Analysis
-
max time kernel
101s -
max time network
127s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
04-11-2022 08:29
Behavioral task
behavioral1
Sample
b9b8501242d11f0129fe9ccc0caf6abe318404e0209229ee421a64a4d4076644.xls
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
b9b8501242d11f0129fe9ccc0caf6abe318404e0209229ee421a64a4d4076644.xls
Resource
win10-20220812-en
General
-
Target
b9b8501242d11f0129fe9ccc0caf6abe318404e0209229ee421a64a4d4076644.xls
-
Size
217KB
-
MD5
572980fd611b67679b2fcaab7ce22b8e
-
SHA1
ddec7506614df36906a2f7caa68bbca65b57a65f
-
SHA256
b9b8501242d11f0129fe9ccc0caf6abe318404e0209229ee421a64a4d4076644
-
SHA512
ab3469972ba08c1542fbb19524d220d0fcc7c3d80bd10bef8649b8e467b6cd9bf4c703a1fca23c2335932e3db946bd9d932e4a712979b3c566c7012c4eb58c2a
-
SSDEEP
6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dg3yY+TAQXTHGUMEyP5p6f5jQmQ:TbGUMVWlbQ
Malware Config
Extracted
https://wijsneusmedia.nl/cgi-bin/DvxmZndf0/
http://brittknight.com/PHP/Aqxf09OugZ/
http://nlasandbox.com/facebookpage/JFqg2Aqkl3UPZi6xGz/
http://www.campusconindigital.org/moodle/LumMe/
Extracted
emotet
Epoch4
45.235.8.30:8080
94.23.45.86:4143
119.59.103.152:8080
169.60.181.70:8080
164.68.99.3:8080
172.105.226.75:8080
107.170.39.149:8080
206.189.28.199:8080
1.234.2.232:8080
188.44.20.25:443
186.194.240.217:443
103.43.75.120:443
149.28.143.92:443
159.89.202.34:443
209.97.163.214:443
183.111.227.137:8080
129.232.188.93:443
139.59.126.41:443
110.232.117.186:8080
139.59.56.73:8080
103.75.201.2:443
91.207.28.33:8080
164.90.222.65:443
197.242.150.244:8080
212.24.98.99:8080
51.161.73.194:443
115.68.227.76:8080
159.65.88.10:8080
201.94.166.162:443
95.217.221.146:8080
173.212.193.249:8080
82.223.21.224:8080
103.132.242.26:8080
213.239.212.5:443
153.126.146.25:7080
45.176.232.124:443
182.162.143.56:443
169.57.156.166:8080
159.65.140.115:443
163.44.196.120:8080
172.104.251.154:8080
167.172.253.162:8080
91.187.140.35:8080
45.118.115.99:8080
147.139.166.154:8080
72.15.201.15:8080
149.56.131.28:8080
167.172.199.165:8080
101.50.0.91:8080
160.16.142.56:8080
185.4.135.165:8080
104.168.155.143:8080
79.137.35.198:8080
5.135.159.50:443
187.63.160.88:80
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4632 2692 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3204 2692 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1668 2692 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 220 2692 regsvr32.exe 65 -
Downloads MZ/PE file
-
Loads dropped DLL 3 IoCs
pid Process 4632 regsvr32.exe 3204 regsvr32.exe 1668 regsvr32.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VJAcxVKq.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\BAxbBEKApWuMNQLwR\\VJAcxVKq.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RhrILycczYk.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\KXMsUiE\\RhrILycczYk.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\uPyQOpYah.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\GJxspMqPMo\\uPyQOpYah.dll\"" regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2692 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4632 regsvr32.exe 4632 regsvr32.exe 1332 regsvr32.exe 1332 regsvr32.exe 1332 regsvr32.exe 1332 regsvr32.exe 3204 regsvr32.exe 3204 regsvr32.exe 1264 regsvr32.exe 1264 regsvr32.exe 1264 regsvr32.exe 1264 regsvr32.exe 1668 regsvr32.exe 1668 regsvr32.exe 3324 regsvr32.exe 3324 regsvr32.exe 3324 regsvr32.exe 3324 regsvr32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2692 EXCEL.EXE 2692 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2692 EXCEL.EXE 2692 EXCEL.EXE 2692 EXCEL.EXE 2692 EXCEL.EXE 2692 EXCEL.EXE 2692 EXCEL.EXE 2692 EXCEL.EXE 2692 EXCEL.EXE 2692 EXCEL.EXE 2692 EXCEL.EXE 2692 EXCEL.EXE 2692 EXCEL.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4632 2692 EXCEL.EXE 70 PID 2692 wrote to memory of 4632 2692 EXCEL.EXE 70 PID 4632 wrote to memory of 1332 4632 regsvr32.exe 72 PID 4632 wrote to memory of 1332 4632 regsvr32.exe 72 PID 2692 wrote to memory of 3204 2692 EXCEL.EXE 76 PID 2692 wrote to memory of 3204 2692 EXCEL.EXE 76 PID 3204 wrote to memory of 1264 3204 regsvr32.exe 77 PID 3204 wrote to memory of 1264 3204 regsvr32.exe 77 PID 2692 wrote to memory of 1668 2692 EXCEL.EXE 78 PID 2692 wrote to memory of 1668 2692 EXCEL.EXE 78 PID 1668 wrote to memory of 3324 1668 regsvr32.exe 79 PID 1668 wrote to memory of 3324 1668 regsvr32.exe 79 PID 2692 wrote to memory of 220 2692 EXCEL.EXE 80 PID 2692 wrote to memory of 220 2692 EXCEL.EXE 80
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b9b8501242d11f0129fe9ccc0caf6abe318404e0209229ee421a64a4d4076644.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\BAxbBEKApWuMNQLwR\VJAcxVKq.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\KXMsUiE\RhrILycczYk.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1264
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\GJxspMqPMo\uPyQOpYah.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
PID:220
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
529KB
MD5b26f9e56f0bb25e9b56f0993c7bacdce
SHA15385516e04aaabf2d57b41f0f055ef843d6195d4
SHA25613c7da69d2bf6ff43019c6c906fc4b132e6e4361160b892e5cfa641b411ae314
SHA51279376415eb5b31b395b9faf7da4c9506bc7598ee8f2217ddbc31f681ea6094ee9fcc4ead9678b36d451bac39dca3dc840d6101184a1c64078143cf01f79e75fc
-
Filesize
529KB
MD5615ba1bd79b056f514693f69f42698ee
SHA1aa344291cd6d2579ebae2095451b4637eafb03a9
SHA25665852679aa5ed245f2ee7bb076a34e3cf27c559d79c477778ca57cc04f1e4232
SHA512360e254f82feff3118c72f5b963e7af88c60c6464a0c117195ef6a6de5d4bf50d45272e42f4e63a39a55ba6daad077d32db8c69638d0cf64eef370a9e57d1ba2
-
Filesize
529KB
MD5ed7cfb6d6ec708931be0ed257500a99f
SHA1f5a1263c399fc4dc97415dccd1a3168a8b837955
SHA256260991072e60a01c41b556adc081eb5d8aadb4bf918a02cf67890b8fe3730fa2
SHA51278a930519cbb7fd41882cb277488f3889e62ce23dc431a7eac6f0fdf28a446c77be5f5612419574c3edca065812e92507e93745b0bb30b63360452313121ba8d
-
Filesize
529KB
MD5b26f9e56f0bb25e9b56f0993c7bacdce
SHA15385516e04aaabf2d57b41f0f055ef843d6195d4
SHA25613c7da69d2bf6ff43019c6c906fc4b132e6e4361160b892e5cfa641b411ae314
SHA51279376415eb5b31b395b9faf7da4c9506bc7598ee8f2217ddbc31f681ea6094ee9fcc4ead9678b36d451bac39dca3dc840d6101184a1c64078143cf01f79e75fc
-
Filesize
529KB
MD5615ba1bd79b056f514693f69f42698ee
SHA1aa344291cd6d2579ebae2095451b4637eafb03a9
SHA25665852679aa5ed245f2ee7bb076a34e3cf27c559d79c477778ca57cc04f1e4232
SHA512360e254f82feff3118c72f5b963e7af88c60c6464a0c117195ef6a6de5d4bf50d45272e42f4e63a39a55ba6daad077d32db8c69638d0cf64eef370a9e57d1ba2
-
Filesize
529KB
MD5ed7cfb6d6ec708931be0ed257500a99f
SHA1f5a1263c399fc4dc97415dccd1a3168a8b837955
SHA256260991072e60a01c41b556adc081eb5d8aadb4bf918a02cf67890b8fe3730fa2
SHA51278a930519cbb7fd41882cb277488f3889e62ce23dc431a7eac6f0fdf28a446c77be5f5612419574c3edca065812e92507e93745b0bb30b63360452313121ba8d