Analysis
-
max time kernel
151s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2022, 21:11
Behavioral task
behavioral1
Sample
400211719.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
400211719.xls
Resource
win10v2004-20220901-en
General
-
Target
400211719.xls
-
Size
91KB
-
MD5
7cf89e1a0fa8ee4df56b133fba6dda15
-
SHA1
660ceb0d9f2504299c674e86cddf056b65c39873
-
SHA256
0dba1d56baf3bf5c27c138da4a1030b1ec18cfc6f0b01f52a8773bf8c0365da3
-
SHA512
3b3972cfa1591a976f7b6003d46b97120847934680426b90a88e393b8bdf0506277f462b1cc04b5aca7ff8e133606b1b87eaef846dd16379efbd0016be898937
-
SSDEEP
1536:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEbCXuZH4gb4CEn9J4ZwEM:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgJ
Malware Config
Extracted
http://www.muyehuayi.com/cmp/8asA99KPsyA/v6lUsWbLen/
http://concivilpa.com.py/wp-admin/i3CQu9dzDrMW/
https://wijsneusmedia.nl/cgi-bin/kFB/
http://www.angloextrema.com.br/assets/oEt1yYckHKlnNIq/
Extracted
emotet
Epoch5
178.238.225.252:8080
139.196.72.155:8080
36.67.23.59:443
103.56.149.105:8080
37.44.244.177:8080
85.25.120.45:8080
202.134.4.210:7080
78.47.204.80:443
83.229.80.93:8080
93.104.209.107:8080
80.211.107.116:8080
165.22.254.236:8080
104.244.79.94:443
185.148.169.10:8080
190.145.8.4:443
175.126.176.79:8080
139.59.80.108:8080
188.165.79.151:443
128.199.217.206:443
64.227.55.231:8080
218.38.121.17:443
103.71.99.57:8080
103.224.241.74:8080
128.199.242.164:8080
85.214.67.203:8080
103.254.12.236:7080
46.101.98.60:8080
178.62.112.199:8080
210.57.209.142:8080
195.77.239.39:8080
103.126.216.86:443
82.98.180.154:7080
202.28.34.99:8080
174.138.33.49:7080
160.16.143.191:8080
51.75.33.122:443
103.41.204.169:8080
186.250.48.5:443
87.106.97.83:7080
118.98.72.86:443
196.44.98.190:8080
103.85.95.4:8080
62.171.178.147:8080
54.37.228.122:443
114.79.130.68:443
198.199.70.22:8080
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4868 2340 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4788 2340 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4968 2340 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2208 2340 regsvr32.exe 81 -
Downloads MZ/PE file
-
Loads dropped DLL 6 IoCs
pid Process 4868 regsvr32.exe 4736 regsvr32.exe 4968 regsvr32.exe 1688 regsvr32.exe 2208 regsvr32.exe 2548 regsvr32.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hthUe.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\EbHgirnFSI\\hthUe.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tvtOhPlFy.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\YgFVnTWg\\tvtOhPlFy.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rlvZs.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\JVgwyhS\\rlvZs.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2340 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4868 regsvr32.exe 4868 regsvr32.exe 4736 regsvr32.exe 4736 regsvr32.exe 4736 regsvr32.exe 4736 regsvr32.exe 4968 regsvr32.exe 4968 regsvr32.exe 1688 regsvr32.exe 1688 regsvr32.exe 1688 regsvr32.exe 1688 regsvr32.exe 2208 regsvr32.exe 2208 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2340 EXCEL.EXE 2340 EXCEL.EXE 2340 EXCEL.EXE 2340 EXCEL.EXE 2340 EXCEL.EXE 2340 EXCEL.EXE 2340 EXCEL.EXE 2340 EXCEL.EXE 2340 EXCEL.EXE 2340 EXCEL.EXE 2340 EXCEL.EXE 2340 EXCEL.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2340 wrote to memory of 4868 2340 EXCEL.EXE 86 PID 2340 wrote to memory of 4868 2340 EXCEL.EXE 86 PID 4868 wrote to memory of 4736 4868 regsvr32.exe 88 PID 4868 wrote to memory of 4736 4868 regsvr32.exe 88 PID 2340 wrote to memory of 4788 2340 EXCEL.EXE 89 PID 2340 wrote to memory of 4788 2340 EXCEL.EXE 89 PID 2340 wrote to memory of 4968 2340 EXCEL.EXE 90 PID 2340 wrote to memory of 4968 2340 EXCEL.EXE 90 PID 4968 wrote to memory of 1688 4968 regsvr32.exe 93 PID 4968 wrote to memory of 1688 4968 regsvr32.exe 93 PID 2340 wrote to memory of 2208 2340 EXCEL.EXE 94 PID 2340 wrote to memory of 2208 2340 EXCEL.EXE 94 PID 2208 wrote to memory of 2548 2208 regsvr32.exe 95 PID 2208 wrote to memory of 2548 2208 regsvr32.exe 95
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\400211719.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\EbHgirnFSI\hthUe.dll"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx2⤵
- Process spawned unexpected child process
PID:4788
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\YgFVnTWg\tvtOhPlFy.dll"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\JVgwyhS\rlvZs.dll"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
434KB
MD5cd830957a1be40643bf0a74715fe286e
SHA1d5db6bbd3de53d8d6c63ec5af418d803df748565
SHA2566f852b41eaf8690dbe651c12b8b801e5a511bb880641cc8d392dd09139b92fe0
SHA512a6595e7558096046a85b4bd90e0b73a100f9149d9d6c0ba82b0b650b4fd7e110fe257716ccbff7bd3ffab2c9ddd9bfa7aa42776213d147c53609aece084bfe7f
-
Filesize
434KB
MD5cd830957a1be40643bf0a74715fe286e
SHA1d5db6bbd3de53d8d6c63ec5af418d803df748565
SHA2566f852b41eaf8690dbe651c12b8b801e5a511bb880641cc8d392dd09139b92fe0
SHA512a6595e7558096046a85b4bd90e0b73a100f9149d9d6c0ba82b0b650b4fd7e110fe257716ccbff7bd3ffab2c9ddd9bfa7aa42776213d147c53609aece084bfe7f
-
Filesize
434KB
MD5255d978499819af802b0cec0a63fea3c
SHA1e46af8162c290402bc0b4ff8675999cd3353ee83
SHA25626448b5541bb1f7a8a76965381b200bf3f450d36f2b60772de6670ca40f1d3c3
SHA512ec244dfc9a2e20a394ced6769d8bb5ff2136ed627aca31b8f61669e6bcfa5d5cf2b270d2d7eeeb43c2473bb8d2e6ec70dec95fcb20f9d62ff4738e1e0c32fe9c
-
Filesize
434KB
MD5255d978499819af802b0cec0a63fea3c
SHA1e46af8162c290402bc0b4ff8675999cd3353ee83
SHA25626448b5541bb1f7a8a76965381b200bf3f450d36f2b60772de6670ca40f1d3c3
SHA512ec244dfc9a2e20a394ced6769d8bb5ff2136ed627aca31b8f61669e6bcfa5d5cf2b270d2d7eeeb43c2473bb8d2e6ec70dec95fcb20f9d62ff4738e1e0c32fe9c
-
Filesize
434KB
MD59b2844ad5dfc67297b2e9cfd0b34e935
SHA13ef77adb472b76f782cbee39994f868e5a830ba7
SHA25611d143d975389205544c2cdc6943d47901e322c6b2cd7e376c68599e23f6313e
SHA512748a32272f73f51cf9d92f5625bfcc61ad173041d935840937793951a5efdd43a2c2fd7b67b0c70af9cd67d00e1920e808d4b5fd14c9859787e9022898c42f54
-
Filesize
434KB
MD59b2844ad5dfc67297b2e9cfd0b34e935
SHA13ef77adb472b76f782cbee39994f868e5a830ba7
SHA25611d143d975389205544c2cdc6943d47901e322c6b2cd7e376c68599e23f6313e
SHA512748a32272f73f51cf9d92f5625bfcc61ad173041d935840937793951a5efdd43a2c2fd7b67b0c70af9cd67d00e1920e808d4b5fd14c9859787e9022898c42f54
-
Filesize
434KB
MD5cd830957a1be40643bf0a74715fe286e
SHA1d5db6bbd3de53d8d6c63ec5af418d803df748565
SHA2566f852b41eaf8690dbe651c12b8b801e5a511bb880641cc8d392dd09139b92fe0
SHA512a6595e7558096046a85b4bd90e0b73a100f9149d9d6c0ba82b0b650b4fd7e110fe257716ccbff7bd3ffab2c9ddd9bfa7aa42776213d147c53609aece084bfe7f
-
Filesize
434KB
MD59b2844ad5dfc67297b2e9cfd0b34e935
SHA13ef77adb472b76f782cbee39994f868e5a830ba7
SHA25611d143d975389205544c2cdc6943d47901e322c6b2cd7e376c68599e23f6313e
SHA512748a32272f73f51cf9d92f5625bfcc61ad173041d935840937793951a5efdd43a2c2fd7b67b0c70af9cd67d00e1920e808d4b5fd14c9859787e9022898c42f54
-
Filesize
434KB
MD5255d978499819af802b0cec0a63fea3c
SHA1e46af8162c290402bc0b4ff8675999cd3353ee83
SHA25626448b5541bb1f7a8a76965381b200bf3f450d36f2b60772de6670ca40f1d3c3
SHA512ec244dfc9a2e20a394ced6769d8bb5ff2136ed627aca31b8f61669e6bcfa5d5cf2b270d2d7eeeb43c2473bb8d2e6ec70dec95fcb20f9d62ff4738e1e0c32fe9c