Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
04/11/2022, 03:08
Behavioral task
behavioral1
Sample
3544a78168c49febda5d4a45bdf64bbeea10979d45c0c32ab4f0d6b4ec459001.xls
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
3544a78168c49febda5d4a45bdf64bbeea10979d45c0c32ab4f0d6b4ec459001.xls
Resource
win10-20220901-en
General
-
Target
3544a78168c49febda5d4a45bdf64bbeea10979d45c0c32ab4f0d6b4ec459001.xls
-
Size
217KB
-
MD5
4441537b4f2823ed68e2f57856fbd1f8
-
SHA1
617d5010b3f4d8c81ea3512f19ddf1b29bdf7d39
-
SHA256
3544a78168c49febda5d4a45bdf64bbeea10979d45c0c32ab4f0d6b4ec459001
-
SHA512
cbc2b9b322660718db7894c5c6b711febe6ed59bd03039f0ae339e18d35e01a65195d14a47af360f09eefa2a0aceeada8ad0284a81d75ee026c2531aedebe7f6
-
SSDEEP
6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgXyY+TAQXTHGUMEyP5p6f5jQmW:DbGUMVWlbW
Malware Config
Extracted
https://barkstage.es/wp-content/0E7NdYl7TZuHMJq7/
http://contactworks.nl/images_old/NuEAhfF0PCFhvv/
http://www.iam.ch/wp-content/cache/minify/O1OAjWnfen/
https://www.elaboro.pl/wp-admin/J0hwyIMsk9YFIi/
Extracted
emotet
Epoch5
178.238.225.252:8080
139.196.72.155:8080
36.67.23.59:443
103.56.149.105:8080
37.44.244.177:8080
85.25.120.45:8080
202.134.4.210:7080
78.47.204.80:443
83.229.80.93:8080
93.104.209.107:8080
80.211.107.116:8080
165.22.254.236:8080
104.244.79.94:443
185.148.169.10:8080
190.145.8.4:443
175.126.176.79:8080
139.59.80.108:8080
188.165.79.151:443
128.199.217.206:443
64.227.55.231:8080
218.38.121.17:443
103.71.99.57:8080
103.224.241.74:8080
128.199.242.164:8080
85.214.67.203:8080
103.254.12.236:7080
46.101.98.60:8080
178.62.112.199:8080
210.57.209.142:8080
195.77.239.39:8080
103.126.216.86:443
82.98.180.154:7080
202.28.34.99:8080
174.138.33.49:7080
160.16.143.191:8080
51.75.33.122:443
103.41.204.169:8080
186.250.48.5:443
87.106.97.83:7080
118.98.72.86:443
196.44.98.190:8080
103.85.95.4:8080
62.171.178.147:8080
54.37.228.122:443
114.79.130.68:443
198.199.70.22:8080
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4368 1532 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4664 1532 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4768 1532 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 676 1532 regsvr32.exe 65 -
Downloads MZ/PE file
-
Loads dropped DLL 3 IoCs
pid Process 4368 regsvr32.exe 4664 regsvr32.exe 676 regsvr32.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WcOYdq.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\QVaDBIzkNmF\\WcOYdq.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OVpTSn.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\RUKmLJhOA\\OVpTSn.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kHrjrhqiiM.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\TeNeAP\\kHrjrhqiiM.dll\"" regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1532 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4368 regsvr32.exe 4368 regsvr32.exe 4460 regsvr32.exe 4460 regsvr32.exe 4664 regsvr32.exe 4664 regsvr32.exe 4460 regsvr32.exe 4460 regsvr32.exe 4412 regsvr32.exe 4412 regsvr32.exe 4412 regsvr32.exe 4412 regsvr32.exe 676 regsvr32.exe 676 regsvr32.exe 1848 regsvr32.exe 1848 regsvr32.exe 1848 regsvr32.exe 1848 regsvr32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1532 EXCEL.EXE 1532 EXCEL.EXE 1532 EXCEL.EXE 1532 EXCEL.EXE 1532 EXCEL.EXE 1532 EXCEL.EXE 1532 EXCEL.EXE 1532 EXCEL.EXE 1532 EXCEL.EXE 1532 EXCEL.EXE 1532 EXCEL.EXE 1532 EXCEL.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1532 wrote to memory of 4368 1532 EXCEL.EXE 68 PID 1532 wrote to memory of 4368 1532 EXCEL.EXE 68 PID 4368 wrote to memory of 4460 4368 regsvr32.exe 69 PID 4368 wrote to memory of 4460 4368 regsvr32.exe 69 PID 1532 wrote to memory of 4664 1532 EXCEL.EXE 70 PID 1532 wrote to memory of 4664 1532 EXCEL.EXE 70 PID 4664 wrote to memory of 4412 4664 regsvr32.exe 72 PID 4664 wrote to memory of 4412 4664 regsvr32.exe 72 PID 1532 wrote to memory of 4768 1532 EXCEL.EXE 73 PID 1532 wrote to memory of 4768 1532 EXCEL.EXE 73 PID 1532 wrote to memory of 676 1532 EXCEL.EXE 74 PID 1532 wrote to memory of 676 1532 EXCEL.EXE 74 PID 676 wrote to memory of 1848 676 regsvr32.exe 75 PID 676 wrote to memory of 1848 676 regsvr32.exe 75
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3544a78168c49febda5d4a45bdf64bbeea10979d45c0c32ab4f0d6b4ec459001.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\QVaDBIzkNmF\WcOYdq.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\RUKmLJhOA\OVpTSn.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
PID:4768
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\TeNeAP\kHrjrhqiiM.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD55717e279af1a0bc68447d4ab5ababab3
SHA1a8a8a1bc3489db37c3fc21b632af450a09bfd651
SHA256260273cc06522bf9810fc6a8820d06566c41676e03a5e1afca6fc6e89896e5b4
SHA512a6b99669876d092bed7158ab62f8039044eed0d3d4999f60f76cebed5174892a68c4c3d85227ab7d0183bd07ff8bd86c07a16af9beca216f5e026c6511b163a1
-
Filesize
751KB
MD54638bfd4497e8238d322b778200c7471
SHA124dde394d9c3de5490231a6ebd80ec424cb353d6
SHA256c955b5758048e79666928e7db82d41fd2d500607561ac03eda1dc2fb95ce2d62
SHA51280c2a081e6522e4e859f297ed858c15f69a73c41d4470e6c8ab477b98cc942d2622aadc1ff1a6793e8329240fbcea5c38dcf17550affce7e94610d947e1bf363
-
Filesize
751KB
MD55c9a7ffcbebaac55e6e8a55ad51b8723
SHA1d15289de24daabba19bc0e4ec076c1903ccf9e3c
SHA2563c323c26993ef95c35adb4b39a6e6109f428329d96ddbb609ae8ceb5c3637ee2
SHA512e37a90bccdabad319e560db2ed3bc3521cc49e3f52cc1538e17c27b9b59d758ef963ebc2946d2bb2f129bc14652772cc9584d2bc8dd8468e0b7b8d62652eda51
-
Filesize
751KB
MD55717e279af1a0bc68447d4ab5ababab3
SHA1a8a8a1bc3489db37c3fc21b632af450a09bfd651
SHA256260273cc06522bf9810fc6a8820d06566c41676e03a5e1afca6fc6e89896e5b4
SHA512a6b99669876d092bed7158ab62f8039044eed0d3d4999f60f76cebed5174892a68c4c3d85227ab7d0183bd07ff8bd86c07a16af9beca216f5e026c6511b163a1
-
Filesize
751KB
MD54638bfd4497e8238d322b778200c7471
SHA124dde394d9c3de5490231a6ebd80ec424cb353d6
SHA256c955b5758048e79666928e7db82d41fd2d500607561ac03eda1dc2fb95ce2d62
SHA51280c2a081e6522e4e859f297ed858c15f69a73c41d4470e6c8ab477b98cc942d2622aadc1ff1a6793e8329240fbcea5c38dcf17550affce7e94610d947e1bf363
-
Filesize
751KB
MD55c9a7ffcbebaac55e6e8a55ad51b8723
SHA1d15289de24daabba19bc0e4ec076c1903ccf9e3c
SHA2563c323c26993ef95c35adb4b39a6e6109f428329d96ddbb609ae8ceb5c3637ee2
SHA512e37a90bccdabad319e560db2ed3bc3521cc49e3f52cc1538e17c27b9b59d758ef963ebc2946d2bb2f129bc14652772cc9584d2bc8dd8468e0b7b8d62652eda51