Analysis
-
max time kernel
100s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
04/11/2022, 04:34
Behavioral task
behavioral1
Sample
c2f6f3dfb158213a182201a528de52fd3de74f82a0174c8889263a0f1d5c8f0a.xls
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
c2f6f3dfb158213a182201a528de52fd3de74f82a0174c8889263a0f1d5c8f0a.xls
Resource
win10-20220812-en
General
-
Target
c2f6f3dfb158213a182201a528de52fd3de74f82a0174c8889263a0f1d5c8f0a.xls
-
Size
217KB
-
MD5
1c68598fea1e804e6e83b20645d7a7c1
-
SHA1
8e3e2f822b7ce0f81de93c3c2c38d63c44bf88bc
-
SHA256
c2f6f3dfb158213a182201a528de52fd3de74f82a0174c8889263a0f1d5c8f0a
-
SHA512
02d07291ca76e0dacd1ca005fe43ffefdbb3315ba047bff4d12c772d4c35aa0c73018c0e8249b0658bb32424a12b79e77597eea69cc639f2bbca4aed6f44e040
-
SSDEEP
6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQm4:JbGUMVWlb4
Malware Config
Extracted
http://aquariorecords.com.br/wp-content/A8G3ownNApEj1L4hF/
http://ftp.pricoat.com.mx/Fichas/3ybJLLXu5zqqn8Sx/
http://armannahalpersian.ir/3H5qqUOB/
http://alagi.ge/application/irnz5Rs8qWvQrf/
Extracted
emotet
Epoch5
178.238.225.252:8080
139.196.72.155:8080
36.67.23.59:443
103.56.149.105:8080
37.44.244.177:8080
85.25.120.45:8080
202.134.4.210:7080
78.47.204.80:443
83.229.80.93:8080
93.104.209.107:8080
80.211.107.116:8080
165.22.254.236:8080
104.244.79.94:443
185.148.169.10:8080
190.145.8.4:443
175.126.176.79:8080
139.59.80.108:8080
188.165.79.151:443
128.199.217.206:443
64.227.55.231:8080
218.38.121.17:443
103.71.99.57:8080
103.224.241.74:8080
128.199.242.164:8080
85.214.67.203:8080
103.254.12.236:7080
46.101.98.60:8080
178.62.112.199:8080
210.57.209.142:8080
195.77.239.39:8080
103.126.216.86:443
82.98.180.154:7080
202.28.34.99:8080
174.138.33.49:7080
160.16.143.191:8080
51.75.33.122:443
103.41.204.169:8080
186.250.48.5:443
87.106.97.83:7080
118.98.72.86:443
196.44.98.190:8080
103.85.95.4:8080
62.171.178.147:8080
54.37.228.122:443
114.79.130.68:443
198.199.70.22:8080
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4492 2748 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4928 2748 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4416 2748 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1272 2748 regsvr32.exe 65 -
Downloads MZ/PE file
-
Loads dropped DLL 3 IoCs
pid Process 4928 regsvr32.exe 4416 regsvr32.exe 1272 regsvr32.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vXlyGw.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\LwozoSVpy\\vXlyGw.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XXUrjsSO.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\WuVogwW\\XXUrjsSO.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HxbvYEDEZx.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\GDZrC\\HxbvYEDEZx.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2748 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4928 regsvr32.exe 4928 regsvr32.exe 4496 regsvr32.exe 4496 regsvr32.exe 4416 regsvr32.exe 4416 regsvr32.exe 4496 regsvr32.exe 4496 regsvr32.exe 944 regsvr32.exe 944 regsvr32.exe 944 regsvr32.exe 944 regsvr32.exe 1272 regsvr32.exe 1272 regsvr32.exe 3308 regsvr32.exe 3308 regsvr32.exe 3308 regsvr32.exe 3308 regsvr32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE 2748 EXCEL.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2748 wrote to memory of 4492 2748 EXCEL.EXE 68 PID 2748 wrote to memory of 4492 2748 EXCEL.EXE 68 PID 2748 wrote to memory of 4928 2748 EXCEL.EXE 71 PID 2748 wrote to memory of 4928 2748 EXCEL.EXE 71 PID 4928 wrote to memory of 4496 4928 regsvr32.exe 74 PID 4928 wrote to memory of 4496 4928 regsvr32.exe 74 PID 2748 wrote to memory of 4416 2748 EXCEL.EXE 75 PID 2748 wrote to memory of 4416 2748 EXCEL.EXE 75 PID 4416 wrote to memory of 944 4416 regsvr32.exe 77 PID 4416 wrote to memory of 944 4416 regsvr32.exe 77 PID 2748 wrote to memory of 1272 2748 EXCEL.EXE 78 PID 2748 wrote to memory of 1272 2748 EXCEL.EXE 78 PID 1272 wrote to memory of 3308 1272 regsvr32.exe 80 PID 1272 wrote to memory of 3308 1272 regsvr32.exe 80
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\c2f6f3dfb158213a182201a528de52fd3de74f82a0174c8889263a0f1d5c8f0a.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
PID:4492
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\WuVogwW\XXUrjsSO.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\GDZrC\HxbvYEDEZx.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:944
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\LwozoSVpy\vXlyGw.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD56f5fa81c3023f6eb56d30ddfcb34bb07
SHA1960127b2aad9a637584aad0918f1d509be780a18
SHA256205eefdf16ad9a1c0eaf41333dfc8588ac8543d807b41408d875651259b348e7
SHA512863546e9be74c02a876db396a4ccc25f312e737429b06543f712d93dfd3229f6aa06bf9ea7a0ad2486c2aff83b1d7511fb9e5ee19682d9b78ff293b912e64aa1
-
Filesize
751KB
MD5129f52a484cff2623a84de14a273f776
SHA1c46c876494debd40903dd55b15cc22876999ffbc
SHA2565437897980f8ddca6a79bdd456c06932ae4de48c5748b76bb2739a2ffac2437e
SHA5123e6653b139553a1360a147bd456f48bba686d437e16509f73372a7ccaa24f099a4864a6592686e8de9dda33d81ed604a1d98b1c0b7e6f69202583a8eb0e65fd0
-
Filesize
751KB
MD5566d4b6fbaa983668d1675fb7f8d89fb
SHA1594d22e3c526fe5a5ee6bec3857667522549ce38
SHA25628e1e0a50fd363f26bef7734caa21bcf54fae73777bddad627411adf253644a9
SHA512e310b9c4d6da45221b36ed8cc08f9dd4e5b7686d191ff57502e996f12517f6f4df7db5ec62d6ed3cd017d5d2dd1466a20ebf8111d7b4ac2e334880d4db2c569d
-
Filesize
751KB
MD56f5fa81c3023f6eb56d30ddfcb34bb07
SHA1960127b2aad9a637584aad0918f1d509be780a18
SHA256205eefdf16ad9a1c0eaf41333dfc8588ac8543d807b41408d875651259b348e7
SHA512863546e9be74c02a876db396a4ccc25f312e737429b06543f712d93dfd3229f6aa06bf9ea7a0ad2486c2aff83b1d7511fb9e5ee19682d9b78ff293b912e64aa1
-
Filesize
751KB
MD5129f52a484cff2623a84de14a273f776
SHA1c46c876494debd40903dd55b15cc22876999ffbc
SHA2565437897980f8ddca6a79bdd456c06932ae4de48c5748b76bb2739a2ffac2437e
SHA5123e6653b139553a1360a147bd456f48bba686d437e16509f73372a7ccaa24f099a4864a6592686e8de9dda33d81ed604a1d98b1c0b7e6f69202583a8eb0e65fd0
-
Filesize
751KB
MD5566d4b6fbaa983668d1675fb7f8d89fb
SHA1594d22e3c526fe5a5ee6bec3857667522549ce38
SHA25628e1e0a50fd363f26bef7734caa21bcf54fae73777bddad627411adf253644a9
SHA512e310b9c4d6da45221b36ed8cc08f9dd4e5b7686d191ff57502e996f12517f6f4df7db5ec62d6ed3cd017d5d2dd1466a20ebf8111d7b4ac2e334880d4db2c569d