Analysis
-
max time kernel
145s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
04/11/2022, 02:20
Behavioral task
behavioral1
Sample
c03e2677ba3b79f8bdf1bb2a709e2387152d2695790625a89a84b921b708eac0.xls
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
c03e2677ba3b79f8bdf1bb2a709e2387152d2695790625a89a84b921b708eac0.xls
Resource
win10-20220901-en
General
-
Target
c03e2677ba3b79f8bdf1bb2a709e2387152d2695790625a89a84b921b708eac0.xls
-
Size
217KB
-
MD5
fa1d59a5f227350a9b8e7fdf7d664a19
-
SHA1
d2c2379483c34b730faec3344429da544a15a6cd
-
SHA256
c03e2677ba3b79f8bdf1bb2a709e2387152d2695790625a89a84b921b708eac0
-
SHA512
ea296806265062397be315f9f6555a9e723f531e9c421ad39b08539bfa28bab6b3b16d9da44c909b67c7f009621a086fa1b55a978b555f7f0f3d92d3ed0390fb
-
SSDEEP
6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQm8:JbGUMVWlb8
Malware Config
Extracted
http://aquariorecords.com.br/wp-content/A8G3ownNApEj1L4hF/
http://ftp.pricoat.com.mx/Fichas/3ybJLLXu5zqqn8Sx/
http://armannahalpersian.ir/3H5qqUOB/
http://alagi.ge/application/irnz5Rs8qWvQrf/
Extracted
emotet
Epoch5
178.238.225.252:8080
139.196.72.155:8080
36.67.23.59:443
103.56.149.105:8080
37.44.244.177:8080
85.25.120.45:8080
202.134.4.210:7080
78.47.204.80:443
83.229.80.93:8080
93.104.209.107:8080
80.211.107.116:8080
165.22.254.236:8080
104.244.79.94:443
185.148.169.10:8080
190.145.8.4:443
175.126.176.79:8080
139.59.80.108:8080
188.165.79.151:443
128.199.217.206:443
64.227.55.231:8080
218.38.121.17:443
103.71.99.57:8080
103.224.241.74:8080
128.199.242.164:8080
85.214.67.203:8080
103.254.12.236:7080
46.101.98.60:8080
178.62.112.199:8080
210.57.209.142:8080
195.77.239.39:8080
103.126.216.86:443
82.98.180.154:7080
202.28.34.99:8080
174.138.33.49:7080
160.16.143.191:8080
51.75.33.122:443
103.41.204.169:8080
186.250.48.5:443
87.106.97.83:7080
118.98.72.86:443
196.44.98.190:8080
103.85.95.4:8080
62.171.178.147:8080
54.37.228.122:443
114.79.130.68:443
198.199.70.22:8080
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3708 2748 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4700 2748 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4932 2748 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1736 2748 regsvr32.exe 65 -
Downloads MZ/PE file
-
Loads dropped DLL 3 IoCs
pid Process 4700 regsvr32.exe 4932 regsvr32.exe 1736 regsvr32.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PBCGGgsAOfJuxKO.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\IKzkglDj\\PBCGGgsAOfJuxKO.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nqbOgVYDSiky.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\NZLJHp\\nqbOgVYDSiky.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tVWS.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\EAGUT\\tVWS.dll\"" regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2748 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4700 regsvr32.exe 4700 regsvr32.exe 4720 regsvr32.exe 4720 regsvr32.exe 4932 regsvr32.exe 4932 regsvr32.exe 4720 regsvr32.exe 4720 regsvr32.exe 4920 regsvr32.exe 4920 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 4920 regsvr32.exe 4920 regsvr32.exe 1240 regsvr32.exe 1240 regsvr32.exe 1240 regsvr32.exe 1240 regsvr32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2748 wrote to memory of 3708 2748 EXCEL.EXE 68 PID 2748 wrote to memory of 3708 2748 EXCEL.EXE 68 PID 2748 wrote to memory of 4700 2748 EXCEL.EXE 69 PID 2748 wrote to memory of 4700 2748 EXCEL.EXE 69 PID 4700 wrote to memory of 4720 4700 regsvr32.exe 71 PID 4700 wrote to memory of 4720 4700 regsvr32.exe 71 PID 2748 wrote to memory of 4932 2748 EXCEL.EXE 72 PID 2748 wrote to memory of 4932 2748 EXCEL.EXE 72 PID 4932 wrote to memory of 4920 4932 regsvr32.exe 73 PID 4932 wrote to memory of 4920 4932 regsvr32.exe 73 PID 2748 wrote to memory of 1736 2748 EXCEL.EXE 74 PID 2748 wrote to memory of 1736 2748 EXCEL.EXE 74 PID 1736 wrote to memory of 1240 1736 regsvr32.exe 75 PID 1736 wrote to memory of 1240 1736 regsvr32.exe 75
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\c03e2677ba3b79f8bdf1bb2a709e2387152d2695790625a89a84b921b708eac0.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
PID:3708
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\IKzkglDj\PBCGGgsAOfJuxKO.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4720
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\NZLJHp\nqbOgVYDSiky.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\EAGUT\tVWS.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD5b0e3f190f2009e8485e0f43535e18aa6
SHA19e72941d806437fe58432c27e00e8c2fe8fda1d5
SHA25620f7d9ee30bca6b080aa2fe8f7f9ccd20c40768fff04631d8ee385f577ddee9e
SHA5127125a6e3a7c88d69e420318aa64c3d81052a7e8168a6e65bb73d955a2e8055ea66e50f07450cd428d53b3b47b3d7d3230cd508ff48f0ecc75468fc23f39b07fa
-
Filesize
751KB
MD5df377b976476ca9bd1a96cba0130eeb8
SHA1ad109e27cfba87e35e2b541170c7ca5e5a2d6aba
SHA256df36b537de96748276d150adb2f8fad3a9f4c7ffb159620fdd0d396557f61ba8
SHA5125532730f9e43eeb53d627bac17e60228d8c8e9d1e363d550d88e8c3789b812794941c3fab80ea29d8c44244f00e4cd0a16dcf612972eeaa4de33055bf0817046
-
Filesize
751KB
MD55b0ba310652be57709df73dcb7ae9693
SHA1de2eb2be703176c59e812b19ea63a55feba1bfc0
SHA256327471050384bd38c28d3bbe098f7f38372ac3e380f5ee527bbd8f3dc6c8a01d
SHA51271532c48e5ce6cf2b4134aecadd2b347f2030c7a82a2443724c737dce16ceaa7e5d740bbb62d91276a7935da233e81ac92efcf352d5a1f3e442fcdbeaf7faaad
-
Filesize
751KB
MD5b0e3f190f2009e8485e0f43535e18aa6
SHA19e72941d806437fe58432c27e00e8c2fe8fda1d5
SHA25620f7d9ee30bca6b080aa2fe8f7f9ccd20c40768fff04631d8ee385f577ddee9e
SHA5127125a6e3a7c88d69e420318aa64c3d81052a7e8168a6e65bb73d955a2e8055ea66e50f07450cd428d53b3b47b3d7d3230cd508ff48f0ecc75468fc23f39b07fa
-
Filesize
751KB
MD5df377b976476ca9bd1a96cba0130eeb8
SHA1ad109e27cfba87e35e2b541170c7ca5e5a2d6aba
SHA256df36b537de96748276d150adb2f8fad3a9f4c7ffb159620fdd0d396557f61ba8
SHA5125532730f9e43eeb53d627bac17e60228d8c8e9d1e363d550d88e8c3789b812794941c3fab80ea29d8c44244f00e4cd0a16dcf612972eeaa4de33055bf0817046
-
Filesize
751KB
MD55b0ba310652be57709df73dcb7ae9693
SHA1de2eb2be703176c59e812b19ea63a55feba1bfc0
SHA256327471050384bd38c28d3bbe098f7f38372ac3e380f5ee527bbd8f3dc6c8a01d
SHA51271532c48e5ce6cf2b4134aecadd2b347f2030c7a82a2443724c737dce16ceaa7e5d740bbb62d91276a7935da233e81ac92efcf352d5a1f3e442fcdbeaf7faaad