Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/11/2022, 02:10
Behavioral task
behavioral1
Sample
GT-6538 report.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GT-6538 report.xls
Resource
win10v2004-20220812-en
General
-
Target
GT-6538 report.xls
-
Size
217KB
-
MD5
058d1345741ed17f47d31d1098548e9b
-
SHA1
53575eaab47a6f3de3203d3ea8dade3c6534f1d3
-
SHA256
470655b553de25ce935ea6721040d5cb046d8a23afa269293d4fdef745485f18
-
SHA512
9eb66f84e12b5d8bd410f9ce7754201316f4e675b092b0a7def5ba2653884662761fc64919b0d8a160942f95d4d4d37a74d9caee353224e8ee08a852ac67f8b8
-
SSDEEP
6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQm7lnT:1bGUMVWlbN
Malware Config
Extracted
http://app.clubdedocentes.com/storage/DCcq9ekgH99sI/
http://linhkiendoc.com/app/payments/qoy5JqpLqrbsKl/
http://sourcecool.com/throng/iOD/
Extracted
emotet
Epoch4
45.235.8.30:8080
94.23.45.86:4143
119.59.103.152:8080
169.60.181.70:8080
164.68.99.3:8080
172.105.226.75:8080
107.170.39.149:8080
206.189.28.199:8080
1.234.2.232:8080
188.44.20.25:443
186.194.240.217:443
103.43.75.120:443
149.28.143.92:443
159.89.202.34:443
209.97.163.214:443
183.111.227.137:8080
129.232.188.93:443
139.59.126.41:443
110.232.117.186:8080
139.59.56.73:8080
103.75.201.2:443
91.207.28.33:8080
164.90.222.65:443
197.242.150.244:8080
212.24.98.99:8080
51.161.73.194:443
115.68.227.76:8080
159.65.88.10:8080
201.94.166.162:443
95.217.221.146:8080
173.212.193.249:8080
82.223.21.224:8080
103.132.242.26:8080
213.239.212.5:443
153.126.146.25:7080
45.176.232.124:443
182.162.143.56:443
169.57.156.166:8080
159.65.140.115:443
163.44.196.120:8080
172.104.251.154:8080
167.172.253.162:8080
91.187.140.35:8080
45.118.115.99:8080
147.139.166.154:8080
72.15.201.15:8080
149.56.131.28:8080
167.172.199.165:8080
101.50.0.91:8080
160.16.142.56:8080
185.4.135.165:8080
104.168.155.143:8080
79.137.35.198:8080
5.135.159.50:443
187.63.160.88:80
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 852 1980 regsvr32.exe 27 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1968 1980 regsvr32.exe 27 -
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 852 regsvr32.exe 520 regsvr32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1980 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 520 regsvr32.exe 1060 regsvr32.exe 1060 regsvr32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1980 EXCEL.EXE 1980 EXCEL.EXE 1980 EXCEL.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1980 wrote to memory of 852 1980 EXCEL.EXE 30 PID 1980 wrote to memory of 852 1980 EXCEL.EXE 30 PID 1980 wrote to memory of 852 1980 EXCEL.EXE 30 PID 1980 wrote to memory of 852 1980 EXCEL.EXE 30 PID 1980 wrote to memory of 852 1980 EXCEL.EXE 30 PID 1980 wrote to memory of 852 1980 EXCEL.EXE 30 PID 1980 wrote to memory of 852 1980 EXCEL.EXE 30 PID 852 wrote to memory of 520 852 regsvr32.exe 31 PID 852 wrote to memory of 520 852 regsvr32.exe 31 PID 852 wrote to memory of 520 852 regsvr32.exe 31 PID 852 wrote to memory of 520 852 regsvr32.exe 31 PID 852 wrote to memory of 520 852 regsvr32.exe 31 PID 852 wrote to memory of 520 852 regsvr32.exe 31 PID 852 wrote to memory of 520 852 regsvr32.exe 31 PID 520 wrote to memory of 1060 520 regsvr32.exe 32 PID 520 wrote to memory of 1060 520 regsvr32.exe 32 PID 520 wrote to memory of 1060 520 regsvr32.exe 32 PID 520 wrote to memory of 1060 520 regsvr32.exe 32 PID 520 wrote to memory of 1060 520 regsvr32.exe 32 PID 1980 wrote to memory of 1968 1980 EXCEL.EXE 33 PID 1980 wrote to memory of 1968 1980 EXCEL.EXE 33 PID 1980 wrote to memory of 1968 1980 EXCEL.EXE 33 PID 1980 wrote to memory of 1968 1980 EXCEL.EXE 33 PID 1980 wrote to memory of 1968 1980 EXCEL.EXE 33 PID 1980 wrote to memory of 1968 1980 EXCEL.EXE 33 PID 1980 wrote to memory of 1968 1980 EXCEL.EXE 33
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\GT-6538 report.xls"1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\system32\regsvr32.exe/S ..\oxnv1.ooccxx3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\SfCrjDPFQHQnM\kbqDsHcbNrn.dll"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
PID:1968
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
745KB
MD573c9e6a0275a9414062bea815ca7e8e3
SHA1be0164b8e32198ac6379711ad29ee0ba89c793c6
SHA256d282dd159fb5beac51ebd1134e58e18fb7c25138e9e967a813a7fd8bb458b90d
SHA5126937863b1ea44607f413a870bc02e3c1be388acb6b78e95ea0458448b36e7c7937587f329e529bfae8d7db94b4aecc9833669cb05217dc49dab8dd8758be1f8d
-
Filesize
745KB
MD573c9e6a0275a9414062bea815ca7e8e3
SHA1be0164b8e32198ac6379711ad29ee0ba89c793c6
SHA256d282dd159fb5beac51ebd1134e58e18fb7c25138e9e967a813a7fd8bb458b90d
SHA5126937863b1ea44607f413a870bc02e3c1be388acb6b78e95ea0458448b36e7c7937587f329e529bfae8d7db94b4aecc9833669cb05217dc49dab8dd8758be1f8d
-
Filesize
745KB
MD573c9e6a0275a9414062bea815ca7e8e3
SHA1be0164b8e32198ac6379711ad29ee0ba89c793c6
SHA256d282dd159fb5beac51ebd1134e58e18fb7c25138e9e967a813a7fd8bb458b90d
SHA5126937863b1ea44607f413a870bc02e3c1be388acb6b78e95ea0458448b36e7c7937587f329e529bfae8d7db94b4aecc9833669cb05217dc49dab8dd8758be1f8d