Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:41
Behavioral task
behavioral1
Sample
BF829517A6DAC2F780968DF6DB5B212A01EC269A353376EAA1B7D6EB306DCC9F.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
BF829517A6DAC2F780968DF6DB5B212A01EC269A353376EAA1B7D6EB306DCC9F.xls
Resource
win10v2004-20220812-en
General
-
Target
BF829517A6DAC2F780968DF6DB5B212A01EC269A353376EAA1B7D6EB306DCC9F.xls
-
Size
91KB
-
MD5
c44facac840cd5d8286c0a771dc0df4d
-
SHA1
bea1524c9dcbdeb63ab6073dae60ad071ad5db2c
-
SHA256
bf829517a6dac2f780968df6db5b212a01ec269a353376eaa1b7d6eb306dcc9f
-
SHA512
8e6f752450612fbe4d555e4f4e0372f62778311bf77740a8d0352a5b3861dc334e6d0c1ab953f2e82456884f8f6a498eabf3f17d540aa0a1acef4320d5a71ae5
-
SSDEEP
1536:vKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgHbCXuZH4gb4CEn9J4ZPX5:vKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgl
Malware Config
Extracted
https://datie-tw.com/img/O8G0RDZj7MYCuJyPoP/
http://sbm.xinmoshiwang.com/upload/VaOfWEb3pW76UO/
https://copunupo.ac.zm/cgi-bin/WFFcGx/
http://ly.yjlianyi.top/wp-admin/4cChao/
Extracted
emotet
Epoch4
185.4.135.165:8080
159.89.202.34:443
82.223.21.224:8080
187.63.160.88:80
188.44.20.25:443
91.187.140.35:8080
110.232.117.186:8080
197.242.150.244:8080
119.59.103.152:8080
182.162.143.56:443
72.15.201.15:8080
173.255.211.88:443
206.189.28.199:8080
94.23.45.86:4143
45.63.99.23:7080
153.126.146.25:7080
45.118.115.99:8080
115.68.227.76:8080
163.44.196.120:8080
159.65.140.115:443
169.57.156.166:8080
139.59.56.73:8080
183.111.227.137:8080
202.129.205.3:8080
103.43.75.120:443
45.176.232.124:443
186.194.240.217:443
173.212.193.249:8080
139.59.126.41:443
149.56.131.28:8080
159.65.88.10:8080
201.94.166.162:443
107.170.39.149:8080
103.75.201.2:443
103.132.242.26:8080
209.97.163.214:443
129.232.188.93:443
79.137.35.198:8080
101.50.0.91:8080
147.139.166.154:8080
160.16.142.56:8080
153.92.5.27:8080
167.172.199.165:8080
95.217.221.146:8080
167.172.253.162:8080
164.90.222.65:443
172.105.226.75:8080
164.68.99.3:8080
213.239.212.5:443
91.207.28.33:8080
45.235.8.30:8080
172.104.251.154:8080
5.135.159.50:443
212.24.98.99:8080
104.168.155.143:8080
1.234.2.232:8080
Signatures
-
Process spawned unexpected child process ⋅ 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1536 1520 regsvr32.exe EXCEL.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 624 1520 regsvr32.exe EXCEL.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1420 1520 regsvr32.exe EXCEL.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1596 1520 regsvr32.exe EXCEL.EXE -
Downloads MZ/PE file
-
Loads dropped DLL ⋅ 6 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exepid process 624 regsvr32.exe 868 regsvr32.exe 1420 regsvr32.exe 1956 regsvr32.exe 1596 regsvr32.exe 1076 regsvr32.exe -
Enumerates system info in registry ⋅ 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
TTPs:
Processes:
EXCEL.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE -
Modifies registry class ⋅ 64 IoCs
Processes:
EXCEL.EXEdescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener ⋅ 1 IoCs
Processes:
EXCEL.EXEpid process 1520 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses ⋅ 9 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exepid process 868 regsvr32.exe 584 regsvr32.exe 584 regsvr32.exe 1956 regsvr32.exe 1920 regsvr32.exe 1920 regsvr32.exe 1076 regsvr32.exe 1996 regsvr32.exe 1996 regsvr32.exe -
Suspicious use of FindShellTrayWindow ⋅ 1 IoCs
Processes:
EXCEL.EXEpid process 1520 EXCEL.EXE -
Suspicious use of SetWindowsHookEx ⋅ 4 IoCs
Processes:
EXCEL.EXEpid process 1520 EXCEL.EXE 1520 EXCEL.EXE 1520 EXCEL.EXE 1520 EXCEL.EXE -
Suspicious use of WriteProcessMemory ⋅ 64 IoCs
Processes:
EXCEL.EXEregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exedescription pid process target process PID 1520 wrote to memory of 1536 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1536 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1536 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1536 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1536 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1536 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1536 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 624 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 624 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 624 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 624 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 624 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 624 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 624 1520 EXCEL.EXE regsvr32.exe PID 624 wrote to memory of 868 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 868 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 868 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 868 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 868 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 868 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 868 624 regsvr32.exe regsvr32.exe PID 868 wrote to memory of 584 868 regsvr32.exe regsvr32.exe PID 868 wrote to memory of 584 868 regsvr32.exe regsvr32.exe PID 868 wrote to memory of 584 868 regsvr32.exe regsvr32.exe PID 868 wrote to memory of 584 868 regsvr32.exe regsvr32.exe PID 868 wrote to memory of 584 868 regsvr32.exe regsvr32.exe PID 1520 wrote to memory of 1420 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1420 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1420 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1420 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1420 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1420 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1420 1520 EXCEL.EXE regsvr32.exe PID 1420 wrote to memory of 1956 1420 regsvr32.exe regsvr32.exe PID 1420 wrote to memory of 1956 1420 regsvr32.exe regsvr32.exe PID 1420 wrote to memory of 1956 1420 regsvr32.exe regsvr32.exe PID 1420 wrote to memory of 1956 1420 regsvr32.exe regsvr32.exe PID 1420 wrote to memory of 1956 1420 regsvr32.exe regsvr32.exe PID 1420 wrote to memory of 1956 1420 regsvr32.exe regsvr32.exe PID 1420 wrote to memory of 1956 1420 regsvr32.exe regsvr32.exe PID 1956 wrote to memory of 1920 1956 regsvr32.exe regsvr32.exe PID 1956 wrote to memory of 1920 1956 regsvr32.exe regsvr32.exe PID 1956 wrote to memory of 1920 1956 regsvr32.exe regsvr32.exe PID 1956 wrote to memory of 1920 1956 regsvr32.exe regsvr32.exe PID 1956 wrote to memory of 1920 1956 regsvr32.exe regsvr32.exe PID 1520 wrote to memory of 1596 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1596 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1596 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1596 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1596 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1596 1520 EXCEL.EXE regsvr32.exe PID 1520 wrote to memory of 1596 1520 EXCEL.EXE regsvr32.exe PID 1596 wrote to memory of 1076 1596 regsvr32.exe regsvr32.exe PID 1596 wrote to memory of 1076 1596 regsvr32.exe regsvr32.exe PID 1596 wrote to memory of 1076 1596 regsvr32.exe regsvr32.exe PID 1596 wrote to memory of 1076 1596 regsvr32.exe regsvr32.exe PID 1596 wrote to memory of 1076 1596 regsvr32.exe regsvr32.exe PID 1596 wrote to memory of 1076 1596 regsvr32.exe regsvr32.exe PID 1596 wrote to memory of 1076 1596 regsvr32.exe regsvr32.exe PID 1076 wrote to memory of 1996 1076 regsvr32.exe regsvr32.exe PID 1076 wrote to memory of 1996 1076 regsvr32.exe regsvr32.exe PID 1076 wrote to memory of 1996 1076 regsvr32.exe regsvr32.exe PID 1076 wrote to memory of 1996 1076 regsvr32.exe regsvr32.exe PID 1076 wrote to memory of 1996 1076 regsvr32.exe regsvr32.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\BF829517A6DAC2F780968DF6DB5B212A01EC269A353376EAA1B7D6EB306DCC9F.xlsEnumerates system info in registryModifies Internet Explorer settingsModifies registry classSuspicious behavior: AddClipboardFormatListenerSuspicious use of FindShellTrayWindowSuspicious use of SetWindowsHookExSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxxProcess spawned unexpected child process
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxxProcess spawned unexpected child processLoads dropped DLLSuspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe/S ..\elv2.ooocccxxxLoads dropped DLLSuspicious behavior: EnumeratesProcessesSuspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\IyFosyb\dxBNvxLor.dll"Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxxProcess spawned unexpected child processLoads dropped DLLSuspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe/S ..\elv3.ooocccxxxLoads dropped DLLSuspicious behavior: EnumeratesProcessesSuspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\YtSzL\sewmUbRxjcEnx.dll"Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxxProcess spawned unexpected child processLoads dropped DLLSuspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe/S ..\elv4.ooocccxxxLoads dropped DLLSuspicious behavior: EnumeratesProcessesSuspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\EfSmZZGgelNbQpTgZ\LrJaEBqObo.dll"Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
Downloads
-
C:\Users\Admin\elv2.ooocccxxxMD5
3929b889987f447cb837ed326860afc6
SHA19bb1a7622f2bc5a6a51487434a77f395de5e50d7
SHA256b2aa99def35f913b42b882122c8dd5f72ceeab82f6747f1b659c8632cd6eb902
SHA512ef4db4f06ee1f85ab96aa70fc5dd05a062da6a5d13f9a643afe471f6fdc9fea62ff39f3c951286b7a865c66c53e0e73fd84e2e5030e1843f24fe014ce7ba9715
-
C:\Users\Admin\elv3.ooocccxxxMD5
dd7105e9748a29b5bd61ea57214d57e3
SHA1827b323bda769ba7fb838a231aa4160209266b14
SHA256c987ad0cc79b598bdee9ec7da96b07e82a04cadd73cb3caf85b799731deef9a1
SHA512beca102422697e4cd50b81289bdc5097935f11c0c5acc86b7a69893fb819a3cd225e4b2594a2bb40163fbd68d7ac281b0ff260f30b55cf188112445eb26986b7
-
C:\Users\Admin\elv4.ooocccxxxMD5
b88be642ea7e4f9ad82b5d843edf0ec1
SHA125fd3517b996858e28cb6cee21ea17c528192ed6
SHA2567738d0b8b7c927ca3a92aa49988e2d8bb9bcfa67c09aaa139ae4289f35191708
SHA5128635936e878d2839463e7adb2cd1cbb7b3c0d842d922355d8f281dd4e70a94d5a67222fd8c795a9f1a021ec7a75b78018e5f33b059b5a684bb625930b7a391ec
-
\Users\Admin\elv2.ooocccxxxMD5
3929b889987f447cb837ed326860afc6
SHA19bb1a7622f2bc5a6a51487434a77f395de5e50d7
SHA256b2aa99def35f913b42b882122c8dd5f72ceeab82f6747f1b659c8632cd6eb902
SHA512ef4db4f06ee1f85ab96aa70fc5dd05a062da6a5d13f9a643afe471f6fdc9fea62ff39f3c951286b7a865c66c53e0e73fd84e2e5030e1843f24fe014ce7ba9715
-
\Users\Admin\elv2.ooocccxxxMD5
3929b889987f447cb837ed326860afc6
SHA19bb1a7622f2bc5a6a51487434a77f395de5e50d7
SHA256b2aa99def35f913b42b882122c8dd5f72ceeab82f6747f1b659c8632cd6eb902
SHA512ef4db4f06ee1f85ab96aa70fc5dd05a062da6a5d13f9a643afe471f6fdc9fea62ff39f3c951286b7a865c66c53e0e73fd84e2e5030e1843f24fe014ce7ba9715
-
\Users\Admin\elv3.ooocccxxxMD5
dd7105e9748a29b5bd61ea57214d57e3
SHA1827b323bda769ba7fb838a231aa4160209266b14
SHA256c987ad0cc79b598bdee9ec7da96b07e82a04cadd73cb3caf85b799731deef9a1
SHA512beca102422697e4cd50b81289bdc5097935f11c0c5acc86b7a69893fb819a3cd225e4b2594a2bb40163fbd68d7ac281b0ff260f30b55cf188112445eb26986b7
-
\Users\Admin\elv3.ooocccxxxMD5
dd7105e9748a29b5bd61ea57214d57e3
SHA1827b323bda769ba7fb838a231aa4160209266b14
SHA256c987ad0cc79b598bdee9ec7da96b07e82a04cadd73cb3caf85b799731deef9a1
SHA512beca102422697e4cd50b81289bdc5097935f11c0c5acc86b7a69893fb819a3cd225e4b2594a2bb40163fbd68d7ac281b0ff260f30b55cf188112445eb26986b7
-
\Users\Admin\elv4.ooocccxxxMD5
b88be642ea7e4f9ad82b5d843edf0ec1
SHA125fd3517b996858e28cb6cee21ea17c528192ed6
SHA2567738d0b8b7c927ca3a92aa49988e2d8bb9bcfa67c09aaa139ae4289f35191708
SHA5128635936e878d2839463e7adb2cd1cbb7b3c0d842d922355d8f281dd4e70a94d5a67222fd8c795a9f1a021ec7a75b78018e5f33b059b5a684bb625930b7a391ec
-
\Users\Admin\elv4.ooocccxxxMD5
b88be642ea7e4f9ad82b5d843edf0ec1
SHA125fd3517b996858e28cb6cee21ea17c528192ed6
SHA2567738d0b8b7c927ca3a92aa49988e2d8bb9bcfa67c09aaa139ae4289f35191708
SHA5128635936e878d2839463e7adb2cd1cbb7b3c0d842d922355d8f281dd4e70a94d5a67222fd8c795a9f1a021ec7a75b78018e5f33b059b5a684bb625930b7a391ec
-
memory/584-72-0x0000000000000000-mapping.dmp
-
memory/624-62-0x0000000000000000-mapping.dmp
-
memory/868-66-0x0000000000000000-mapping.dmp
-
memory/868-67-0x000007FEFB801000-0x000007FEFB803000-memory.dmp
-
memory/868-69-0x0000000180000000-0x0000000180030000-memory.dmp
-
memory/1076-96-0x0000000000000000-mapping.dmp
-
memory/1420-77-0x0000000000000000-mapping.dmp
-
memory/1520-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
-
memory/1520-54-0x000000002F791000-0x000000002F794000-memory.dmp
-
memory/1520-55-0x0000000070FF1000-0x0000000070FF3000-memory.dmp
-
memory/1520-57-0x0000000074D61000-0x0000000074D63000-memory.dmp
-
memory/1520-58-0x0000000071FDD000-0x0000000071FE8000-memory.dmp
-
memory/1520-59-0x0000000071FDD000-0x0000000071FE8000-memory.dmp
-
memory/1536-60-0x0000000000000000-mapping.dmp
-
memory/1596-92-0x0000000000000000-mapping.dmp
-
memory/1920-87-0x0000000000000000-mapping.dmp
-
memory/1956-81-0x0000000000000000-mapping.dmp
-
memory/1996-102-0x0000000000000000-mapping.dmp