Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/11/2022, 14:14

General

  • Target

    DETALLES-03112022.xls

  • Size

    217KB

  • MD5

    cc394ef471408f7cef71bab18e5293c7

  • SHA1

    4bca38b998e1d4ebe18117732149ef166c09b747

  • SHA256

    7b3078d413b8b68bffad47dbdb94bfb5bbd1909f671f774db2f73953867f3db7

  • SHA512

    9afc945b88940ed45a926b563ec4524872e9a9a03d161c6af7b38ddb40d7f5b2729e55a50dc6e1592c2c401283c2078df7459d5c73d7f3c891b1f4231689a85d

  • SSDEEP

    6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dg8yY+TAQXTHGUMEyP5p6f5jQmd:nbGUMVWlbd

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://kabaruntukrakyat.com/wp-content/B9oJ0jh/

xlm40.dropper

http://coinkub.com/wp-content/WwrJvjumS/

xlm40.dropper

https://aberractivity.hu/iqq/Dmtv/

xlm40.dropper

https://anamafegarcia.es/css/HfFXMTXvc40t/

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Downloads MZ/PE file
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\DETALLES-03112022.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5116
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ERHymjGIWFYXcFQ\vwSFpAP.dll"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:2036
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3844
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XZMDwBpTLlx\WQQDEP.dll"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:3184
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1820
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AILyWwJdkkkiwalj\DSJowq.dll"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:1920
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:828
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\FoUnmoUTQYf\JajOi.dll"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:3384

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\oxnv1.ooccxx

    Filesize

    818KB

    MD5

    450444e585d6ecbe93c49299bead9908

    SHA1

    4fbb8532ddc3e8eeb5d4ddcd6ff6e5abebf278e0

    SHA256

    c20cf808446ab5bf04ad08d585b739d10971d14e643f6871c71d03c9e1013ac7

    SHA512

    0354c4aeb8341745bae6949005b06cd59a3b464e601bd1019d791a171b352b2ad0e203997b1e88c4726c5a8b0288c38d94f91c728828009692715b4d4a52376a

  • C:\Users\Admin\oxnv1.ooccxx

    Filesize

    818KB

    MD5

    450444e585d6ecbe93c49299bead9908

    SHA1

    4fbb8532ddc3e8eeb5d4ddcd6ff6e5abebf278e0

    SHA256

    c20cf808446ab5bf04ad08d585b739d10971d14e643f6871c71d03c9e1013ac7

    SHA512

    0354c4aeb8341745bae6949005b06cd59a3b464e601bd1019d791a171b352b2ad0e203997b1e88c4726c5a8b0288c38d94f91c728828009692715b4d4a52376a

  • C:\Users\Admin\oxnv2.ooccxx

    Filesize

    818KB

    MD5

    f9dc587e63d92cc6c76c2eaa82fc6deb

    SHA1

    b6417cf0af988bed1f6bd3c56de58148ce16213d

    SHA256

    4a6bee5bae96fad16a1fe992fa36dda1ab19e65c8a68f5ffd9f8c02976e3c73e

    SHA512

    f03d751e959e2f09657d7df5f00846d19358cb16d44f1501e2c17bdab616606d4dcb25293650d06da8cacd8c87735fcac637b5d53b3b8d35c19946758287f335

  • C:\Users\Admin\oxnv2.ooccxx

    Filesize

    818KB

    MD5

    f9dc587e63d92cc6c76c2eaa82fc6deb

    SHA1

    b6417cf0af988bed1f6bd3c56de58148ce16213d

    SHA256

    4a6bee5bae96fad16a1fe992fa36dda1ab19e65c8a68f5ffd9f8c02976e3c73e

    SHA512

    f03d751e959e2f09657d7df5f00846d19358cb16d44f1501e2c17bdab616606d4dcb25293650d06da8cacd8c87735fcac637b5d53b3b8d35c19946758287f335

  • C:\Users\Admin\oxnv3.ooccxx

    Filesize

    818KB

    MD5

    c1341753813cb9610a5543e6037f69d3

    SHA1

    d5872f62b08d1768aca4f7f1bec14fad905882c2

    SHA256

    6e87cf21745fded553864dc8e1f3466ffab20c99701597b60d7916701ebbfdc8

    SHA512

    543e3a045a04f1034058dd4a9bdff62ad13c5e2af1925e337ed02825e290053ed9b65f03ce435597bf6ba6730225d8acd601d27f7f4e6945d33066ed9d71dec0

  • C:\Users\Admin\oxnv3.ooccxx

    Filesize

    818KB

    MD5

    c1341753813cb9610a5543e6037f69d3

    SHA1

    d5872f62b08d1768aca4f7f1bec14fad905882c2

    SHA256

    6e87cf21745fded553864dc8e1f3466ffab20c99701597b60d7916701ebbfdc8

    SHA512

    543e3a045a04f1034058dd4a9bdff62ad13c5e2af1925e337ed02825e290053ed9b65f03ce435597bf6ba6730225d8acd601d27f7f4e6945d33066ed9d71dec0

  • C:\Users\Admin\oxnv4.ooccxx

    Filesize

    818KB

    MD5

    45f21cdaeb6d423b940ccef9e728bba4

    SHA1

    b020bd4697a13b3661808a951c255207c810bc8a

    SHA256

    10c9bec9889d07c47d78172f5393b21c097feac6fd3911acb6587456a6df5d18

    SHA512

    973b2d46cc911827bd59e6102862b22281377bdc0c308f0b8348b490724a590e340d70c6c5781ac0f84531d10304b904f197e8f969f53ed7f3be58850753f6d3

  • C:\Users\Admin\oxnv4.ooccxx

    Filesize

    818KB

    MD5

    45f21cdaeb6d423b940ccef9e728bba4

    SHA1

    b020bd4697a13b3661808a951c255207c810bc8a

    SHA256

    10c9bec9889d07c47d78172f5393b21c097feac6fd3911acb6587456a6df5d18

    SHA512

    973b2d46cc911827bd59e6102862b22281377bdc0c308f0b8348b490724a590e340d70c6c5781ac0f84531d10304b904f197e8f969f53ed7f3be58850753f6d3

  • C:\Windows\System32\AILyWwJdkkkiwalj\DSJowq.dll

    Filesize

    818KB

    MD5

    c1341753813cb9610a5543e6037f69d3

    SHA1

    d5872f62b08d1768aca4f7f1bec14fad905882c2

    SHA256

    6e87cf21745fded553864dc8e1f3466ffab20c99701597b60d7916701ebbfdc8

    SHA512

    543e3a045a04f1034058dd4a9bdff62ad13c5e2af1925e337ed02825e290053ed9b65f03ce435597bf6ba6730225d8acd601d27f7f4e6945d33066ed9d71dec0

  • C:\Windows\System32\ERHymjGIWFYXcFQ\vwSFpAP.dll

    Filesize

    818KB

    MD5

    450444e585d6ecbe93c49299bead9908

    SHA1

    4fbb8532ddc3e8eeb5d4ddcd6ff6e5abebf278e0

    SHA256

    c20cf808446ab5bf04ad08d585b739d10971d14e643f6871c71d03c9e1013ac7

    SHA512

    0354c4aeb8341745bae6949005b06cd59a3b464e601bd1019d791a171b352b2ad0e203997b1e88c4726c5a8b0288c38d94f91c728828009692715b4d4a52376a

  • C:\Windows\System32\FoUnmoUTQYf\JajOi.dll

    Filesize

    818KB

    MD5

    45f21cdaeb6d423b940ccef9e728bba4

    SHA1

    b020bd4697a13b3661808a951c255207c810bc8a

    SHA256

    10c9bec9889d07c47d78172f5393b21c097feac6fd3911acb6587456a6df5d18

    SHA512

    973b2d46cc911827bd59e6102862b22281377bdc0c308f0b8348b490724a590e340d70c6c5781ac0f84531d10304b904f197e8f969f53ed7f3be58850753f6d3

  • C:\Windows\System32\XZMDwBpTLlx\WQQDEP.dll

    Filesize

    818KB

    MD5

    f9dc587e63d92cc6c76c2eaa82fc6deb

    SHA1

    b6417cf0af988bed1f6bd3c56de58148ce16213d

    SHA256

    4a6bee5bae96fad16a1fe992fa36dda1ab19e65c8a68f5ffd9f8c02976e3c73e

    SHA512

    f03d751e959e2f09657d7df5f00846d19358cb16d44f1501e2c17bdab616606d4dcb25293650d06da8cacd8c87735fcac637b5d53b3b8d35c19946758287f335

  • memory/2976-142-0x0000000180000000-0x0000000180030000-memory.dmp

    Filesize

    192KB

  • memory/5116-132-0x00007FFC794B0000-0x00007FFC794C0000-memory.dmp

    Filesize

    64KB

  • memory/5116-137-0x00007FFC773B0000-0x00007FFC773C0000-memory.dmp

    Filesize

    64KB

  • memory/5116-136-0x00007FFC794B0000-0x00007FFC794C0000-memory.dmp

    Filesize

    64KB

  • memory/5116-135-0x00007FFC794B0000-0x00007FFC794C0000-memory.dmp

    Filesize

    64KB

  • memory/5116-134-0x00007FFC794B0000-0x00007FFC794C0000-memory.dmp

    Filesize

    64KB

  • memory/5116-138-0x00007FFC773B0000-0x00007FFC773C0000-memory.dmp

    Filesize

    64KB

  • memory/5116-133-0x00007FFC794B0000-0x00007FFC794C0000-memory.dmp

    Filesize

    64KB