Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/11/2022, 19:30

General

  • Target

    02c6e1d790f57d8b167ad40c98e0c0328082b1323eb178c206d3e4284a30c711.xls

  • Size

    217KB

  • MD5

    45a1fb2144bff5c8eb8d94aa35b4e9ad

  • SHA1

    7ae9915eff2ba37484a75a4d9e4c6a99f6aaebd2

  • SHA256

    02c6e1d790f57d8b167ad40c98e0c0328082b1323eb178c206d3e4284a30c711

  • SHA512

    393d80140121b7d6756aab638ca493a25452f76386d5eadad96fcc72594619ab66f4b51241ffe40771ad010a9280a19b40a8105f07cc83829326153745360043

  • SSDEEP

    6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dg8yY+TAQXTHGUMEyP5p6f5jQm9:nbGUMVWlb9

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://kabaruntukrakyat.com/wp-content/B9oJ0jh/

xlm40.dropper

http://coinkub.com/wp-content/WwrJvjumS/

xlm40.dropper

https://aberractivity.hu/iqq/Dmtv/

xlm40.dropper

https://anamafegarcia.es/css/HfFXMTXvc40t/

Extracted

Family

emotet

Botnet

Epoch5

C2

178.238.225.252:8080

139.196.72.155:8080

36.67.23.59:443

103.56.149.105:8080

37.44.244.177:8080

85.25.120.45:8080

202.134.4.210:7080

78.47.204.80:443

83.229.80.93:8080

93.104.209.107:8080

80.211.107.116:8080

165.22.254.236:8080

104.244.79.94:443

185.148.169.10:8080

190.145.8.4:443

175.126.176.79:8080

139.59.80.108:8080

188.165.79.151:443

128.199.217.206:443

64.227.55.231:8080

ecs1.plain
eck1.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Downloads MZ/PE file
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\02c6e1d790f57d8b167ad40c98e0c0328082b1323eb178c206d3e4284a30c711.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:564
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AXRXpTblLJggmd\jDkjf.dll"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:4396
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3852
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GfqYbCXdFRtzjatxg\LSjSBqswaQfjHM.dll"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:4480
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:588
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\HiTIeV\JSpJzFj.dll"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:848
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1220
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OuLMKAq\YZFQbuLogjS.dll"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:1640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\oxnv1.ooccxx

    Filesize

    712KB

    MD5

    e6b54b9a1be9add982014dde366ea9f9

    SHA1

    86dee38cc035be5b7d8153a008743a26c76eb06f

    SHA256

    ff71bd346731d56620234876ff1560e2e62ccf0a584cffeb65e20ba30d46ba60

    SHA512

    8a92ddae27d5c322db8e1e4b3f306ecac87213ab7c68ebcfa0d145d34863497f201c2324736b8a2e9a8315e4b6099b17f9836513d07172a8ae437db5a2c95ab5

  • C:\Users\Admin\oxnv2.ooccxx

    Filesize

    712KB

    MD5

    6f1ec50f0ec26cb236d40ec7c619920b

    SHA1

    661ade86f77b8b8cffddee4217e2e630e04dbe74

    SHA256

    60a28acd169fbc80189960bc05e961cf6d488ddac8fad3ffbc1ee59a8141631e

    SHA512

    5773020198f5455b33886dda38946ab730bea870cbee2c02ba8db6e4b1ba878c4cb79f904340423fad5a3a9eb30495f990f33c8f0df827ff913222d93473a7ce

  • C:\Users\Admin\oxnv3.ooccxx

    Filesize

    712KB

    MD5

    54a462fb5c3b48e500f49647f8c1dbfb

    SHA1

    157d4da98ee0e3592a91ea423fc308d52b7861fe

    SHA256

    560134b2f37e445d62e0f72b4b86e2943175469a8911f4a6a28d12294b671d99

    SHA512

    817d78b0f6eddc4d7b9c1bca45628c816ce15f0aeb75782b10057a3bfbf505250992aae8bbf30e756ae8cee1acb1b5c875ef08db9523e1ed273c699a8c58ce27

  • C:\Users\Admin\oxnv4.ooccxx

    Filesize

    712KB

    MD5

    9f500e048aba2ba97190885b312a226f

    SHA1

    5b6e9532034966696a33c4203fdcbc91fadb66b0

    SHA256

    8990bd0a1a22b58e674310fa0cde7b4746248b1f7b325a3051e56e8117cfebe7

    SHA512

    fbe41f16e7628cb526a2cf482129377ba6247b5fd170ae22900213b342c68f064c6d0aa476b5d9acd8e141038bbe4c55f4b0259f7390018b56f8cedcb3c4f101

  • \Users\Admin\oxnv1.ooccxx

    Filesize

    712KB

    MD5

    e6b54b9a1be9add982014dde366ea9f9

    SHA1

    86dee38cc035be5b7d8153a008743a26c76eb06f

    SHA256

    ff71bd346731d56620234876ff1560e2e62ccf0a584cffeb65e20ba30d46ba60

    SHA512

    8a92ddae27d5c322db8e1e4b3f306ecac87213ab7c68ebcfa0d145d34863497f201c2324736b8a2e9a8315e4b6099b17f9836513d07172a8ae437db5a2c95ab5

  • \Users\Admin\oxnv2.ooccxx

    Filesize

    712KB

    MD5

    6f1ec50f0ec26cb236d40ec7c619920b

    SHA1

    661ade86f77b8b8cffddee4217e2e630e04dbe74

    SHA256

    60a28acd169fbc80189960bc05e961cf6d488ddac8fad3ffbc1ee59a8141631e

    SHA512

    5773020198f5455b33886dda38946ab730bea870cbee2c02ba8db6e4b1ba878c4cb79f904340423fad5a3a9eb30495f990f33c8f0df827ff913222d93473a7ce

  • \Users\Admin\oxnv3.ooccxx

    Filesize

    712KB

    MD5

    54a462fb5c3b48e500f49647f8c1dbfb

    SHA1

    157d4da98ee0e3592a91ea423fc308d52b7861fe

    SHA256

    560134b2f37e445d62e0f72b4b86e2943175469a8911f4a6a28d12294b671d99

    SHA512

    817d78b0f6eddc4d7b9c1bca45628c816ce15f0aeb75782b10057a3bfbf505250992aae8bbf30e756ae8cee1acb1b5c875ef08db9523e1ed273c699a8c58ce27

  • \Users\Admin\oxnv4.ooccxx

    Filesize

    712KB

    MD5

    9f500e048aba2ba97190885b312a226f

    SHA1

    5b6e9532034966696a33c4203fdcbc91fadb66b0

    SHA256

    8990bd0a1a22b58e674310fa0cde7b4746248b1f7b325a3051e56e8117cfebe7

    SHA512

    fbe41f16e7628cb526a2cf482129377ba6247b5fd170ae22900213b342c68f064c6d0aa476b5d9acd8e141038bbe4c55f4b0259f7390018b56f8cedcb3c4f101

  • memory/564-120-0x00007FF8BE980000-0x00007FF8BE990000-memory.dmp

    Filesize

    64KB

  • memory/564-133-0x00007FF8BB350000-0x00007FF8BB360000-memory.dmp

    Filesize

    64KB

  • memory/564-132-0x00007FF8BB350000-0x00007FF8BB360000-memory.dmp

    Filesize

    64KB

  • memory/564-123-0x00007FF8BE980000-0x00007FF8BE990000-memory.dmp

    Filesize

    64KB

  • memory/564-122-0x00007FF8BE980000-0x00007FF8BE990000-memory.dmp

    Filesize

    64KB

  • memory/564-121-0x00007FF8BE980000-0x00007FF8BE990000-memory.dmp

    Filesize

    64KB

  • memory/5116-257-0x0000000180000000-0x0000000180030000-memory.dmp

    Filesize

    192KB