Malware Analysis Report

2025-08-05 21:38

Sample ID 221110-mkrzashae9
Target 4b216f5401ecf30dc9d6b928465eaeb0c5e40f0d5f9c8e4469c97259cdefb1d5.xls
SHA256 4b216f5401ecf30dc9d6b928465eaeb0c5e40f0d5f9c8e4469c97259cdefb1d5
Tags
macro xlm emotet epoch5 banker persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4b216f5401ecf30dc9d6b928465eaeb0c5e40f0d5f9c8e4469c97259cdefb1d5

Threat Level: Known bad

The file 4b216f5401ecf30dc9d6b928465eaeb0c5e40f0d5f9c8e4469c97259cdefb1d5.xls was found to be: Known bad.

Malicious Activity Summary

macro xlm emotet epoch5 banker persistence trojan

Process spawned unexpected child process

Emotet

Downloads MZ/PE file

Suspicious Office macro

Loads dropped DLL

Adds Run key to start application

Suspicious use of SetWindowsHookEx

Suspicious behavior: AddClipboardFormatListener

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious use of FindShellTrayWindow

Checks processor information in registry

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-11-10 10:31

Signatures

Suspicious Office macro

macro xlm
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-11-10 10:31

Reported

2022-11-10 10:34

Platform

win10-20220812-en

Max time kernel

127s

Max time network

130s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4b216f5401ecf30dc9d6b928465eaeb0c5e40f0d5f9c8e4469c97259cdefb1d5.xls"

Signatures

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4b216f5401ecf30dc9d6b928465eaeb0c5e40f0d5f9c8e4469c97259cdefb1d5.xls"

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.conceptagency.net udp
N/A 100.84.198.153:443 www.conceptagency.net tcp
US 8.8.8.8:53 bencevendeghaz.hu udp
N/A 100.81.72.220:443 bencevendeghaz.hu tcp
SG 45.32.114.141:80 45.32.114.141 tcp
US 8.8.8.8:53 ruitaiwz.com udp
N/A 100.97.84.192:80 ruitaiwz.com tcp
IE 13.69.239.72:443 tcp
US 93.184.221.240:80 tcp

Files

memory/3764-115-0x00007FFC82FF0000-0x00007FFC83000000-memory.dmp

memory/3764-116-0x00007FFC82FF0000-0x00007FFC83000000-memory.dmp

memory/3764-117-0x00007FFC82FF0000-0x00007FFC83000000-memory.dmp

memory/3764-118-0x00007FFC82FF0000-0x00007FFC83000000-memory.dmp

memory/3764-127-0x00007FFC801D0000-0x00007FFC801E0000-memory.dmp

memory/3764-128-0x00007FFC801D0000-0x00007FFC801E0000-memory.dmp

memory/4348-267-0x0000000000000000-mapping.dmp

memory/4416-270-0x0000000000000000-mapping.dmp

memory/3608-271-0x0000000000000000-mapping.dmp

memory/3016-272-0x0000000000000000-mapping.dmp

memory/3764-311-0x00007FFC82FF0000-0x00007FFC83000000-memory.dmp

memory/3764-312-0x00007FFC82FF0000-0x00007FFC83000000-memory.dmp

memory/3764-313-0x00007FFC82FF0000-0x00007FFC83000000-memory.dmp

memory/3764-314-0x00007FFC82FF0000-0x00007FFC83000000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-11-10 10:31

Reported

2022-11-10 10:34

Platform

win10-20220812-en

Max time kernel

101s

Max time network

128s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4b216f5401ecf30dc9d6b928465eaeb0c5e40f0d5f9c8e4469c97259cdefb1d5.xls"

Signatures

Emotet

trojan banker emotet

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process N/A C:\Windows\System32\regsvr32.exe C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

Downloads MZ/PE file

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\System32\regsvr32.exe N/A
N/A N/A C:\Windows\System32\regsvr32.exe N/A
N/A N/A C:\Windows\System32\regsvr32.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iKfDQG.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\FXeskGkix\\iKfDQG.dll\"" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yOMAwNEDxfk.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\WTgDlbVrA\\yOMAwNEDxfk.dll\"" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\grMWgReL.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\NPsdQkHQ\\grMWgReL.dll\"" C:\Windows\system32\regsvr32.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2576 wrote to memory of 4284 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 2576 wrote to memory of 4284 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 4284 wrote to memory of 4472 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 4284 wrote to memory of 4472 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 2576 wrote to memory of 4136 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 2576 wrote to memory of 4136 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 4136 wrote to memory of 920 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 4136 wrote to memory of 920 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 2576 wrote to memory of 4396 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 2576 wrote to memory of 4396 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 2576 wrote to memory of 3304 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 2576 wrote to memory of 3304 N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE C:\Windows\System32\regsvr32.exe
PID 3304 wrote to memory of 1764 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 3304 wrote to memory of 1764 N/A C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe

Processes

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4b216f5401ecf30dc9d6b928465eaeb0c5e40f0d5f9c8e4469c97259cdefb1d5.xls"

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\FXeskGkix\iKfDQG.dll"

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\WTgDlbVrA\yOMAwNEDxfk.dll"

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx

C:\Windows\System32\regsvr32.exe

C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx

C:\Windows\system32\regsvr32.exe

C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NPsdQkHQ\grMWgReL.dll"

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.conceptagency.net udp
DE 149.102.137.213:443 www.conceptagency.net tcp
US 8.8.8.8:53 bencevendeghaz.hu udp
HU 185.6.139.30:443 bencevendeghaz.hu tcp
SG 45.32.114.141:80 tcp
US 8.8.8.8:53 ruitaiwz.com udp
HK 45.207.116.84:80 ruitaiwz.com tcp
IE 20.50.73.10:443 tcp
ID 115.178.55.22:80 115.178.55.22 tcp
ID 115.178.55.22:80 115.178.55.22 tcp
US 13.107.4.50:80 tcp
ID 115.178.55.22:80 115.178.55.22 tcp

Files

memory/2576-115-0x00007FFB248E0000-0x00007FFB248F0000-memory.dmp

memory/2576-116-0x00007FFB248E0000-0x00007FFB248F0000-memory.dmp

memory/2576-117-0x00007FFB248E0000-0x00007FFB248F0000-memory.dmp

memory/2576-118-0x00007FFB248E0000-0x00007FFB248F0000-memory.dmp

memory/2576-127-0x00007FFB21390000-0x00007FFB213A0000-memory.dmp

memory/2576-128-0x00007FFB21390000-0x00007FFB213A0000-memory.dmp

memory/4284-274-0x0000000000000000-mapping.dmp

C:\Users\Admin\elv1.ooocccxxx

MD5 287abecca3fd35d9f3ed53f4f7377c7e
SHA1 4d1693f6b31d926633e8a7e349fee96c4e60120b
SHA256 6426c9c4829f9e4ec0ce794317153e46cb6b74050b74197c9a588fa7d3de679c
SHA512 348f77291ee436dcf5e0de2da792b1d9e6c0daf1fb925122ed06984bf14f21d909b14dd6d3096fc229143c2d2562f1f57ea159db9d4f4ec717602943780ab385

\Users\Admin\elv1.ooocccxxx

MD5 287abecca3fd35d9f3ed53f4f7377c7e
SHA1 4d1693f6b31d926633e8a7e349fee96c4e60120b
SHA256 6426c9c4829f9e4ec0ce794317153e46cb6b74050b74197c9a588fa7d3de679c
SHA512 348f77291ee436dcf5e0de2da792b1d9e6c0daf1fb925122ed06984bf14f21d909b14dd6d3096fc229143c2d2562f1f57ea159db9d4f4ec717602943780ab385

memory/4284-277-0x00000000010A0000-0x00000000010CE000-memory.dmp

memory/4472-287-0x0000000000000000-mapping.dmp

memory/4136-295-0x0000000000000000-mapping.dmp

C:\Users\Admin\elv2.ooocccxxx

MD5 e13fecff6dc982531324cdba4f224d1d
SHA1 0de9ca7b8770ce588684237d2739d456bc64dade
SHA256 78b7f834255ee4c7e897393c70172de692415c784bcaeedf1cd304fe1ce401e0
SHA512 0e159d00676d286d104631f80a1989e308037fde82ddae495628866a1ad49059705fb9c47d7f612a108bbbb0d3f540695782dec3c4b389a56c4ac91a28a8653b

\Users\Admin\elv2.ooocccxxx

MD5 e13fecff6dc982531324cdba4f224d1d
SHA1 0de9ca7b8770ce588684237d2739d456bc64dade
SHA256 78b7f834255ee4c7e897393c70172de692415c784bcaeedf1cd304fe1ce401e0
SHA512 0e159d00676d286d104631f80a1989e308037fde82ddae495628866a1ad49059705fb9c47d7f612a108bbbb0d3f540695782dec3c4b389a56c4ac91a28a8653b

memory/920-306-0x0000000000000000-mapping.dmp

memory/4396-312-0x0000000000000000-mapping.dmp

memory/3304-313-0x0000000000000000-mapping.dmp

\Users\Admin\elv4.ooocccxxx

MD5 92a3f6911635438f39de4bae33cc6fa2
SHA1 a1d0c269e83f262bd665fadabd9521372c9d86e7
SHA256 e9a6ea8caed6cf87ba761f830065fbd710ac0a1cc5ca6551e8901e490e3eca00
SHA512 b79b9b05c72aeb2868a2581eff03beeca4b277eb1ffe9784f873a2426cf39dcd9070e37daef9722b39f53e95fa86bc28ab302252f9b95801c6cf828253120a04

C:\Users\Admin\elv4.ooocccxxx

MD5 92a3f6911635438f39de4bae33cc6fa2
SHA1 a1d0c269e83f262bd665fadabd9521372c9d86e7
SHA256 e9a6ea8caed6cf87ba761f830065fbd710ac0a1cc5ca6551e8901e490e3eca00
SHA512 b79b9b05c72aeb2868a2581eff03beeca4b277eb1ffe9784f873a2426cf39dcd9070e37daef9722b39f53e95fa86bc28ab302252f9b95801c6cf828253120a04

memory/1764-321-0x0000000000000000-mapping.dmp

memory/2576-351-0x00007FFB248E0000-0x00007FFB248F0000-memory.dmp

memory/2576-352-0x00007FFB248E0000-0x00007FFB248F0000-memory.dmp

memory/2576-353-0x00007FFB248E0000-0x00007FFB248F0000-memory.dmp

memory/2576-354-0x00007FFB248E0000-0x00007FFB248F0000-memory.dmp