Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
03/11/2022, 19:30
Behavioral task
behavioral1
Sample
02c6e1d790f57d8b167ad40c98e0c0328082b1323eb178c206d3e4284a30c711.xls
Resource
win10-20220901-en
Behavioral task
behavioral2
Sample
02c6e1d790f57d8b167ad40c98e0c0328082b1323eb178c206d3e4284a30c711.xls
Resource
win10-20220901-en
General
-
Target
02c6e1d790f57d8b167ad40c98e0c0328082b1323eb178c206d3e4284a30c711.xls
-
Size
217KB
-
MD5
45a1fb2144bff5c8eb8d94aa35b4e9ad
-
SHA1
7ae9915eff2ba37484a75a4d9e4c6a99f6aaebd2
-
SHA256
02c6e1d790f57d8b167ad40c98e0c0328082b1323eb178c206d3e4284a30c711
-
SHA512
393d80140121b7d6756aab638ca493a25452f76386d5eadad96fcc72594619ab66f4b51241ffe40771ad010a9280a19b40a8105f07cc83829326153745360043
-
SSDEEP
6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dg8yY+TAQXTHGUMEyP5p6f5jQm9:nbGUMVWlb9
Malware Config
Extracted
http://kabaruntukrakyat.com/wp-content/B9oJ0jh/
http://coinkub.com/wp-content/WwrJvjumS/
https://aberractivity.hu/iqq/Dmtv/
https://anamafegarcia.es/css/HfFXMTXvc40t/
Extracted
emotet
Epoch5
178.238.225.252:8080
139.196.72.155:8080
36.67.23.59:443
103.56.149.105:8080
37.44.244.177:8080
85.25.120.45:8080
202.134.4.210:7080
78.47.204.80:443
83.229.80.93:8080
93.104.209.107:8080
80.211.107.116:8080
165.22.254.236:8080
104.244.79.94:443
185.148.169.10:8080
190.145.8.4:443
175.126.176.79:8080
139.59.80.108:8080
188.165.79.151:443
128.199.217.206:443
64.227.55.231:8080
218.38.121.17:443
103.71.99.57:8080
103.224.241.74:8080
128.199.242.164:8080
85.214.67.203:8080
103.254.12.236:7080
46.101.98.60:8080
178.62.112.199:8080
210.57.209.142:8080
195.77.239.39:8080
103.126.216.86:443
82.98.180.154:7080
202.28.34.99:8080
174.138.33.49:7080
160.16.143.191:8080
51.75.33.122:443
103.41.204.169:8080
186.250.48.5:443
87.106.97.83:7080
118.98.72.86:443
196.44.98.190:8080
103.85.95.4:8080
62.171.178.147:8080
54.37.228.122:443
114.79.130.68:443
198.199.70.22:8080
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 5116 564 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3852 564 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 588 564 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1220 564 regsvr32.exe 65 -
Downloads MZ/PE file
-
Loads dropped DLL 4 IoCs
pid Process 5116 regsvr32.exe 3852 regsvr32.exe 588 regsvr32.exe 1220 regsvr32.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LSjSBqswaQfjHM.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\GfqYbCXdFRtzjatxg\\LSjSBqswaQfjHM.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JSpJzFj.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\HiTIeV\\JSpJzFj.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YZFQbuLogjS.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\OuLMKAq\\YZFQbuLogjS.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jDkjf.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\AXRXpTblLJggmd\\jDkjf.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 564 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 5116 regsvr32.exe 5116 regsvr32.exe 4396 regsvr32.exe 4396 regsvr32.exe 4396 regsvr32.exe 4396 regsvr32.exe 3852 regsvr32.exe 3852 regsvr32.exe 4480 regsvr32.exe 4480 regsvr32.exe 4480 regsvr32.exe 4480 regsvr32.exe 588 regsvr32.exe 588 regsvr32.exe 848 regsvr32.exe 848 regsvr32.exe 848 regsvr32.exe 848 regsvr32.exe 1220 regsvr32.exe 1220 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 564 EXCEL.EXE 564 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 564 EXCEL.EXE 564 EXCEL.EXE 564 EXCEL.EXE 564 EXCEL.EXE 564 EXCEL.EXE 564 EXCEL.EXE 564 EXCEL.EXE 564 EXCEL.EXE 564 EXCEL.EXE 564 EXCEL.EXE 564 EXCEL.EXE 564 EXCEL.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 564 wrote to memory of 5116 564 EXCEL.EXE 68 PID 564 wrote to memory of 5116 564 EXCEL.EXE 68 PID 5116 wrote to memory of 4396 5116 regsvr32.exe 70 PID 5116 wrote to memory of 4396 5116 regsvr32.exe 70 PID 564 wrote to memory of 3852 564 EXCEL.EXE 71 PID 564 wrote to memory of 3852 564 EXCEL.EXE 71 PID 3852 wrote to memory of 4480 3852 regsvr32.exe 72 PID 3852 wrote to memory of 4480 3852 regsvr32.exe 72 PID 564 wrote to memory of 588 564 EXCEL.EXE 73 PID 564 wrote to memory of 588 564 EXCEL.EXE 73 PID 588 wrote to memory of 848 588 regsvr32.exe 74 PID 588 wrote to memory of 848 588 regsvr32.exe 74 PID 564 wrote to memory of 1220 564 EXCEL.EXE 75 PID 564 wrote to memory of 1220 564 EXCEL.EXE 75 PID 1220 wrote to memory of 1640 1220 regsvr32.exe 76 PID 1220 wrote to memory of 1640 1220 regsvr32.exe 76
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\02c6e1d790f57d8b167ad40c98e0c0328082b1323eb178c206d3e4284a30c711.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\AXRXpTblLJggmd\jDkjf.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\GfqYbCXdFRtzjatxg\LSjSBqswaQfjHM.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\HiTIeV\JSpJzFj.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:848
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\OuLMKAq\YZFQbuLogjS.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712KB
MD5e6b54b9a1be9add982014dde366ea9f9
SHA186dee38cc035be5b7d8153a008743a26c76eb06f
SHA256ff71bd346731d56620234876ff1560e2e62ccf0a584cffeb65e20ba30d46ba60
SHA5128a92ddae27d5c322db8e1e4b3f306ecac87213ab7c68ebcfa0d145d34863497f201c2324736b8a2e9a8315e4b6099b17f9836513d07172a8ae437db5a2c95ab5
-
Filesize
712KB
MD56f1ec50f0ec26cb236d40ec7c619920b
SHA1661ade86f77b8b8cffddee4217e2e630e04dbe74
SHA25660a28acd169fbc80189960bc05e961cf6d488ddac8fad3ffbc1ee59a8141631e
SHA5125773020198f5455b33886dda38946ab730bea870cbee2c02ba8db6e4b1ba878c4cb79f904340423fad5a3a9eb30495f990f33c8f0df827ff913222d93473a7ce
-
Filesize
712KB
MD554a462fb5c3b48e500f49647f8c1dbfb
SHA1157d4da98ee0e3592a91ea423fc308d52b7861fe
SHA256560134b2f37e445d62e0f72b4b86e2943175469a8911f4a6a28d12294b671d99
SHA512817d78b0f6eddc4d7b9c1bca45628c816ce15f0aeb75782b10057a3bfbf505250992aae8bbf30e756ae8cee1acb1b5c875ef08db9523e1ed273c699a8c58ce27
-
Filesize
712KB
MD59f500e048aba2ba97190885b312a226f
SHA15b6e9532034966696a33c4203fdcbc91fadb66b0
SHA2568990bd0a1a22b58e674310fa0cde7b4746248b1f7b325a3051e56e8117cfebe7
SHA512fbe41f16e7628cb526a2cf482129377ba6247b5fd170ae22900213b342c68f064c6d0aa476b5d9acd8e141038bbe4c55f4b0259f7390018b56f8cedcb3c4f101
-
Filesize
712KB
MD5e6b54b9a1be9add982014dde366ea9f9
SHA186dee38cc035be5b7d8153a008743a26c76eb06f
SHA256ff71bd346731d56620234876ff1560e2e62ccf0a584cffeb65e20ba30d46ba60
SHA5128a92ddae27d5c322db8e1e4b3f306ecac87213ab7c68ebcfa0d145d34863497f201c2324736b8a2e9a8315e4b6099b17f9836513d07172a8ae437db5a2c95ab5
-
Filesize
712KB
MD56f1ec50f0ec26cb236d40ec7c619920b
SHA1661ade86f77b8b8cffddee4217e2e630e04dbe74
SHA25660a28acd169fbc80189960bc05e961cf6d488ddac8fad3ffbc1ee59a8141631e
SHA5125773020198f5455b33886dda38946ab730bea870cbee2c02ba8db6e4b1ba878c4cb79f904340423fad5a3a9eb30495f990f33c8f0df827ff913222d93473a7ce
-
Filesize
712KB
MD554a462fb5c3b48e500f49647f8c1dbfb
SHA1157d4da98ee0e3592a91ea423fc308d52b7861fe
SHA256560134b2f37e445d62e0f72b4b86e2943175469a8911f4a6a28d12294b671d99
SHA512817d78b0f6eddc4d7b9c1bca45628c816ce15f0aeb75782b10057a3bfbf505250992aae8bbf30e756ae8cee1acb1b5c875ef08db9523e1ed273c699a8c58ce27
-
Filesize
712KB
MD59f500e048aba2ba97190885b312a226f
SHA15b6e9532034966696a33c4203fdcbc91fadb66b0
SHA2568990bd0a1a22b58e674310fa0cde7b4746248b1f7b325a3051e56e8117cfebe7
SHA512fbe41f16e7628cb526a2cf482129377ba6247b5fd170ae22900213b342c68f064c6d0aa476b5d9acd8e141038bbe4c55f4b0259f7390018b56f8cedcb3c4f101