Analysis Overview
SHA256
f9aebb47cd76923fcb9a655ce504e8765593acbdbb5ba9ab85258db896c053fa
Threat Level: Known bad
The file f9aebb47cd76923fcb9a655ce504e8765593acbdbb5ba9ab85258db896c053fa.xls was found to be: Known bad.
Malicious Activity Summary
Emotet
Process spawned unexpected child process
Suspicious Office macro
Downloads MZ/PE file
Loads dropped DLL
Adds Run key to start application
Suspicious behavior: EnumeratesProcesses
Checks processor information in registry
Enumerates system info in registry
Suspicious use of FindShellTrayWindow
Suspicious behavior: AddClipboardFormatListener
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-11-10 10:55
Signatures
Suspicious Office macro
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2022-11-10 10:55
Reported
2022-11-10 10:58
Platform
win10-20220901-en
Max time kernel
148s
Max time network
148s
Command Line
Signatures
Process spawned unexpected child process
| Description | Indicator | Process | Target |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\BIOS | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f9aebb47cd76923fcb9a655ce504e8765593acbdbb5ba9ab85258db896c053fa.xls"
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | www.conceptagency.net | udp |
| N/A | 100.118.176.127:443 | www.conceptagency.net | tcp |
| US | 8.8.8.8:53 | bencevendeghaz.hu | udp |
| N/A | 100.109.1.197:443 | bencevendeghaz.hu | tcp |
| SG | 45.32.114.141:80 | 45.32.114.141 | tcp |
| US | 8.8.8.8:53 | ruitaiwz.com | udp |
| N/A | 100.125.7.190:80 | ruitaiwz.com | tcp |
| IE | 20.50.80.210:443 | tcp | |
| NL | 8.248.7.254:80 | tcp |
Files
memory/4824-120-0x00007FF9500F0000-0x00007FF950100000-memory.dmp
memory/4824-121-0x00007FF9500F0000-0x00007FF950100000-memory.dmp
memory/4824-122-0x00007FF9500F0000-0x00007FF950100000-memory.dmp
memory/4824-123-0x00007FF9500F0000-0x00007FF950100000-memory.dmp
memory/4824-132-0x00007FF94CC80000-0x00007FF94CC90000-memory.dmp
memory/4824-133-0x00007FF94CC80000-0x00007FF94CC90000-memory.dmp
memory/4992-256-0x0000000000000000-mapping.dmp
memory/5108-259-0x0000000000000000-mapping.dmp
memory/4348-260-0x0000000000000000-mapping.dmp
memory/4652-261-0x0000000000000000-mapping.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-11-10 10:55
Reported
2022-11-10 10:58
Platform
win10-20220812-en
Max time kernel
101s
Max time network
136s
Command Line
Signatures
Emotet
Process spawned unexpected child process
| Description | Indicator | Process | Target |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\System32\regsvr32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
Downloads MZ/PE file
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\System32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\System32\regsvr32.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TSxZoRcmvnWx.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\AvaZYZZOBlkhQzwVX\\TSxZoRcmvnWx.dll\"" | C:\Windows\system32\regsvr32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run | C:\Windows\system32\regsvr32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\liFHGzSNPcEDZD.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\VoDceoyIUAplQDAAT\\liFHGzSNPcEDZD.dll\"" | C:\Windows\system32\regsvr32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run | C:\Windows\system32\regsvr32.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WcDLawmYz.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\EXPvAHgyO\\WcDLawmYz.dll\"" | C:\Windows\system32\regsvr32.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run | C:\Windows\system32\regsvr32.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\BIOS | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\System32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\system32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\system32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\system32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\system32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\System32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\System32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\system32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\system32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\system32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\system32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\System32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\System32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\system32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\system32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\system32\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\system32\regsvr32.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f9aebb47cd76923fcb9a655ce504e8765593acbdbb5ba9ab85258db896c053fa.xls"
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx
C:\Windows\system32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\VoDceoyIUAplQDAAT\liFHGzSNPcEDZD.dll"
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx
C:\Windows\system32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\EXPvAHgyO\WcDLawmYz.dll"
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx
C:\Windows\system32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AvaZYZZOBlkhQzwVX\TSxZoRcmvnWx.dll"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | www.conceptagency.net | udp |
| DE | 149.102.137.213:443 | www.conceptagency.net | tcp |
| US | 8.8.8.8:53 | bencevendeghaz.hu | udp |
| HU | 185.6.139.30:443 | bencevendeghaz.hu | tcp |
| SG | 45.32.114.141:80 | tcp | |
| US | 8.8.8.8:53 | ruitaiwz.com | udp |
| HK | 45.207.116.84:80 | ruitaiwz.com | tcp |
| ID | 115.178.55.22:80 | 115.178.55.22 | tcp |
| ID | 115.178.55.22:80 | 115.178.55.22 | tcp |
| US | 93.184.221.240:80 | tcp | |
| ID | 115.178.55.22:80 | 115.178.55.22 | tcp |
Files
memory/4672-115-0x00007FF838960000-0x00007FF838970000-memory.dmp
memory/4672-116-0x00007FF838960000-0x00007FF838970000-memory.dmp
memory/4672-117-0x00007FF838960000-0x00007FF838970000-memory.dmp
memory/4672-118-0x00007FF838960000-0x00007FF838970000-memory.dmp
memory/4672-127-0x00007FF834EA0000-0x00007FF834EB0000-memory.dmp
memory/4672-128-0x00007FF834EA0000-0x00007FF834EB0000-memory.dmp
memory/2244-143-0x0000000000000000-mapping.dmp
C:\Users\Admin\elv1.ooocccxxx
| MD5 | 5a5557c55d6602b4e7a69c9fe800a073 |
| SHA1 | e8df1ae8707ccbf300da0ce6395c8c580825dd55 |
| SHA256 | a96a0875d7f6b7f7c5ae544ce1a14c101b6d9a4daffb21e16154244192486139 |
| SHA512 | 55c5b8b05d9a5f77f45a113e8042156605caee99cd2eb6beb3101bbf2db9ea1acf7e0f2f2335e4507a8b001809da1933548f60ec8744682e5003283c96f8e075 |
\Users\Admin\elv1.ooocccxxx
| MD5 | 5a5557c55d6602b4e7a69c9fe800a073 |
| SHA1 | e8df1ae8707ccbf300da0ce6395c8c580825dd55 |
| SHA256 | a96a0875d7f6b7f7c5ae544ce1a14c101b6d9a4daffb21e16154244192486139 |
| SHA512 | 55c5b8b05d9a5f77f45a113e8042156605caee99cd2eb6beb3101bbf2db9ea1acf7e0f2f2335e4507a8b001809da1933548f60ec8744682e5003283c96f8e075 |
memory/2244-146-0x0000000000F30000-0x0000000000F5E000-memory.dmp
memory/4896-154-0x0000000000000000-mapping.dmp
memory/4248-162-0x0000000000000000-mapping.dmp
C:\Users\Admin\elv2.ooocccxxx
| MD5 | e13fecff6dc982531324cdba4f224d1d |
| SHA1 | 0de9ca7b8770ce588684237d2739d456bc64dade |
| SHA256 | 78b7f834255ee4c7e897393c70172de692415c784bcaeedf1cd304fe1ce401e0 |
| SHA512 | 0e159d00676d286d104631f80a1989e308037fde82ddae495628866a1ad49059705fb9c47d7f612a108bbbb0d3f540695782dec3c4b389a56c4ac91a28a8653b |
\Users\Admin\elv2.ooocccxxx
| MD5 | e13fecff6dc982531324cdba4f224d1d |
| SHA1 | 0de9ca7b8770ce588684237d2739d456bc64dade |
| SHA256 | 78b7f834255ee4c7e897393c70172de692415c784bcaeedf1cd304fe1ce401e0 |
| SHA512 | 0e159d00676d286d104631f80a1989e308037fde82ddae495628866a1ad49059705fb9c47d7f612a108bbbb0d3f540695782dec3c4b389a56c4ac91a28a8653b |
memory/4800-170-0x0000000000000000-mapping.dmp
memory/3288-310-0x0000000000000000-mapping.dmp
memory/308-311-0x0000000000000000-mapping.dmp
C:\Users\Admin\elv4.ooocccxxx
| MD5 | 1e8791ce5e6d13941359c46b6a928621 |
| SHA1 | da4afc3f8bba09f73ce45b4764c033813c239624 |
| SHA256 | d0ad1a17f8bf2be026d74e0eb0eb16f99367370300c4e031ebe58286c0e543b0 |
| SHA512 | f43171df91dd29742e5c2fad21a89b68eebb0a183a27737b43e5404c27da2edad017df71ec05441ef484b8d07c1f8003a7ea4cfe017e059d23eae373540f727d |
\Users\Admin\elv4.ooocccxxx
| MD5 | 1e8791ce5e6d13941359c46b6a928621 |
| SHA1 | da4afc3f8bba09f73ce45b4764c033813c239624 |
| SHA256 | d0ad1a17f8bf2be026d74e0eb0eb16f99367370300c4e031ebe58286c0e543b0 |
| SHA512 | f43171df91dd29742e5c2fad21a89b68eebb0a183a27737b43e5404c27da2edad017df71ec05441ef484b8d07c1f8003a7ea4cfe017e059d23eae373540f727d |
memory/4884-319-0x0000000000000000-mapping.dmp
memory/4672-346-0x00007FF838960000-0x00007FF838970000-memory.dmp
memory/4672-347-0x00007FF838960000-0x00007FF838970000-memory.dmp
memory/4672-348-0x00007FF838960000-0x00007FF838970000-memory.dmp
memory/4672-349-0x00007FF838960000-0x00007FF838970000-memory.dmp