Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/11/2022, 00:17

General

  • Target

    2022-11-04_0917.xls

  • Size

    217KB

  • MD5

    344e23983dd111026745a44858fb51f0

  • SHA1

    91e67fc0fc4699e42f5aa38464f2f9d9a2a789fe

  • SHA256

    bb7131f2c734163aa766524bb2de31956d2f012294ffd5186ad7e12c057c0d04

  • SHA512

    0ef2b0e7d197b51977f7272e9d605437654bcbe0ee8f069e261a2b82d26948577b65fb737060aeafe199908a730fc72a2508852059ede55aafb7e98ee0b3e707

  • SSDEEP

    6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQm7pnT:1bGUMVWlbZ

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://app.clubdedocentes.com/storage/DCcq9ekgH99sI/

xlm40.dropper

http://linhkiendoc.com/app/payments/qoy5JqpLqrbsKl/

xlm40.dropper

http://sourcecool.com/throng/iOD/

xlm40.dropper

http://www.stickers-et-deco.com/Adapter/lYw/

Extracted

Family

emotet

Botnet

Epoch4

C2

45.235.8.30:8080

94.23.45.86:4143

119.59.103.152:8080

169.60.181.70:8080

164.68.99.3:8080

172.105.226.75:8080

107.170.39.149:8080

206.189.28.199:8080

1.234.2.232:8080

188.44.20.25:443

186.194.240.217:443

103.43.75.120:443

149.28.143.92:443

159.89.202.34:443

209.97.163.214:443

183.111.227.137:8080

129.232.188.93:443

139.59.126.41:443

110.232.117.186:8080

139.59.56.73:8080

eck1.plain
ecs1.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Downloads MZ/PE file
  • Loads dropped DLL 4 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\2022-11-04_0917.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Windows\system32\regsvr32.exe
        /S ..\oxnv1.ooccxx
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NYnnpxe\ZNEwaCAFX.dll"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1480
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx
      2⤵
      • Process spawned unexpected child process
      PID:984
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx
      2⤵
      • Process spawned unexpected child process
      PID:1928
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Windows\system32\regsvr32.exe
        /S ..\oxnv4.ooccxx
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1808
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XBcKtlTDzvHWnvd\eBKLbedivbBBk.dll"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\oxnv1.ooccxx

    Filesize

    745KB

    MD5

    b0f4b57e89f80f216c2c029989afc923

    SHA1

    31b27da6820f5226d6b7044a01bfc5ad21da0ad4

    SHA256

    74ebfdbdd4d9c3626a93181efd2625ed272e17c997ea23976cc58600683f370e

    SHA512

    88e53a7b865a231f70cbec42fc3210d4db1cab06d2e55c7e5faf1ef6f1e5d8bfcad55e9592f46213fe383a413583b41afab8cd96c33fad7cbb742d2f56e3968f

  • C:\Users\Admin\oxnv4.ooccxx

    Filesize

    745KB

    MD5

    99dee3bfaa766ee393d100863b358d13

    SHA1

    bc84d7f06c5dece49bb0a84ce6b3dec243947b52

    SHA256

    8ee31ebdf4146e1858e69e54e66de2d4c62901ea60078fe3a09a95cd4b7937a5

    SHA512

    ddd3f18a5e5f16115975bb5928b28d22c125374169a37c75a7e104dd40baca671f60e20b66b2f6d710df9175401c425ead57ff4a1689ba3bbf97fc5d3ab5c345

  • \Users\Admin\oxnv1.ooccxx

    Filesize

    745KB

    MD5

    b0f4b57e89f80f216c2c029989afc923

    SHA1

    31b27da6820f5226d6b7044a01bfc5ad21da0ad4

    SHA256

    74ebfdbdd4d9c3626a93181efd2625ed272e17c997ea23976cc58600683f370e

    SHA512

    88e53a7b865a231f70cbec42fc3210d4db1cab06d2e55c7e5faf1ef6f1e5d8bfcad55e9592f46213fe383a413583b41afab8cd96c33fad7cbb742d2f56e3968f

  • \Users\Admin\oxnv1.ooccxx

    Filesize

    745KB

    MD5

    b0f4b57e89f80f216c2c029989afc923

    SHA1

    31b27da6820f5226d6b7044a01bfc5ad21da0ad4

    SHA256

    74ebfdbdd4d9c3626a93181efd2625ed272e17c997ea23976cc58600683f370e

    SHA512

    88e53a7b865a231f70cbec42fc3210d4db1cab06d2e55c7e5faf1ef6f1e5d8bfcad55e9592f46213fe383a413583b41afab8cd96c33fad7cbb742d2f56e3968f

  • \Users\Admin\oxnv4.ooccxx

    Filesize

    745KB

    MD5

    99dee3bfaa766ee393d100863b358d13

    SHA1

    bc84d7f06c5dece49bb0a84ce6b3dec243947b52

    SHA256

    8ee31ebdf4146e1858e69e54e66de2d4c62901ea60078fe3a09a95cd4b7937a5

    SHA512

    ddd3f18a5e5f16115975bb5928b28d22c125374169a37c75a7e104dd40baca671f60e20b66b2f6d710df9175401c425ead57ff4a1689ba3bbf97fc5d3ab5c345

  • \Users\Admin\oxnv4.ooccxx

    Filesize

    745KB

    MD5

    99dee3bfaa766ee393d100863b358d13

    SHA1

    bc84d7f06c5dece49bb0a84ce6b3dec243947b52

    SHA256

    8ee31ebdf4146e1858e69e54e66de2d4c62901ea60078fe3a09a95cd4b7937a5

    SHA512

    ddd3f18a5e5f16115975bb5928b28d22c125374169a37c75a7e104dd40baca671f60e20b66b2f6d710df9175401c425ead57ff4a1689ba3bbf97fc5d3ab5c345

  • memory/832-54-0x000000002FFD1000-0x000000002FFD4000-memory.dmp

    Filesize

    12KB

  • memory/832-58-0x0000000071F2D000-0x0000000071F38000-memory.dmp

    Filesize

    44KB

  • memory/832-57-0x0000000075091000-0x0000000075093000-memory.dmp

    Filesize

    8KB

  • memory/832-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/832-55-0x0000000070F41000-0x0000000070F43000-memory.dmp

    Filesize

    8KB

  • memory/832-74-0x0000000071F2D000-0x0000000071F38000-memory.dmp

    Filesize

    44KB

  • memory/1960-66-0x0000000180000000-0x000000018002F000-memory.dmp

    Filesize

    188KB

  • memory/1960-64-0x000007FEFB751000-0x000007FEFB753000-memory.dmp

    Filesize

    8KB