Malware Analysis Report

2025-08-11 01:42

Sample ID 221109-x1zzysbea8
Target 2924040062.xls
SHA256 5658aa6f8a089d752a2ab2f2e9f4c291687cff0d4a5c58e313122e1fb0be2c52
Tags
macro xlm emotet epoch5 banker trojan persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

5658aa6f8a089d752a2ab2f2e9f4c291687cff0d4a5c58e313122e1fb0be2c52

Threat Level: Known bad

The file 2924040062.xls was found to be: Known bad.

Malicious Activity Summary

macro xlm emotet epoch5 banker trojan persistence

Emotet

Process spawned unexpected child process

Downloads MZ/PE file

Suspicious Office macro

Loads dropped DLL

Adds Run key to start application

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Checks processor information in registry

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: AddClipboardFormatListener

Modifies Internet Explorer settings

Modifies registry class

Enumerates system info in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-11-09 19:19

Signatures

Suspicious Office macro

macro xlm
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-11-09 19:19

Reported

2022-11-09 19:22

Platform

win7-20220812-en

Max time kernel

169s

Max time network

177s

Command Line

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\2924040062.xls

Signatures

Emotet

trojan banker emotet

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\SysWOW64\regsvr32.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\SysWOW64\regsvr32.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\SysWOW64\regsvr32.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\SysWOW64\regsvr32.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE

Downloads MZ/PE file

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1032 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1912 wrote to memory of 808 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1912 wrote to memory of 808 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1912 wrote to memory of 808 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1912 wrote to memory of 808 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1912 wrote to memory of 808 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1912 wrote to memory of 808 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1912 wrote to memory of 808 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 808 wrote to memory of 888 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 808 wrote to memory of 888 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 808 wrote to memory of 888 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 808 wrote to memory of 888 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 808 wrote to memory of 888 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1032 wrote to memory of 1232 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1232 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1232 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1232 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1232 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1232 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1232 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1232 wrote to memory of 1736 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1232 wrote to memory of 1736 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1232 wrote to memory of 1736 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1232 wrote to memory of 1736 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1232 wrote to memory of 1736 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1232 wrote to memory of 1736 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1232 wrote to memory of 1736 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1736 wrote to memory of 2008 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1736 wrote to memory of 2008 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1736 wrote to memory of 2008 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1736 wrote to memory of 2008 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1736 wrote to memory of 2008 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1032 wrote to memory of 276 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 276 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 276 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 276 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 276 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 276 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 276 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 276 wrote to memory of 1020 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 276 wrote to memory of 1020 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 276 wrote to memory of 1020 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 276 wrote to memory of 1020 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 276 wrote to memory of 1020 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 276 wrote to memory of 1020 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 276 wrote to memory of 1020 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1020 wrote to memory of 916 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1020 wrote to memory of 916 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1020 wrote to memory of 916 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1020 wrote to memory of 916 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1020 wrote to memory of 916 N/A C:\Windows\system32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1032 wrote to memory of 1784 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1784 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1784 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1784 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1784 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1784 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe
PID 1032 wrote to memory of 1784 N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\2924040062.xls

C:\Windows\SysWOW64\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx

C:\Windows\system32\regsvr32.exe

/S ..\elv1.ooocccxxx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XQIIARKuHLqR\SAFXpVyWDrqXX.dll"

C:\Windows\SysWOW64\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx

C:\Windows\system32\regsvr32.exe

/S ..\elv2.ooocccxxx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IyJpxEh\pWqr.dll"

C:\Windows\SysWOW64\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx

C:\Windows\system32\regsvr32.exe

/S ..\elv3.ooocccxxx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AgEclOAiMTIen\UbpYSXfxsV.dll"

C:\Windows\SysWOW64\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx

C:\Windows\system32\regsvr32.exe

/S ..\elv4.ooocccxxx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\TyRcSbKfsVc\IFGcBdczLKesKB.dll"

Network

Country Destination Domain Proto
US 8.8.8.8:53 bundlefilm.com udp
US 74.207.252.187:80 bundlefilm.com tcp
US 8.8.8.8:53 camsanparke.net udp
TR 213.142.148.59:80 camsanparke.net tcp
US 8.8.8.8:53 royreid.co.uk udp
GB 77.68.64.0:80 royreid.co.uk tcp
US 8.8.8.8:53 cs.com.sg udp
SG 103.237.169.99:443 cs.com.sg tcp
US 8.8.8.8:53 apps.identrust.com udp
NL 104.109.143.75:80 apps.identrust.com tcp
KR 218.38.121.17:443 tcp
KR 218.38.121.17:443 tcp
BR 186.250.48.5:443 tcp
KR 218.38.121.17:443 tcp
BR 186.250.48.5:443 tcp
KR 218.38.121.17:443 tcp
IT 80.211.107.116:8080 tcp
IT 80.211.107.116:8080 tcp
BR 186.250.48.5:443 tcp
BR 186.250.48.5:443 tcp
US 174.138.33.49:7080 tcp
US 174.138.33.49:7080 tcp
IT 80.211.107.116:8080 tcp
IT 80.211.107.116:8080 tcp
KR 218.38.121.17:443 tcp
KR 218.38.121.17:443 tcp
SG 165.22.254.236:8080 tcp
US 174.138.33.49:7080 tcp
US 174.138.33.49:7080 tcp
BR 186.250.48.5:443 tcp
BR 186.250.48.5:443 tcp
DE 185.148.169.10:8080 tcp
SG 165.22.254.236:8080 tcp
IT 80.211.107.116:8080 tcp
IT 80.211.107.116:8080 tcp
KR 218.38.121.17:443 tcp
DE 62.171.178.147:8080 tcp
KR 218.38.121.17:443 tcp
DE 185.148.169.10:8080 tcp
US 174.138.33.49:7080 tcp
US 174.138.33.49:7080 tcp
BR 186.250.48.5:443 tcp
BR 186.250.48.5:443 tcp
SG 128.199.217.206:443 tcp
DE 62.171.178.147:8080 tcp
SG 165.22.254.236:8080 tcp
IT 80.211.107.116:8080 tcp
IT 80.211.107.116:8080 tcp
ID 210.57.209.142:8080 tcp
SG 128.199.217.206:443 tcp
DE 185.148.169.10:8080 tcp
US 174.138.33.49:7080 tcp
US 174.138.33.49:7080 tcp
ID 36.67.23.59:443 tcp
ID 210.57.209.142:8080 tcp
DE 62.171.178.147:8080 tcp
SG 165.22.254.236:8080 tcp

Files

memory/1032-54-0x000000002FC81000-0x000000002FC84000-memory.dmp

memory/1032-55-0x0000000071371000-0x0000000071373000-memory.dmp

memory/1032-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

memory/1032-57-0x000000007235D000-0x0000000072368000-memory.dmp

memory/1032-58-0x0000000075501000-0x0000000075503000-memory.dmp

memory/1032-59-0x000000007235D000-0x0000000072368000-memory.dmp

memory/1912-60-0x0000000000000000-mapping.dmp

C:\Users\Admin\elv1.ooocccxxx

MD5 70329acd368c40e1aa6c5e652b4446bf
SHA1 ff932b9066c589e863481e4fe768f1cd45179c33
SHA256 393db4a830f16a7c347d952139ffc92e558fda88ae7b134d885b22fde3d32b37
SHA512 8d8c20e3062b212d6fff96ead9f43b0c004fb20451f4924cd8ae118c90ffd10d78885cf97d5f1e64049f78c6598470f2c16fe33f617ab046ff9aaecee21bea9e

\Users\Admin\elv1.ooocccxxx

MD5 70329acd368c40e1aa6c5e652b4446bf
SHA1 ff932b9066c589e863481e4fe768f1cd45179c33
SHA256 393db4a830f16a7c347d952139ffc92e558fda88ae7b134d885b22fde3d32b37
SHA512 8d8c20e3062b212d6fff96ead9f43b0c004fb20451f4924cd8ae118c90ffd10d78885cf97d5f1e64049f78c6598470f2c16fe33f617ab046ff9aaecee21bea9e

memory/808-64-0x0000000000000000-mapping.dmp

memory/808-65-0x000007FEFBD21000-0x000007FEFBD23000-memory.dmp

\Users\Admin\elv1.ooocccxxx

MD5 70329acd368c40e1aa6c5e652b4446bf
SHA1 ff932b9066c589e863481e4fe768f1cd45179c33
SHA256 393db4a830f16a7c347d952139ffc92e558fda88ae7b134d885b22fde3d32b37
SHA512 8d8c20e3062b212d6fff96ead9f43b0c004fb20451f4924cd8ae118c90ffd10d78885cf97d5f1e64049f78c6598470f2c16fe33f617ab046ff9aaecee21bea9e

memory/808-67-0x0000000180000000-0x0000000180030000-memory.dmp

memory/888-70-0x0000000000000000-mapping.dmp

memory/1232-75-0x0000000000000000-mapping.dmp

C:\Users\Admin\elv2.ooocccxxx

MD5 136182ddbf3b6c0fd38a2af3f43a77dc
SHA1 897ad8bded361c87932429255ce4089a6dbbb6ff
SHA256 ca12c7cade8dca428263d53316ce7f16b6f94f9aa66fa9d768968b64888c05fb
SHA512 b4ad1c5a1d24b9989eba702040a75f5425422750e9d0ab67ae632892af016d05a58670739f8a321e922d1b60ff9a86c2c816deded85fa7c261008181472b42ba

\Users\Admin\elv2.ooocccxxx

MD5 136182ddbf3b6c0fd38a2af3f43a77dc
SHA1 897ad8bded361c87932429255ce4089a6dbbb6ff
SHA256 ca12c7cade8dca428263d53316ce7f16b6f94f9aa66fa9d768968b64888c05fb
SHA512 b4ad1c5a1d24b9989eba702040a75f5425422750e9d0ab67ae632892af016d05a58670739f8a321e922d1b60ff9a86c2c816deded85fa7c261008181472b42ba

memory/1736-79-0x0000000000000000-mapping.dmp

\Users\Admin\elv2.ooocccxxx

MD5 136182ddbf3b6c0fd38a2af3f43a77dc
SHA1 897ad8bded361c87932429255ce4089a6dbbb6ff
SHA256 ca12c7cade8dca428263d53316ce7f16b6f94f9aa66fa9d768968b64888c05fb
SHA512 b4ad1c5a1d24b9989eba702040a75f5425422750e9d0ab67ae632892af016d05a58670739f8a321e922d1b60ff9a86c2c816deded85fa7c261008181472b42ba

memory/2008-85-0x0000000000000000-mapping.dmp

memory/276-90-0x0000000000000000-mapping.dmp

C:\Users\Admin\elv3.ooocccxxx

MD5 76f1f6e48efcdebe14e0c45b30f3b935
SHA1 7561eb1b663f296e5594541ae0087f601efaa818
SHA256 a2e4d5ab1b9b364d1db0df6a9ef5cb6f196dfce32a57781ab838d4537472d7ef
SHA512 50cf84efb6fe961c914a15b0ec4efd0023f6a2ec4d8f24c22baad23f8dadb711e64a1951b825e90559746189dd2cd10e74bef842b0ee21b90d83b56bea2c8550

memory/1020-94-0x0000000000000000-mapping.dmp

\Users\Admin\elv3.ooocccxxx

MD5 76f1f6e48efcdebe14e0c45b30f3b935
SHA1 7561eb1b663f296e5594541ae0087f601efaa818
SHA256 a2e4d5ab1b9b364d1db0df6a9ef5cb6f196dfce32a57781ab838d4537472d7ef
SHA512 50cf84efb6fe961c914a15b0ec4efd0023f6a2ec4d8f24c22baad23f8dadb711e64a1951b825e90559746189dd2cd10e74bef842b0ee21b90d83b56bea2c8550

\Users\Admin\elv3.ooocccxxx

MD5 76f1f6e48efcdebe14e0c45b30f3b935
SHA1 7561eb1b663f296e5594541ae0087f601efaa818
SHA256 a2e4d5ab1b9b364d1db0df6a9ef5cb6f196dfce32a57781ab838d4537472d7ef
SHA512 50cf84efb6fe961c914a15b0ec4efd0023f6a2ec4d8f24c22baad23f8dadb711e64a1951b825e90559746189dd2cd10e74bef842b0ee21b90d83b56bea2c8550

memory/916-100-0x0000000000000000-mapping.dmp

memory/1784-105-0x0000000000000000-mapping.dmp

C:\Users\Admin\elv4.ooocccxxx

MD5 43c4817d1436823f1a7b435fad563c4f
SHA1 1bfe464fde5eadfad039df10a544859c3a6f75db
SHA256 06b876b602c6d745395193bc106ac0172915b2e27ca461e28b33504ae09586a7
SHA512 d396a8c043b62ca3c688024401a5d85605ba034ab7d2a8704b1bde0177f0526e1b3a7bc5d48c5df264cf7d9c827e057232ee5f54feba485da3d2b4db9595fbd4

\Users\Admin\elv4.ooocccxxx

MD5 43c4817d1436823f1a7b435fad563c4f
SHA1 1bfe464fde5eadfad039df10a544859c3a6f75db
SHA256 06b876b602c6d745395193bc106ac0172915b2e27ca461e28b33504ae09586a7
SHA512 d396a8c043b62ca3c688024401a5d85605ba034ab7d2a8704b1bde0177f0526e1b3a7bc5d48c5df264cf7d9c827e057232ee5f54feba485da3d2b4db9595fbd4

memory/1884-109-0x0000000000000000-mapping.dmp

\Users\Admin\elv4.ooocccxxx

MD5 43c4817d1436823f1a7b435fad563c4f
SHA1 1bfe464fde5eadfad039df10a544859c3a6f75db
SHA256 06b876b602c6d745395193bc106ac0172915b2e27ca461e28b33504ae09586a7
SHA512 d396a8c043b62ca3c688024401a5d85605ba034ab7d2a8704b1bde0177f0526e1b3a7bc5d48c5df264cf7d9c827e057232ee5f54feba485da3d2b4db9595fbd4

memory/1828-115-0x0000000000000000-mapping.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-11-09 19:19

Reported

2022-11-09 19:22

Platform

win10v2004-20220812-en

Max time kernel

151s

Max time network

156s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2924040062.xls"

Signatures

Emotet

trojan banker emotet

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

Downloads MZ/PE file

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmWihvnqNYhdJE.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\HQwTrwSSnYYp\\jmWihvnqNYhdJE.dll\"" C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RHdPeB.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\VWbrvjs\\RHdPeB.dll\"" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OZAmgxS.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\XeMUhqWmNfyvrlI\\OZAmgxS.dll\"" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run C:\Windows\system32\regsvr32.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2416 wrote to memory of 2576 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 2416 wrote to memory of 2576 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 2576 wrote to memory of 4928 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 2576 wrote to memory of 4928 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 2416 wrote to memory of 208 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 2416 wrote to memory of 208 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 208 wrote to memory of 2224 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 208 wrote to memory of 2224 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 2416 wrote to memory of 4784 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 2416 wrote to memory of 4784 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 4784 wrote to memory of 4592 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 4784 wrote to memory of 4592 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 2416 wrote to memory of 3172 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 2416 wrote to memory of 3172 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 3172 wrote to memory of 1036 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 3172 wrote to memory of 1036 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2924040062.xls"

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XeMUhqWmNfyvrlI\OZAmgxS.dll"

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\VWbrvjs\RHdPeB.dll"

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\LkokAMlxLU\TmIkctEOFx.dll"

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\HQwTrwSSnYYp\jmWihvnqNYhdJE.dll"

Network

Country Destination Domain Proto
NL 178.79.208.1:80 tcp
US 8.8.8.8:53 bundlefilm.com udp
US 74.207.252.187:80 bundlefilm.com tcp
NL 52.178.17.3:443 tcp
US 8.8.8.8:53 camsanparke.net udp
TR 213.142.148.59:80 camsanparke.net tcp
US 8.8.8.8:53 royreid.co.uk udp
GB 77.68.64.0:80 royreid.co.uk tcp
US 8.8.8.8:53 cs.com.sg udp
SG 103.237.169.99:443 cs.com.sg tcp
NL 178.79.208.1:80 tcp
NL 178.79.208.1:80 tcp
KR 218.38.121.17:443 tcp
KR 218.38.121.17:443 218.38.121.17 tcp
KR 218.38.121.17:443 218.38.121.17 tcp
BR 186.250.48.5:443 186.250.48.5 tcp
IT 80.211.107.116:8080 80.211.107.116 tcp
KR 218.38.121.17:443 218.38.121.17 tcp
BR 186.250.48.5:443 186.250.48.5 tcp
US 174.138.33.49:7080 174.138.33.49 tcp
SG 165.22.254.236:8080 tcp
DE 185.148.169.10:8080 tcp
DE 62.171.178.147:8080 tcp
SG 128.199.217.206:443 tcp
ID 210.57.209.142:8080 tcp

Files

memory/2416-132-0x00007FFE2C5B0000-0x00007FFE2C5C0000-memory.dmp

memory/2416-133-0x00007FFE2C5B0000-0x00007FFE2C5C0000-memory.dmp

memory/2416-134-0x00007FFE2C5B0000-0x00007FFE2C5C0000-memory.dmp

memory/2416-135-0x00007FFE2C5B0000-0x00007FFE2C5C0000-memory.dmp

memory/2416-136-0x00007FFE2C5B0000-0x00007FFE2C5C0000-memory.dmp

memory/2416-137-0x00007FFE2A550000-0x00007FFE2A560000-memory.dmp

memory/2416-138-0x00007FFE2A550000-0x00007FFE2A560000-memory.dmp

memory/2576-139-0x0000000000000000-mapping.dmp

C:\Users\Admin\elv1.ooocccxxx

MD5 70329acd368c40e1aa6c5e652b4446bf
SHA1 ff932b9066c589e863481e4fe768f1cd45179c33
SHA256 393db4a830f16a7c347d952139ffc92e558fda88ae7b134d885b22fde3d32b37
SHA512 8d8c20e3062b212d6fff96ead9f43b0c004fb20451f4924cd8ae118c90ffd10d78885cf97d5f1e64049f78c6598470f2c16fe33f617ab046ff9aaecee21bea9e

C:\Users\Admin\elv1.ooocccxxx

MD5 70329acd368c40e1aa6c5e652b4446bf
SHA1 ff932b9066c589e863481e4fe768f1cd45179c33
SHA256 393db4a830f16a7c347d952139ffc92e558fda88ae7b134d885b22fde3d32b37
SHA512 8d8c20e3062b212d6fff96ead9f43b0c004fb20451f4924cd8ae118c90ffd10d78885cf97d5f1e64049f78c6598470f2c16fe33f617ab046ff9aaecee21bea9e

memory/2576-142-0x0000000180000000-0x0000000180030000-memory.dmp

memory/4928-145-0x0000000000000000-mapping.dmp

C:\Windows\System32\XeMUhqWmNfyvrlI\OZAmgxS.dll

MD5 70329acd368c40e1aa6c5e652b4446bf
SHA1 ff932b9066c589e863481e4fe768f1cd45179c33
SHA256 393db4a830f16a7c347d952139ffc92e558fda88ae7b134d885b22fde3d32b37
SHA512 8d8c20e3062b212d6fff96ead9f43b0c004fb20451f4924cd8ae118c90ffd10d78885cf97d5f1e64049f78c6598470f2c16fe33f617ab046ff9aaecee21bea9e

memory/208-150-0x0000000000000000-mapping.dmp

C:\Users\Admin\elv2.ooocccxxx

MD5 136182ddbf3b6c0fd38a2af3f43a77dc
SHA1 897ad8bded361c87932429255ce4089a6dbbb6ff
SHA256 ca12c7cade8dca428263d53316ce7f16b6f94f9aa66fa9d768968b64888c05fb
SHA512 b4ad1c5a1d24b9989eba702040a75f5425422750e9d0ab67ae632892af016d05a58670739f8a321e922d1b60ff9a86c2c816deded85fa7c261008181472b42ba

C:\Users\Admin\elv2.ooocccxxx

MD5 136182ddbf3b6c0fd38a2af3f43a77dc
SHA1 897ad8bded361c87932429255ce4089a6dbbb6ff
SHA256 ca12c7cade8dca428263d53316ce7f16b6f94f9aa66fa9d768968b64888c05fb
SHA512 b4ad1c5a1d24b9989eba702040a75f5425422750e9d0ab67ae632892af016d05a58670739f8a321e922d1b60ff9a86c2c816deded85fa7c261008181472b42ba

memory/2224-156-0x0000000000000000-mapping.dmp

C:\Windows\System32\VWbrvjs\RHdPeB.dll

MD5 136182ddbf3b6c0fd38a2af3f43a77dc
SHA1 897ad8bded361c87932429255ce4089a6dbbb6ff
SHA256 ca12c7cade8dca428263d53316ce7f16b6f94f9aa66fa9d768968b64888c05fb
SHA512 b4ad1c5a1d24b9989eba702040a75f5425422750e9d0ab67ae632892af016d05a58670739f8a321e922d1b60ff9a86c2c816deded85fa7c261008181472b42ba

memory/4784-161-0x0000000000000000-mapping.dmp

C:\Users\Admin\elv3.ooocccxxx

MD5 76f1f6e48efcdebe14e0c45b30f3b935
SHA1 7561eb1b663f296e5594541ae0087f601efaa818
SHA256 a2e4d5ab1b9b364d1db0df6a9ef5cb6f196dfce32a57781ab838d4537472d7ef
SHA512 50cf84efb6fe961c914a15b0ec4efd0023f6a2ec4d8f24c22baad23f8dadb711e64a1951b825e90559746189dd2cd10e74bef842b0ee21b90d83b56bea2c8550

C:\Users\Admin\elv3.ooocccxxx

MD5 76f1f6e48efcdebe14e0c45b30f3b935
SHA1 7561eb1b663f296e5594541ae0087f601efaa818
SHA256 a2e4d5ab1b9b364d1db0df6a9ef5cb6f196dfce32a57781ab838d4537472d7ef
SHA512 50cf84efb6fe961c914a15b0ec4efd0023f6a2ec4d8f24c22baad23f8dadb711e64a1951b825e90559746189dd2cd10e74bef842b0ee21b90d83b56bea2c8550

memory/4592-167-0x0000000000000000-mapping.dmp

C:\Windows\System32\LkokAMlxLU\TmIkctEOFx.dll

MD5 76f1f6e48efcdebe14e0c45b30f3b935
SHA1 7561eb1b663f296e5594541ae0087f601efaa818
SHA256 a2e4d5ab1b9b364d1db0df6a9ef5cb6f196dfce32a57781ab838d4537472d7ef
SHA512 50cf84efb6fe961c914a15b0ec4efd0023f6a2ec4d8f24c22baad23f8dadb711e64a1951b825e90559746189dd2cd10e74bef842b0ee21b90d83b56bea2c8550

memory/3172-172-0x0000000000000000-mapping.dmp

C:\Users\Admin\elv4.ooocccxxx

MD5 43c4817d1436823f1a7b435fad563c4f
SHA1 1bfe464fde5eadfad039df10a544859c3a6f75db
SHA256 06b876b602c6d745395193bc106ac0172915b2e27ca461e28b33504ae09586a7
SHA512 d396a8c043b62ca3c688024401a5d85605ba034ab7d2a8704b1bde0177f0526e1b3a7bc5d48c5df264cf7d9c827e057232ee5f54feba485da3d2b4db9595fbd4

C:\Users\Admin\elv4.ooocccxxx

MD5 43c4817d1436823f1a7b435fad563c4f
SHA1 1bfe464fde5eadfad039df10a544859c3a6f75db
SHA256 06b876b602c6d745395193bc106ac0172915b2e27ca461e28b33504ae09586a7
SHA512 d396a8c043b62ca3c688024401a5d85605ba034ab7d2a8704b1bde0177f0526e1b3a7bc5d48c5df264cf7d9c827e057232ee5f54feba485da3d2b4db9595fbd4

memory/1036-178-0x0000000000000000-mapping.dmp

C:\Windows\System32\HQwTrwSSnYYp\jmWihvnqNYhdJE.dll

MD5 43c4817d1436823f1a7b435fad563c4f
SHA1 1bfe464fde5eadfad039df10a544859c3a6f75db
SHA256 06b876b602c6d745395193bc106ac0172915b2e27ca461e28b33504ae09586a7
SHA512 d396a8c043b62ca3c688024401a5d85605ba034ab7d2a8704b1bde0177f0526e1b3a7bc5d48c5df264cf7d9c827e057232ee5f54feba485da3d2b4db9595fbd4