Analysis
-
max time kernel
144s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2023, 10:24
Behavioral task
behavioral1
Sample
INVOICE 589 03_23.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
INVOICE 589 03_23.doc
Resource
win10v2004-20230220-en
General
-
Target
INVOICE 589 03_23.doc
-
Size
526.2MB
-
MD5
b59808aba76dd0095aa06133382de9ed
-
SHA1
59aed06213b305d2877031e8ef489064ef74ca74
-
SHA256
2e116e6a43dcc2ee55df34664a7d5bfae36918f3a8ce5af97be6cb99e3a4de5b
-
SHA512
134c7c9929c277a3ec0403c2246214059d107c78c0056f8190218e0d16ded3cfaa7a4682d695f9e6212c66220cb222589c8fcd19f6ea70a00994eb06eec6566b
-
SSDEEP
3072:eoEW2aOtFjH0lP2IpjctfRcVVwEi/A8NVM1wIOCbX6bYLjWFJuvx7ueK6:ZE1aOtFa2I9c3aVw4zwxCbJ4Jup
Malware Config
Extracted
emotet
Epoch4
129.232.188.93:443
164.90.222.65:443
159.65.88.10:8080
172.105.226.75:8080
115.68.227.76:8080
187.63.160.88:80
169.57.156.166:8080
185.4.135.165:8080
153.126.146.25:7080
197.242.150.244:8080
139.59.126.41:443
186.194.240.217:443
103.132.242.26:8080
206.189.28.199:8080
163.44.196.120:8080
95.217.221.146:8080
159.89.202.34:443
119.59.103.152:8080
183.111.227.137:8080
201.94.166.162:443
103.75.201.2:443
149.56.131.28:8080
79.137.35.198:8080
5.135.159.50:443
66.228.32.31:7080
91.121.146.47:8080
153.92.5.27:8080
45.235.8.30:8080
72.15.201.15:8080
107.170.39.149:8080
45.176.232.124:443
82.223.21.224:8080
167.172.199.165:8080
213.239.212.5:443
202.129.205.3:8080
94.23.45.86:4143
147.139.166.154:8080
167.172.253.162:8080
91.207.28.33:8080
188.44.20.25:443
104.168.155.143:8080
110.232.117.186:8080
164.68.99.3:8080
1.234.2.232:8080
173.212.193.249:8080
182.162.143.56:443
160.16.142.56:8080
101.50.0.91:8080
103.43.75.120:443
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4748 560 regsvr32.exe 84 -
Loads dropped DLL 3 IoCs
pid Process 4748 regsvr32.exe 4748 regsvr32.exe 4512 regsvr32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mCQCqYLS.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\VFfGIT\\mCQCqYLS.dll\"" regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 25 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 30 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 560 WINWORD.EXE 560 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4748 regsvr32.exe 4748 regsvr32.exe 4512 regsvr32.exe 4512 regsvr32.exe 4512 regsvr32.exe 4512 regsvr32.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 560 WINWORD.EXE 560 WINWORD.EXE 560 WINWORD.EXE 560 WINWORD.EXE 560 WINWORD.EXE 560 WINWORD.EXE 560 WINWORD.EXE 560 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 560 wrote to memory of 4748 560 WINWORD.EXE 89 PID 560 wrote to memory of 4748 560 WINWORD.EXE 89 PID 4748 wrote to memory of 4512 4748 regsvr32.exe 94 PID 4748 wrote to memory of 4512 4748 regsvr32.exe 94
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\INVOICE 589 03_23.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\112535.tmp"2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\VFfGIT\mCQCqYLS.dll"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
522.7MB
MD51c303e684f6c3e7c290fcb8d69af758a
SHA1ad884ba9ee33f7839562b938dce7eca27372787b
SHA25682f6277d83395b80a5938895242db48eb381e5d90148d9d36f1b8c5fd2fdf01f
SHA51209d7c729a38f08fd264de57be69306e42a4a1403df55b5909d87b62b9ea33a2d952a75a37df6ae02aa202ed6e36b4015e2e75ca6d264e3880da495bae30312ab
-
Filesize
522.7MB
MD51c303e684f6c3e7c290fcb8d69af758a
SHA1ad884ba9ee33f7839562b938dce7eca27372787b
SHA25682f6277d83395b80a5938895242db48eb381e5d90148d9d36f1b8c5fd2fdf01f
SHA51209d7c729a38f08fd264de57be69306e42a4a1403df55b5909d87b62b9ea33a2d952a75a37df6ae02aa202ed6e36b4015e2e75ca6d264e3880da495bae30312ab
-
Filesize
522.7MB
MD51c303e684f6c3e7c290fcb8d69af758a
SHA1ad884ba9ee33f7839562b938dce7eca27372787b
SHA25682f6277d83395b80a5938895242db48eb381e5d90148d9d36f1b8c5fd2fdf01f
SHA51209d7c729a38f08fd264de57be69306e42a4a1403df55b5909d87b62b9ea33a2d952a75a37df6ae02aa202ed6e36b4015e2e75ca6d264e3880da495bae30312ab
-
Filesize
858KB
MD5d5ddd43ec77e41248c11f61b11549a4d
SHA1cd0a0882ea0ff7aafbc46bdf9b04f8eef7484eef
SHA256fc34c3d592129e04cf7aa98b10023d75b6e9cc72dfd6b1a8ae100bd9b5c2c860
SHA51234c18aec4d515ac27cc54c3d5c51f4e7453960dc7c9e81d717f02d5c6f546cebc28bfad563452b528992b2453cf924a022d5e64b53dc204d839f43abac3d4fb8
-
Filesize
522.7MB
MD51c303e684f6c3e7c290fcb8d69af758a
SHA1ad884ba9ee33f7839562b938dce7eca27372787b
SHA25682f6277d83395b80a5938895242db48eb381e5d90148d9d36f1b8c5fd2fdf01f
SHA51209d7c729a38f08fd264de57be69306e42a4a1403df55b5909d87b62b9ea33a2d952a75a37df6ae02aa202ed6e36b4015e2e75ca6d264e3880da495bae30312ab