Analysis

  • max time kernel
    100s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/11/2022, 18:11

General

  • Target

    c7a9355b272440826e9c534f5b65bccb5a222a6298200674092b5cfe5c31cbfc.xls

  • Size

    217KB

  • MD5

    0e418b517559f1c8a8fae6f55de2be46

  • SHA1

    e72e81d6dcf50e628e7603ce304ebe26cecb0aa2

  • SHA256

    c7a9355b272440826e9c534f5b65bccb5a222a6298200674092b5cfe5c31cbfc

  • SHA512

    56181569c1107f06302f28f3271945f4a653b3aee0bfa457888213303adb21d3f494485c596d73327dfbc64204d79bf24a4bbb7fdc8b2fa0804a32143bcddfa3

  • SSDEEP

    6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dg8yY+TAQXTHGUMEyP5p6f5jQmx:nbGUMVWlbx

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://kabaruntukrakyat.com/wp-content/B9oJ0jh/

xlm40.dropper

http://coinkub.com/wp-content/WwrJvjumS/

xlm40.dropper

https://aberractivity.hu/iqq/Dmtv/

xlm40.dropper

https://anamafegarcia.es/css/HfFXMTXvc40t/

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Downloads MZ/PE file
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\c7a9355b272440826e9c534f5b65bccb5a222a6298200674092b5cfe5c31cbfc.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4200
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3372
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\RBnXP\QgJlO.dll"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:4676
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4476
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NqCFfStZ\ViWnUya.dll"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:4980
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\VhEspTGH\RrkVhhODAbBKO.dll"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:860
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1796
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OhKvDyYtIYC\tLIRZwpvkkFiu.dll"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:1488

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\oxnv1.ooccxx

          Filesize

          712KB

          MD5

          2205da2892c2c5e3168ff7fa12e86082

          SHA1

          d55591eb35f583fbe748471e4048b65ee599aee2

          SHA256

          1c923310118e38beb76d52250ef6cb7abcd9d17981c23104e05cf8bc2e1c83e0

          SHA512

          cf552074bc3db38ffccaff26eebbf36a4da894c51289c3ac0e0d6ad5179753b44f4b09a6c818d4029ad2dff01f4cbc8ad7228c9eda44cc47406a234d08c1ffa4

        • C:\Users\Admin\oxnv2.ooccxx

          Filesize

          712KB

          MD5

          7cec1f22555ed67e526b6628d6618c02

          SHA1

          ce6cecdfa14c7f2106d05e422c990fd837590bc5

          SHA256

          a74c4512cafa2df37db1f82e28ab9e36989476ec36ba6b54307ca2f3557fbee8

          SHA512

          e5e143903365e001494b7e5e6b8f5822f2250524e8d6380c881c2cd5b08f0c33a2caa7153538bc583e46a6f9e148d8498801f1d36e9461b6da2bedb9d3750528

        • C:\Users\Admin\oxnv3.ooccxx

          Filesize

          712KB

          MD5

          cf481ebd7b5f13aa38d4fc40ee085625

          SHA1

          0271e23c6b938babf49598749811a18ffc796b8b

          SHA256

          d52772b41dc880c90bbe089fdf7389292e740e69bf39b88c2c36efbb92e558e0

          SHA512

          eafad947765c6059298d80339f40a2b99f531afe083e7418bf5fe58bd64261b6d4194d58f5d8e07f3a3e6b55f7fa6809f17a2382a4f6d766530c0843b7d88faf

        • C:\Users\Admin\oxnv4.ooccxx

          Filesize

          712KB

          MD5

          22db57d2f2e066fa29fa2d3132e82e85

          SHA1

          7db0c61da18f31f5fd8c23a2180a0acbab99768d

          SHA256

          c788e560b0686db38b85c9ae972f988ec310907dcd04229900d052c93250e135

          SHA512

          bee6585b1cab8b0a6b8f21eb90cfa1433a1e0a18abbe90885162fd651e8a506270756a35de5bb18bf26f772fbdaedf1652c5becab85db11f43ea6d15d859a17e

        • \Users\Admin\oxnv1.ooccxx

          Filesize

          712KB

          MD5

          2205da2892c2c5e3168ff7fa12e86082

          SHA1

          d55591eb35f583fbe748471e4048b65ee599aee2

          SHA256

          1c923310118e38beb76d52250ef6cb7abcd9d17981c23104e05cf8bc2e1c83e0

          SHA512

          cf552074bc3db38ffccaff26eebbf36a4da894c51289c3ac0e0d6ad5179753b44f4b09a6c818d4029ad2dff01f4cbc8ad7228c9eda44cc47406a234d08c1ffa4

        • \Users\Admin\oxnv2.ooccxx

          Filesize

          712KB

          MD5

          7cec1f22555ed67e526b6628d6618c02

          SHA1

          ce6cecdfa14c7f2106d05e422c990fd837590bc5

          SHA256

          a74c4512cafa2df37db1f82e28ab9e36989476ec36ba6b54307ca2f3557fbee8

          SHA512

          e5e143903365e001494b7e5e6b8f5822f2250524e8d6380c881c2cd5b08f0c33a2caa7153538bc583e46a6f9e148d8498801f1d36e9461b6da2bedb9d3750528

        • \Users\Admin\oxnv3.ooccxx

          Filesize

          712KB

          MD5

          cf481ebd7b5f13aa38d4fc40ee085625

          SHA1

          0271e23c6b938babf49598749811a18ffc796b8b

          SHA256

          d52772b41dc880c90bbe089fdf7389292e740e69bf39b88c2c36efbb92e558e0

          SHA512

          eafad947765c6059298d80339f40a2b99f531afe083e7418bf5fe58bd64261b6d4194d58f5d8e07f3a3e6b55f7fa6809f17a2382a4f6d766530c0843b7d88faf

        • \Users\Admin\oxnv4.ooccxx

          Filesize

          712KB

          MD5

          22db57d2f2e066fa29fa2d3132e82e85

          SHA1

          7db0c61da18f31f5fd8c23a2180a0acbab99768d

          SHA256

          c788e560b0686db38b85c9ae972f988ec310907dcd04229900d052c93250e135

          SHA512

          bee6585b1cab8b0a6b8f21eb90cfa1433a1e0a18abbe90885162fd651e8a506270756a35de5bb18bf26f772fbdaedf1652c5becab85db11f43ea6d15d859a17e

        • memory/3372-257-0x0000000180000000-0x0000000180030000-memory.dmp

          Filesize

          192KB

        • memory/4200-118-0x00007FFE49A90000-0x00007FFE49AA0000-memory.dmp

          Filesize

          64KB

        • memory/4200-117-0x00007FFE49A90000-0x00007FFE49AA0000-memory.dmp

          Filesize

          64KB

        • memory/4200-348-0x00007FFE49A90000-0x00007FFE49AA0000-memory.dmp

          Filesize

          64KB

        • memory/4200-127-0x00007FFE46270000-0x00007FFE46280000-memory.dmp

          Filesize

          64KB

        • memory/4200-128-0x00007FFE46270000-0x00007FFE46280000-memory.dmp

          Filesize

          64KB

        • memory/4200-115-0x00007FFE49A90000-0x00007FFE49AA0000-memory.dmp

          Filesize

          64KB

        • memory/4200-347-0x00007FFE49A90000-0x00007FFE49AA0000-memory.dmp

          Filesize

          64KB

        • memory/4200-346-0x00007FFE49A90000-0x00007FFE49AA0000-memory.dmp

          Filesize

          64KB

        • memory/4200-116-0x00007FFE49A90000-0x00007FFE49AA0000-memory.dmp

          Filesize

          64KB

        • memory/4200-345-0x00007FFE49A90000-0x00007FFE49AA0000-memory.dmp

          Filesize

          64KB