Analysis
-
max time kernel
101s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
03/11/2022, 23:44
Behavioral task
behavioral1
Sample
f30590d2f718c1ebf0e151eaa76cbc5aa448a6a0164b9808bbc7e5270fa5c4cd.xls
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
f30590d2f718c1ebf0e151eaa76cbc5aa448a6a0164b9808bbc7e5270fa5c4cd.xls
Resource
win10-20220812-en
General
-
Target
f30590d2f718c1ebf0e151eaa76cbc5aa448a6a0164b9808bbc7e5270fa5c4cd.xls
-
Size
217KB
-
MD5
a18b1c3bb96c0c330dc09757c51a70e9
-
SHA1
96cc199123a1581654a58158f84e33b5022c07be
-
SHA256
f30590d2f718c1ebf0e151eaa76cbc5aa448a6a0164b9808bbc7e5270fa5c4cd
-
SHA512
425cae363ea2341dd56f52f590d43f8423fdcdcfb5f16ccc2e841c461c1f1974f1d2fd686d0fb72ee9eedb8893bc60a13dce64da3204f150b9e720aabb017637
-
SSDEEP
6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgXyY+TAQXTHGUMEyP5p6f5jQmK:DbGUMVWlbK
Malware Config
Extracted
https://barkstage.es/wp-content/0E7NdYl7TZuHMJq7/
http://contactworks.nl/images_old/NuEAhfF0PCFhvv/
http://www.iam.ch/wp-content/cache/minify/O1OAjWnfen/
https://www.elaboro.pl/wp-admin/J0hwyIMsk9YFIi/
Extracted
emotet
Epoch5
178.238.225.252:8080
139.196.72.155:8080
36.67.23.59:443
103.56.149.105:8080
37.44.244.177:8080
85.25.120.45:8080
202.134.4.210:7080
78.47.204.80:443
83.229.80.93:8080
93.104.209.107:8080
80.211.107.116:8080
165.22.254.236:8080
104.244.79.94:443
185.148.169.10:8080
190.145.8.4:443
175.126.176.79:8080
139.59.80.108:8080
188.165.79.151:443
128.199.217.206:443
64.227.55.231:8080
218.38.121.17:443
103.71.99.57:8080
103.224.241.74:8080
128.199.242.164:8080
85.214.67.203:8080
103.254.12.236:7080
46.101.98.60:8080
178.62.112.199:8080
210.57.209.142:8080
195.77.239.39:8080
103.126.216.86:443
82.98.180.154:7080
202.28.34.99:8080
174.138.33.49:7080
160.16.143.191:8080
51.75.33.122:443
103.41.204.169:8080
186.250.48.5:443
87.106.97.83:7080
118.98.72.86:443
196.44.98.190:8080
103.85.95.4:8080
62.171.178.147:8080
54.37.228.122:443
114.79.130.68:443
198.199.70.22:8080
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3604 2432 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3080 2432 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3180 2432 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 752 2432 regsvr32.exe 65 -
Downloads MZ/PE file
-
Loads dropped DLL 3 IoCs
pid Process 3604 regsvr32.exe 3080 regsvr32.exe 752 regsvr32.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DAtbvOPkWGrGKK.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\WpPtAfGm\\DAtbvOPkWGrGKK.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oEqA.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\RoLiEHpfvrNfTE\\oEqA.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cOUGSFZ.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\VxzOUAsgLXX\\cOUGSFZ.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2432 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3604 regsvr32.exe 3604 regsvr32.exe 3192 regsvr32.exe 3192 regsvr32.exe 3080 regsvr32.exe 3080 regsvr32.exe 3192 regsvr32.exe 3192 regsvr32.exe 4348 regsvr32.exe 4348 regsvr32.exe 4348 regsvr32.exe 4348 regsvr32.exe 752 regsvr32.exe 752 regsvr32.exe 796 regsvr32.exe 796 regsvr32.exe 796 regsvr32.exe 796 regsvr32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2432 EXCEL.EXE 2432 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2432 EXCEL.EXE 2432 EXCEL.EXE 2432 EXCEL.EXE 2432 EXCEL.EXE 2432 EXCEL.EXE 2432 EXCEL.EXE 2432 EXCEL.EXE 2432 EXCEL.EXE 2432 EXCEL.EXE 2432 EXCEL.EXE 2432 EXCEL.EXE 2432 EXCEL.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2432 wrote to memory of 3604 2432 EXCEL.EXE 68 PID 2432 wrote to memory of 3604 2432 EXCEL.EXE 68 PID 3604 wrote to memory of 3192 3604 regsvr32.exe 71 PID 3604 wrote to memory of 3192 3604 regsvr32.exe 71 PID 2432 wrote to memory of 3080 2432 EXCEL.EXE 74 PID 2432 wrote to memory of 3080 2432 EXCEL.EXE 74 PID 3080 wrote to memory of 4348 3080 regsvr32.exe 76 PID 3080 wrote to memory of 4348 3080 regsvr32.exe 76 PID 2432 wrote to memory of 3180 2432 EXCEL.EXE 77 PID 2432 wrote to memory of 3180 2432 EXCEL.EXE 77 PID 2432 wrote to memory of 752 2432 EXCEL.EXE 78 PID 2432 wrote to memory of 752 2432 EXCEL.EXE 78 PID 752 wrote to memory of 796 752 regsvr32.exe 79 PID 752 wrote to memory of 796 752 regsvr32.exe 79
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f30590d2f718c1ebf0e151eaa76cbc5aa448a6a0164b9808bbc7e5270fa5c4cd.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\WpPtAfGm\DAtbvOPkWGrGKK.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\RoLiEHpfvrNfTE\oEqA.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4348
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
PID:3180
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\VxzOUAsgLXX\cOUGSFZ.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:796
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD51c91753d3175a40ec661626b0e88d5df
SHA1ea2d3f8dba19f39fac064934c9b8a4641336d533
SHA25665b55af0472f03626aa4dada7e205b5c0d0f5f21e7c28525472556309292388c
SHA512009f4221384c949aaf70f9e280a7411a1761f71af62d514c05a26f215d5174f1179a698533f066c205d595e9424506d798438c3b3de49c13f94efd3c2105bc8b
-
Filesize
751KB
MD5b14be8fc633297f6ecb91561f802ad22
SHA1d8513919970e76543d19be03d8e2b441b8683327
SHA2569fa799e747af83c4c9dd8dfd12c7ed39131efbf7f16a0a7d396f30c3894edc35
SHA512243835c6f3d2c7a9b588674c8e485bb56886e7b26a7b995a6f3ba25e9125f8b4a76f3ad2866854762f78fd3cb5b814cc9315605e147ce6346c894b056c62b818
-
Filesize
751KB
MD5a9c43db8f6a7158c9e9cda982a1c00bb
SHA1e271bd7fa2731a10db3ba154252bd8b75d05cf6e
SHA2563c1dc889ffa24291360023a0a8c9029237261e702aee2e3f90d20005ed283281
SHA51205efd3b5ae36ab873396b39c85743c396a23a23e73d33f1f51eec001259f1ff2e2c97cf997d1b971c2aeb298c05db18681abf7276e9b600177ee2ebd8950c1a9
-
Filesize
751KB
MD51c91753d3175a40ec661626b0e88d5df
SHA1ea2d3f8dba19f39fac064934c9b8a4641336d533
SHA25665b55af0472f03626aa4dada7e205b5c0d0f5f21e7c28525472556309292388c
SHA512009f4221384c949aaf70f9e280a7411a1761f71af62d514c05a26f215d5174f1179a698533f066c205d595e9424506d798438c3b3de49c13f94efd3c2105bc8b
-
Filesize
751KB
MD5b14be8fc633297f6ecb91561f802ad22
SHA1d8513919970e76543d19be03d8e2b441b8683327
SHA2569fa799e747af83c4c9dd8dfd12c7ed39131efbf7f16a0a7d396f30c3894edc35
SHA512243835c6f3d2c7a9b588674c8e485bb56886e7b26a7b995a6f3ba25e9125f8b4a76f3ad2866854762f78fd3cb5b814cc9315605e147ce6346c894b056c62b818
-
Filesize
751KB
MD5a9c43db8f6a7158c9e9cda982a1c00bb
SHA1e271bd7fa2731a10db3ba154252bd8b75d05cf6e
SHA2563c1dc889ffa24291360023a0a8c9029237261e702aee2e3f90d20005ed283281
SHA51205efd3b5ae36ab873396b39c85743c396a23a23e73d33f1f51eec001259f1ff2e2c97cf997d1b971c2aeb298c05db18681abf7276e9b600177ee2ebd8950c1a9