Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/11/2022, 18:18

General

  • Target

    0211.xls

  • Size

    216KB

  • MD5

    bf5319e9d582876aaaa4df46e74e74ee

  • SHA1

    99b2f1ba3cfd48f344fe0552ff4308b1877f7542

  • SHA256

    65f6bf1299c82659d54482d0d08ed38dcdf61826f7df7fb68301620933e61e16

  • SHA512

    64f7434d8f6f820f270f57806c3eb7679a64ea123d79326db560684215afc9b1118efc4aa084edf5bdab8ef8af95e73f2cfdde68b6516791374a528dda46ce1d

  • SSDEEP

    6144:bKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgDyY+TAQXTHGUMEyP5p6f5jQmP:fbGUMVWlbP

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://helpeve.com/multiwp/cxpkaAkAKPRUs4KL/

xlm40.dropper

http://hsweixintp.com/wp-admin/3c2etiFC2RwmHfTS/

xlm40.dropper

http://9hym.com/images/SXVIe4tbJw8ZCfa4TEt/

xlm40.dropper

http://yuanliao.raluking.com/overemotionality/Vfc9v1ebcmaEguw/

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Downloads MZ/PE file
  • Loads dropped DLL 8 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\0211.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\System32\regsvr32.exe ..\oxnv1.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:320
      • C:\Windows\system32\regsvr32.exe
        ..\oxnv1.ooccxx
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IPBTSYI\KrTfNWRMti.dll"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1468
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\System32\regsvr32.exe ..\oxnv2.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\Windows\system32\regsvr32.exe
        ..\oxnv2.ooccxx
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1620
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\SsZSiqPjEFShMp\cuufCoxw.dll"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1072
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\System32\regsvr32.exe ..\oxnv3.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1352
      • C:\Windows\system32\regsvr32.exe
        ..\oxnv3.ooccxx
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1312
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\YxTYLBOeGL\NARxnpYsTPzKrux.dll"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:628
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\System32\regsvr32.exe ..\oxnv4.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      PID:1764
      • C:\Windows\system32\regsvr32.exe
        ..\oxnv4.ooccxx
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:1840
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GcaLOrCOqLCaPy\AiLW.dll"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\oxnv1.ooccxx

    Filesize

    633KB

    MD5

    bd097f186f0b050e3300c7e4b158880d

    SHA1

    ab4806cfc321d4057a3583b23078c77092192ac2

    SHA256

    9d274d53ec1987f0cfb4249fd099a175db8df4a856dcc89709c064a251c5efb9

    SHA512

    8ef030629b6ff70ab02826e55cace322a1859f96eb284d8a2804d35bd65717e3d4c54161105d39d601710e72cc2bc9927f47a717d284d39f87f3546d4abd4a23

  • C:\Users\Admin\oxnv2.ooccxx

    Filesize

    633KB

    MD5

    6aab3255f64f4d40d3c5fb55550ce6d1

    SHA1

    258a516813694d319c0ef2b0263c5145014bf597

    SHA256

    aefbbd7c91f2eb22c1c980b1e5627aa3f9c1ce4b249cafe23a8ef7ff9a2c4c5f

    SHA512

    5b2713cdd5910e3738bc9c0193ade74ba8fb86bb83d41e8040ea508c48e4ef3028f2026a452ecbf94be9bf1b7c607075296f88760ac2c266bff36c279d778cb3

  • C:\Users\Admin\oxnv3.ooccxx

    Filesize

    633KB

    MD5

    b81cd79c81c7fb34870af05e82386eba

    SHA1

    0a1ea5a61db39a96d2d8467dc07d28e47f7e6039

    SHA256

    0944a6d2a1493899434e2e63bfb3ec2bf33d759019c160c0d5824124c65646c0

    SHA512

    845be234c7d50c3784d04de6f6673df774a74c4779368b0c3409ccd60dcc0d5bed42405db694f2bbc0ddc4a329aa0d42cdae6cb1fa7d236649e36fdbeb5360f9

  • C:\Users\Admin\oxnv4.ooccxx

    Filesize

    633KB

    MD5

    7a1f1f470cef64828e861eddf58f0b34

    SHA1

    1a1acf995c6280776420c583f635b9a74f82271a

    SHA256

    951398ccb098fc3656d24c7164bd7c583afa453df5105a2c066f1668fa790a3e

    SHA512

    bc18141fd2ee5eb34cdf563519a10693d67e99428a5f854921b4ff911ce94d7104b637f86dd5d4530c080f23452bf284f42391e1597f5d8ba2abb1890ab36207

  • \Users\Admin\oxnv1.ooccxx

    Filesize

    633KB

    MD5

    bd097f186f0b050e3300c7e4b158880d

    SHA1

    ab4806cfc321d4057a3583b23078c77092192ac2

    SHA256

    9d274d53ec1987f0cfb4249fd099a175db8df4a856dcc89709c064a251c5efb9

    SHA512

    8ef030629b6ff70ab02826e55cace322a1859f96eb284d8a2804d35bd65717e3d4c54161105d39d601710e72cc2bc9927f47a717d284d39f87f3546d4abd4a23

  • \Users\Admin\oxnv1.ooccxx

    Filesize

    633KB

    MD5

    bd097f186f0b050e3300c7e4b158880d

    SHA1

    ab4806cfc321d4057a3583b23078c77092192ac2

    SHA256

    9d274d53ec1987f0cfb4249fd099a175db8df4a856dcc89709c064a251c5efb9

    SHA512

    8ef030629b6ff70ab02826e55cace322a1859f96eb284d8a2804d35bd65717e3d4c54161105d39d601710e72cc2bc9927f47a717d284d39f87f3546d4abd4a23

  • \Users\Admin\oxnv2.ooccxx

    Filesize

    633KB

    MD5

    6aab3255f64f4d40d3c5fb55550ce6d1

    SHA1

    258a516813694d319c0ef2b0263c5145014bf597

    SHA256

    aefbbd7c91f2eb22c1c980b1e5627aa3f9c1ce4b249cafe23a8ef7ff9a2c4c5f

    SHA512

    5b2713cdd5910e3738bc9c0193ade74ba8fb86bb83d41e8040ea508c48e4ef3028f2026a452ecbf94be9bf1b7c607075296f88760ac2c266bff36c279d778cb3

  • \Users\Admin\oxnv2.ooccxx

    Filesize

    633KB

    MD5

    6aab3255f64f4d40d3c5fb55550ce6d1

    SHA1

    258a516813694d319c0ef2b0263c5145014bf597

    SHA256

    aefbbd7c91f2eb22c1c980b1e5627aa3f9c1ce4b249cafe23a8ef7ff9a2c4c5f

    SHA512

    5b2713cdd5910e3738bc9c0193ade74ba8fb86bb83d41e8040ea508c48e4ef3028f2026a452ecbf94be9bf1b7c607075296f88760ac2c266bff36c279d778cb3

  • \Users\Admin\oxnv3.ooccxx

    Filesize

    633KB

    MD5

    b81cd79c81c7fb34870af05e82386eba

    SHA1

    0a1ea5a61db39a96d2d8467dc07d28e47f7e6039

    SHA256

    0944a6d2a1493899434e2e63bfb3ec2bf33d759019c160c0d5824124c65646c0

    SHA512

    845be234c7d50c3784d04de6f6673df774a74c4779368b0c3409ccd60dcc0d5bed42405db694f2bbc0ddc4a329aa0d42cdae6cb1fa7d236649e36fdbeb5360f9

  • \Users\Admin\oxnv3.ooccxx

    Filesize

    633KB

    MD5

    b81cd79c81c7fb34870af05e82386eba

    SHA1

    0a1ea5a61db39a96d2d8467dc07d28e47f7e6039

    SHA256

    0944a6d2a1493899434e2e63bfb3ec2bf33d759019c160c0d5824124c65646c0

    SHA512

    845be234c7d50c3784d04de6f6673df774a74c4779368b0c3409ccd60dcc0d5bed42405db694f2bbc0ddc4a329aa0d42cdae6cb1fa7d236649e36fdbeb5360f9

  • \Users\Admin\oxnv4.ooccxx

    Filesize

    633KB

    MD5

    7a1f1f470cef64828e861eddf58f0b34

    SHA1

    1a1acf995c6280776420c583f635b9a74f82271a

    SHA256

    951398ccb098fc3656d24c7164bd7c583afa453df5105a2c066f1668fa790a3e

    SHA512

    bc18141fd2ee5eb34cdf563519a10693d67e99428a5f854921b4ff911ce94d7104b637f86dd5d4530c080f23452bf284f42391e1597f5d8ba2abb1890ab36207

  • \Users\Admin\oxnv4.ooccxx

    Filesize

    633KB

    MD5

    7a1f1f470cef64828e861eddf58f0b34

    SHA1

    1a1acf995c6280776420c583f635b9a74f82271a

    SHA256

    951398ccb098fc3656d24c7164bd7c583afa453df5105a2c066f1668fa790a3e

    SHA512

    bc18141fd2ee5eb34cdf563519a10693d67e99428a5f854921b4ff911ce94d7104b637f86dd5d4530c080f23452bf284f42391e1597f5d8ba2abb1890ab36207

  • memory/1884-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1884-57-0x0000000071D9D000-0x0000000071DA8000-memory.dmp

    Filesize

    44KB

  • memory/1884-54-0x000000002F0D1000-0x000000002F0D4000-memory.dmp

    Filesize

    12KB

  • memory/1884-74-0x0000000071D9D000-0x0000000071DA8000-memory.dmp

    Filesize

    44KB

  • memory/1884-55-0x0000000070DB1000-0x0000000070DB3000-memory.dmp

    Filesize

    8KB

  • memory/1884-58-0x0000000075571000-0x0000000075573000-memory.dmp

    Filesize

    8KB

  • memory/1948-64-0x000007FEFB5C1000-0x000007FEFB5C3000-memory.dmp

    Filesize

    8KB

  • memory/1948-66-0x0000000180000000-0x0000000180030000-memory.dmp

    Filesize

    192KB