Malware Analysis Report

2025-08-05 21:38

Sample ID 221110-m1g42ahca9
Target f9aebb47cd76923fcb9a655ce504e8765593acbdbb5ba9ab85258db896c053fa.xls
SHA256 f9aebb47cd76923fcb9a655ce504e8765593acbdbb5ba9ab85258db896c053fa
Tags
macro xlm emotet epoch5 banker persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f9aebb47cd76923fcb9a655ce504e8765593acbdbb5ba9ab85258db896c053fa

Threat Level: Known bad

The file f9aebb47cd76923fcb9a655ce504e8765593acbdbb5ba9ab85258db896c053fa.xls was found to be: Known bad.

Malicious Activity Summary

macro xlm emotet epoch5 banker persistence trojan

Emotet

Process spawned unexpected child process

Suspicious Office macro

Downloads MZ/PE file

Loads dropped DLL

Adds Run key to start application

Suspicious behavior: EnumeratesProcesses

Checks processor information in registry

Enumerates system info in registry

Suspicious use of FindShellTrayWindow

Suspicious behavior: AddClipboardFormatListener

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-11-10 10:55

Signatures

Suspicious Office macro

macro xlm
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-11-10 10:55

Reported

2022-11-10 10:58

Platform

win10-20220901-en

Max time kernel

148s

Max time network

148s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f9aebb47cd76923fcb9a655ce504e8765593acbdbb5ba9ab85258db896c053fa.xls"

Signatures

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f9aebb47cd76923fcb9a655ce504e8765593acbdbb5ba9ab85258db896c053fa.xls"

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.conceptagency.net udp
N/A 100.118.176.127:443 www.conceptagency.net tcp
US 8.8.8.8:53 bencevendeghaz.hu udp
N/A 100.109.1.197:443 bencevendeghaz.hu tcp
SG 45.32.114.141:80 45.32.114.141 tcp
US 8.8.8.8:53 ruitaiwz.com udp
N/A 100.125.7.190:80 ruitaiwz.com tcp
IE 20.50.80.210:443 tcp
NL 8.248.7.254:80 tcp

Files

memory/4824-120-0x00007FF9500F0000-0x00007FF950100000-memory.dmp

memory/4824-121-0x00007FF9500F0000-0x00007FF950100000-memory.dmp

memory/4824-122-0x00007FF9500F0000-0x00007FF950100000-memory.dmp

memory/4824-123-0x00007FF9500F0000-0x00007FF950100000-memory.dmp

memory/4824-132-0x00007FF94CC80000-0x00007FF94CC90000-memory.dmp

memory/4824-133-0x00007FF94CC80000-0x00007FF94CC90000-memory.dmp

memory/4992-256-0x0000000000000000-mapping.dmp

memory/5108-259-0x0000000000000000-mapping.dmp

memory/4348-260-0x0000000000000000-mapping.dmp

memory/4652-261-0x0000000000000000-mapping.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-11-10 10:55

Reported

2022-11-10 10:58

Platform

win10-20220812-en

Max time kernel

101s

Max time network

136s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f9aebb47cd76923fcb9a655ce504e8765593acbdbb5ba9ab85258db896c053fa.xls"

Signatures

Emotet

trojan banker emotet

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

Downloads MZ/PE file

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\System32\regsvr32.exe N/A
N/A N/A C:\Windows\System32\regsvr32.exe N/A
N/A N/A C:\Windows\System32\regsvr32.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TSxZoRcmvnWx.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\AvaZYZZOBlkhQzwVX\\TSxZoRcmvnWx.dll\"" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\liFHGzSNPcEDZD.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\VoDceoyIUAplQDAAT\\liFHGzSNPcEDZD.dll\"" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WcDLawmYz.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\EXPvAHgyO\\WcDLawmYz.dll\"" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run C:\Windows\system32\regsvr32.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4672 wrote to memory of 2244 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 4672 wrote to memory of 2244 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 2244 wrote to memory of 4896 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 2244 wrote to memory of 4896 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 4672 wrote to memory of 4248 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 4672 wrote to memory of 4248 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 4248 wrote to memory of 4800 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 4248 wrote to memory of 4800 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 4672 wrote to memory of 3288 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 4672 wrote to memory of 3288 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 4672 wrote to memory of 308 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 4672 wrote to memory of 308 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 308 wrote to memory of 4884 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 308 wrote to memory of 4884 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f9aebb47cd76923fcb9a655ce504e8765593acbdbb5ba9ab85258db896c053fa.xls"

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\VoDceoyIUAplQDAAT\liFHGzSNPcEDZD.dll"

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\EXPvAHgyO\WcDLawmYz.dll"

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AvaZYZZOBlkhQzwVX\TSxZoRcmvnWx.dll"

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.conceptagency.net udp
DE 149.102.137.213:443 www.conceptagency.net tcp
US 8.8.8.8:53 bencevendeghaz.hu udp
HU 185.6.139.30:443 bencevendeghaz.hu tcp
SG 45.32.114.141:80 tcp
US 8.8.8.8:53 ruitaiwz.com udp
HK 45.207.116.84:80 ruitaiwz.com tcp
ID 115.178.55.22:80 115.178.55.22 tcp
ID 115.178.55.22:80 115.178.55.22 tcp
US 93.184.221.240:80 tcp
ID 115.178.55.22:80 115.178.55.22 tcp

Files

memory/4672-115-0x00007FF838960000-0x00007FF838970000-memory.dmp

memory/4672-116-0x00007FF838960000-0x00007FF838970000-memory.dmp

memory/4672-117-0x00007FF838960000-0x00007FF838970000-memory.dmp

memory/4672-118-0x00007FF838960000-0x00007FF838970000-memory.dmp

memory/4672-127-0x00007FF834EA0000-0x00007FF834EB0000-memory.dmp

memory/4672-128-0x00007FF834EA0000-0x00007FF834EB0000-memory.dmp

memory/2244-143-0x0000000000000000-mapping.dmp

C:\Users\Admin\elv1.ooocccxxx

MD5 5a5557c55d6602b4e7a69c9fe800a073
SHA1 e8df1ae8707ccbf300da0ce6395c8c580825dd55
SHA256 a96a0875d7f6b7f7c5ae544ce1a14c101b6d9a4daffb21e16154244192486139
SHA512 55c5b8b05d9a5f77f45a113e8042156605caee99cd2eb6beb3101bbf2db9ea1acf7e0f2f2335e4507a8b001809da1933548f60ec8744682e5003283c96f8e075

\Users\Admin\elv1.ooocccxxx

MD5 5a5557c55d6602b4e7a69c9fe800a073
SHA1 e8df1ae8707ccbf300da0ce6395c8c580825dd55
SHA256 a96a0875d7f6b7f7c5ae544ce1a14c101b6d9a4daffb21e16154244192486139
SHA512 55c5b8b05d9a5f77f45a113e8042156605caee99cd2eb6beb3101bbf2db9ea1acf7e0f2f2335e4507a8b001809da1933548f60ec8744682e5003283c96f8e075

memory/2244-146-0x0000000000F30000-0x0000000000F5E000-memory.dmp

memory/4896-154-0x0000000000000000-mapping.dmp

memory/4248-162-0x0000000000000000-mapping.dmp

C:\Users\Admin\elv2.ooocccxxx

MD5 e13fecff6dc982531324cdba4f224d1d
SHA1 0de9ca7b8770ce588684237d2739d456bc64dade
SHA256 78b7f834255ee4c7e897393c70172de692415c784bcaeedf1cd304fe1ce401e0
SHA512 0e159d00676d286d104631f80a1989e308037fde82ddae495628866a1ad49059705fb9c47d7f612a108bbbb0d3f540695782dec3c4b389a56c4ac91a28a8653b

\Users\Admin\elv2.ooocccxxx

MD5 e13fecff6dc982531324cdba4f224d1d
SHA1 0de9ca7b8770ce588684237d2739d456bc64dade
SHA256 78b7f834255ee4c7e897393c70172de692415c784bcaeedf1cd304fe1ce401e0
SHA512 0e159d00676d286d104631f80a1989e308037fde82ddae495628866a1ad49059705fb9c47d7f612a108bbbb0d3f540695782dec3c4b389a56c4ac91a28a8653b

memory/4800-170-0x0000000000000000-mapping.dmp

memory/3288-310-0x0000000000000000-mapping.dmp

memory/308-311-0x0000000000000000-mapping.dmp

C:\Users\Admin\elv4.ooocccxxx

MD5 1e8791ce5e6d13941359c46b6a928621
SHA1 da4afc3f8bba09f73ce45b4764c033813c239624
SHA256 d0ad1a17f8bf2be026d74e0eb0eb16f99367370300c4e031ebe58286c0e543b0
SHA512 f43171df91dd29742e5c2fad21a89b68eebb0a183a27737b43e5404c27da2edad017df71ec05441ef484b8d07c1f8003a7ea4cfe017e059d23eae373540f727d

\Users\Admin\elv4.ooocccxxx

MD5 1e8791ce5e6d13941359c46b6a928621
SHA1 da4afc3f8bba09f73ce45b4764c033813c239624
SHA256 d0ad1a17f8bf2be026d74e0eb0eb16f99367370300c4e031ebe58286c0e543b0
SHA512 f43171df91dd29742e5c2fad21a89b68eebb0a183a27737b43e5404c27da2edad017df71ec05441ef484b8d07c1f8003a7ea4cfe017e059d23eae373540f727d

memory/4884-319-0x0000000000000000-mapping.dmp

memory/4672-346-0x00007FF838960000-0x00007FF838970000-memory.dmp

memory/4672-347-0x00007FF838960000-0x00007FF838970000-memory.dmp

memory/4672-348-0x00007FF838960000-0x00007FF838970000-memory.dmp

memory/4672-349-0x00007FF838960000-0x00007FF838970000-memory.dmp