Analysis
-
max time kernel
107s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2022 06:39
Behavioral task
behavioral1
Sample
New Address and payment details.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
New Address and payment details.xls
Resource
win10v2004-20220812-en
General
-
Target
New Address and payment details.xls
-
Size
217KB
-
MD5
ba55fedd29b4b26c1723e1da93ab0d16
-
SHA1
0e43bac61d6f45910211dcfe37f340f425954b43
-
SHA256
76d27143073085b490359761021d339f2a0c32d91dbc13559adf8843307a3959
-
SHA512
ac21b19ea69b681ce5272b26b1c35e328568e44e35248463be47a6eddbf76968a144f71ff4bb5c13bf5c09ca2b66c1b2d565ebca1cac5424d7f13b3980c517e8
-
SSDEEP
6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQm7pnT:1bGUMVWlbZ
Malware Config
Extracted
http://app.clubdedocentes.com/storage/DCcq9ekgH99sI/
http://linhkiendoc.com/app/payments/qoy5JqpLqrbsKl/
http://sourcecool.com/throng/iOD/
http://www.stickers-et-deco.com/Adapter/lYw/
Extracted
emotet
Epoch4
45.235.8.30:8080
94.23.45.86:4143
119.59.103.152:8080
169.60.181.70:8080
164.68.99.3:8080
172.105.226.75:8080
107.170.39.149:8080
206.189.28.199:8080
1.234.2.232:8080
188.44.20.25:443
186.194.240.217:443
103.43.75.120:443
149.28.143.92:443
159.89.202.34:443
209.97.163.214:443
183.111.227.137:8080
129.232.188.93:443
139.59.126.41:443
110.232.117.186:8080
139.59.56.73:8080
103.75.201.2:443
91.207.28.33:8080
164.90.222.65:443
197.242.150.244:8080
212.24.98.99:8080
51.161.73.194:443
115.68.227.76:8080
159.65.88.10:8080
201.94.166.162:443
95.217.221.146:8080
173.212.193.249:8080
82.223.21.224:8080
103.132.242.26:8080
213.239.212.5:443
153.126.146.25:7080
45.176.232.124:443
182.162.143.56:443
169.57.156.166:8080
159.65.140.115:443
163.44.196.120:8080
172.104.251.154:8080
167.172.253.162:8080
91.187.140.35:8080
45.118.115.99:8080
147.139.166.154:8080
72.15.201.15:8080
149.56.131.28:8080
167.172.199.165:8080
101.50.0.91:8080
160.16.142.56:8080
185.4.135.165:8080
104.168.155.143:8080
79.137.35.198:8080
5.135.159.50:443
187.63.160.88:80
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3464 3156 regsvr32.exe 78 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4212 3156 regsvr32.exe 78 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3240 3156 regsvr32.exe 78 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2992 3156 regsvr32.exe 78 -
Downloads MZ/PE file
-
Loads dropped DLL 4 IoCs
pid Process 3464 regsvr32.exe 4620 regsvr32.exe 2992 regsvr32.exe 4596 regsvr32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KPjRapx.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\FqwVvHlLlpWVW\\KPjRapx.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BrdKqkX.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\OTIcuowKCOmhLnO\\BrdKqkX.dll\"" regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3156 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3464 regsvr32.exe 3464 regsvr32.exe 4620 regsvr32.exe 4620 regsvr32.exe 4620 regsvr32.exe 4620 regsvr32.exe 2992 regsvr32.exe 2992 regsvr32.exe 4596 regsvr32.exe 4596 regsvr32.exe 4596 regsvr32.exe 4596 regsvr32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3156 EXCEL.EXE 3156 EXCEL.EXE 3156 EXCEL.EXE 3156 EXCEL.EXE 3156 EXCEL.EXE 3156 EXCEL.EXE 3156 EXCEL.EXE 3156 EXCEL.EXE 3156 EXCEL.EXE 3156 EXCEL.EXE 3156 EXCEL.EXE 3156 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3156 wrote to memory of 3464 3156 EXCEL.EXE 86 PID 3156 wrote to memory of 3464 3156 EXCEL.EXE 86 PID 3464 wrote to memory of 4620 3464 regsvr32.exe 90 PID 3464 wrote to memory of 4620 3464 regsvr32.exe 90 PID 3156 wrote to memory of 4212 3156 EXCEL.EXE 92 PID 3156 wrote to memory of 4212 3156 EXCEL.EXE 92 PID 3156 wrote to memory of 3240 3156 EXCEL.EXE 93 PID 3156 wrote to memory of 3240 3156 EXCEL.EXE 93 PID 3156 wrote to memory of 2992 3156 EXCEL.EXE 94 PID 3156 wrote to memory of 2992 3156 EXCEL.EXE 94 PID 2992 wrote to memory of 4596 2992 regsvr32.exe 95 PID 2992 wrote to memory of 4596 2992 regsvr32.exe 95
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\New Address and payment details.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\FqwVvHlLlpWVW\KPjRapx.dll"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
PID:4212
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
PID:3240
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\OTIcuowKCOmhLnO\BrdKqkX.dll"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
745KB
MD5120dc13be001f296a52fa14a89d482e3
SHA15fbab98a35a3af834ade0f9025993b26a45954e5
SHA256beb363b7be4b12ab84b0823257217ee2f82f382c9e4dd3bf995b85e86b610b69
SHA512be237316361fb80f6c4376030c4789989f261a966b99b924ed485edf9c1071c1511a607ce28a925ef0d69e87365e243a59306740773b8141970e67522e67603d
-
Filesize
745KB
MD5120dc13be001f296a52fa14a89d482e3
SHA15fbab98a35a3af834ade0f9025993b26a45954e5
SHA256beb363b7be4b12ab84b0823257217ee2f82f382c9e4dd3bf995b85e86b610b69
SHA512be237316361fb80f6c4376030c4789989f261a966b99b924ed485edf9c1071c1511a607ce28a925ef0d69e87365e243a59306740773b8141970e67522e67603d
-
Filesize
745KB
MD5414060f4cd538217a54627fda16c89d4
SHA14ebf9042ab8ff0079d59fc15b83e71152c877d06
SHA2562ec53796b54ce3436c9670d1b5d37341233acae72915a890efe770eeaf7212b2
SHA51287c0fadbfabca356c3300086b200a0179299136efb2fa47a6b1d944943eee6d6a4e4176545807e3bf121dbfd9568a302604598ad177d23b07348917c0edb8256
-
Filesize
745KB
MD5414060f4cd538217a54627fda16c89d4
SHA14ebf9042ab8ff0079d59fc15b83e71152c877d06
SHA2562ec53796b54ce3436c9670d1b5d37341233acae72915a890efe770eeaf7212b2
SHA51287c0fadbfabca356c3300086b200a0179299136efb2fa47a6b1d944943eee6d6a4e4176545807e3bf121dbfd9568a302604598ad177d23b07348917c0edb8256
-
Filesize
745KB
MD5120dc13be001f296a52fa14a89d482e3
SHA15fbab98a35a3af834ade0f9025993b26a45954e5
SHA256beb363b7be4b12ab84b0823257217ee2f82f382c9e4dd3bf995b85e86b610b69
SHA512be237316361fb80f6c4376030c4789989f261a966b99b924ed485edf9c1071c1511a607ce28a925ef0d69e87365e243a59306740773b8141970e67522e67603d
-
Filesize
745KB
MD5414060f4cd538217a54627fda16c89d4
SHA14ebf9042ab8ff0079d59fc15b83e71152c877d06
SHA2562ec53796b54ce3436c9670d1b5d37341233acae72915a890efe770eeaf7212b2
SHA51287c0fadbfabca356c3300086b200a0179299136efb2fa47a6b1d944943eee6d6a4e4176545807e3bf121dbfd9568a302604598ad177d23b07348917c0edb8256