132-0x0000000001E60000-0x0000000001E83000-memory.dmp

memory/1040-133-0x0000000001E60000-0x0000000001E83000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-07-08 21:19

Reported

2022-07-08 21:22

Platform

win10v2004-20220414-en

Max time kernel

151s

Max time network

156s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\form 07.08.2022.xls"

Signatures

Emotet

trojan banker emotet

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

suricata: ET MALWARE W32/Emotet CnC Beacon 3

suricata

Downloads MZ/PE file

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\System32\regsvr32.exe N/A
N/A N/A C:\Windows\System32\regsvr32.exe N/A
N/A N/A C:\Windows\system32\regsvr32.exe N/A
N/A N/A C:\Windows\system32\regsvr32.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Gathers network information

Description Indicator Process Target
N/A N/A C:\Windows\system32\ipconfig.exe N/A

Gathers system information

Description Indicator Process Target
N/A N/A C:\Windows\system32\systeminfo.exe N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3128 wrote to memory of 3940 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 3128 wrote to memory of 3940 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 3128 wrote to memory of 940 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 3128 wrote to memory of 940 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 3128 wrote to memory of 1328 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 3128 wrote to memory of 1328 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 3128 wrote to memory of 396 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 3128 wrote to memory of 396 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 1328 wrote to memory of 5040 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1328 wrote to memory of 5040 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 396 wrote to memory of 4456 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 396 wrote to memory of 4456 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 5040 wrote to memory of 4832 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\systeminfo.exe
PID 5040 wrote to memory of 4832 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\systeminfo.exe
PID 5040 wrote to memory of 4512 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\ipconfig.exe
PID 5040 wrote to memory of 4512 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\ipconfig.exe
PID 5040 wrote to memory of 460 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\nltest.exe
PID 5040 wrote to memory of 460 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\nltest.exe

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\form 07.08.2022.xls"

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\soci1.ocx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\soci2.ocx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\soci3.ocx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\soci4.ocx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\YpNSrsphtUVXiRE\dlEAAPNZLIjvEA.dll"

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZtpfpDY\XtGtdbW.dll"

C:\Windows\system32\systeminfo.exe

systeminfo

C:\Windows\system32\ipconfig.exe

ipconfig /all

C:\Windows\system32\nltest.exe

nltest /dclist:

Network

Country Destination Domain Proto
US 8.8.8.8:53 akdalarabic.com udp
US 198.38.82.11:80 akdalarabic.com tcp
US 52.109.12.19:443 tcp
US 8.8.8.8:53 greenlizard.co.za udp
US 209.197.3.8:80 tcp
US 20.189.173.1:443 tcp
FR 2.18.109.224:443 tcp
US 104.18.25.243:80 tcp
US 8.8.8.8:53 borntobefree.org.za udp
ZA 129.232.138.213:80 borntobefree.org.za tcp
US 8.8.8.8:53 wp.eryaz.net udp
TR 188.132.217.108:80 wp.eryaz.net tcp
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp
DE 164.90.222.65:443 164.90.222.65 tcp
DE 164.90.222.65:443 164.90.222.65 tcp
DE 164.90.222.65:443 164.90.222.65 tcp
BR 45.226.53.34:443 45.226.53.34 tcp
DE 164.90.222.65:443 164.90.222.65 tcp

Files

memory/3128-130-0x00007FFB489B0000-0x00007FFB489C0000-memory.dmp

memory/3128-131-0x00007FFB489B0000-0x00007FFB489C0000-memory.dmp

memory/3128-132-0x00007FFB489B0000-0x00007FFB489C0000-memory.dmp

memory/3128-133-0x00007FFB489B0000-0x00007FFB489C0000-memory.dmp

memory/3128-134-0x00007FFB489B0000-0x00007FFB489C0000-memory.dmp

memory/3128-135-0x00007FFB468B0000-0x00007FFB468C0000-memory.dmp

memory/3128-136-0x00007FFB468B0000-0x00007FFB468C0000-memory.dmp

memory/3940-137-0x0000000000000000-mapping.dmp

memory/940-138-0x0000000000000000-mapping.dmp

memory/1328-139-0x0000000000000000-mapping.dmp

C:\Users\Admin\soci3.ocx

MD5 ff70d119341c3ef874832161f09e62e1
SHA1 c43f8dd484844b8e2842800d7ef6663f19abb9b8
SHA256 93b89c28c781946375effcea800532037ecff69449fe1cf65456b536a12adf21
SHA512 5fee80ae4c0d54853514f0575bcdd1989d48fc78a5826cdec70860b76441bf3213493304ef1228d0c3189f4b212c51ca23cd565f01bd263fb5438e5bb4eecf0f

C:\Users\Admin\soci3.ocx

MD5 ff70d119341c3ef874832161f09e62e1
SHA1 c43f8dd484844b8e2842800d7ef6663f19abb9b8
SHA256 93b89c28c781946375effcea800532037ecff69449fe1cf65456b536a12adf21
SHA512 5fee80ae4c0d54853514f0575bcdd1989d48fc78a5826cdec70860b76441bf3213493304ef1228d0c3189f4b212c51ca23cd565f01bd263fb5438e5bb4eecf0f

memory/1328-142-0x0000000180000000-0x000000018002D000-memory.dmp

memory/396-145-0x0000000000000000-mapping.dmp

C:\Users\Admin\soci4.ocx

MD5 95aafb6c2192edf2b4a3dd089a5ac7cb
SHA1 66aadbe5fce10b05bee0b7726fc9c5b759c428f7
SHA256 c1bc3f02f23030284c910ca6a7a7c188c8a0dbcd28ed70306405960f98f891cf
SHA512 de8360f66c0a7966f9d02cda91507843e2b8e9d96730e638b850c8a6bf439e06f6fcf9f059d33354a2ef7247085dc963267b8abd4b23fccad634616fc4650c1b

C:\Users\Admin\soci4.ocx

MD5 95aafb6c2192edf2b4a3dd089a5ac7cb
SHA1 66aadbe5fce10b05bee0b7726fc9c5b759c428f7
SHA256 c1bc3f02f23030284c910ca6a7a7c188c8a0dbcd28ed70306405960f98f891cf
SHA512 de8360f66c0a7966f9d02cda91507843e2b8e9d96730e638b850c8a6bf439e06f6fcf9f059d33354a2ef7247085dc963267b8abd4b23fccad634616fc4650c1b

memory/5040-151-0x0000000000000000-mapping.dmp

C:\Windows\System32\YpNSrsphtUVXiRE\dlEAAPNZLIjvEA.dll

MD5 ff70d119341c3ef874832161f09e62e1
SHA1 c43f8dd484844b8e2842800d7ef6663f19abb9b8
SHA256 93b89c28c781946375effcea800532037ecff69449fe1cf65456b536a12adf21
SHA512 5fee80ae4c0d54853514f0575bcdd1989d48fc78a5826cdec70860b76441bf3213493304ef1228d0c3189f4b212c51ca23cd565f01bd263fb5438e5bb4eecf0f

memory/4456-153-0x0000000000000000-mapping.dmp

C:\Windows\System32\ZtpfpDY\XtGtdbW.dll

MD5 95aafb6c2192edf2b4a3dd089a5ac7cb
SHA1 66aadbe5fce10b05bee0b7726fc9c5b759c428f7
SHA256 c1bc3f02f23030284c910ca6a7a7c188c8a0dbcd28ed70306405960f98f891cf
SHA512 de8360f66c0a7966f9d02cda91507843e2b8e9d96730e638b850c8a6bf439e06f6fcf9f059d33354a2ef7247085dc963267b8abd4b23fccad634616fc4650c1b

memory/4832-161-0x0000000000000000-mapping.dmp

memory/5040-162-0x0000000002880000-0x00000000028A3000-memory.dmp

memory/4512-163-0x0000000000000000-mapping.dmp

memory/460-164-0x0000000000000000-mapping.dmp

memory/5040-165-0x0000000002880000-0x00000000028A3000-memory.dmp