Resubmissions
06-05-2024 11:03
240506-m5q8hada23 1010-04-2024 09:58
240410-lzxbwsbe66 1015-05-2023 13:15
230515-qhkc8adh4w 1012-07-2022 13:01
220712-p88ytsbcbp 1011-07-2022 09:39
220711-lmw6csace4 10Analysis
-
max time kernel
267s -
max time network
269s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15-05-2023 13:15
General
-
Target
36985560c3a24e6cead3e70fea55dd84cab03d9b88704906893bc70c45389f9e.xls
-
Size
95KB
-
MD5
6e332933bb67a0757d783740c29101ce
-
SHA1
edfa1dfe6a43cf8351b10856a6242e3b4ab49d62
-
SHA256
36985560c3a24e6cead3e70fea55dd84cab03d9b88704906893bc70c45389f9e
-
SHA512
45785888b7d13fe33e33d1569c2206acb64782f493d094089123d574da52bb143bf614a002a994c22818ea338b4074b783d0f925e98f226f908218da826b9fe3
-
SSDEEP
1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJms:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgK
Malware Config
Extracted
https://cointrade.world/receipts/0LjXVwpQrhw/
http://www.garantihaliyikama.com/wp-admin/jp64lssPHEe2ii/
http://haircutbar.com/cgi-bin/BC3WAQ8zJY4ALXA4/
http://airhobi.com/system/WLvH1ygkOYQO/
Extracted
emotet
Epoch5
103.71.99.57:8080
103.224.241.74:8080
157.245.111.0:8080
37.44.244.177:8080
103.41.204.169:8080
64.227.55.231:8080
103.254.12.236:7080
103.85.95.4:8080
157.230.99.206:8080
165.22.254.236:8080
85.214.67.203:8080
54.37.228.122:443
195.77.239.39:8080
128.199.217.206:443
190.145.8.4:443
165.232.185.110:8080
188.165.79.151:443
178.62.112.199:8080
54.37.106.167:8080
104.244.79.94:443
43.129.209.178:443
87.106.97.83:7080
202.134.4.210:7080
178.238.225.252:8080
198.199.70.22:8080
62.171.178.147:8080
175.126.176.79:8080
128.199.242.164:8080
88.217.172.165:8080
104.248.225.227:8080
85.25.120.45:8080
139.196.72.155:8080
188.225.32.231:4143
202.29.239.162:443
103.126.216.86:443
210.57.209.142:8080
93.104.209.107:8080
196.44.98.190:8080
5.253.30.17:7080
46.101.98.60:8080
103.56.149.105:8080
190.107.19.179:443
139.59.80.108:8080
36.67.23.59:443
78.47.204.80:443
83.229.80.93:8080
174.138.33.49:7080
118.98.72.86:443
37.187.114.15:8080
202.28.34.99:8080
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4860 2496 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4932 2496 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3464 2496 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3488 2496 regsvr32.exe EXCEL.EXE -
Downloads MZ/PE file
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 3488 regsvr32.exe -
Drops file in Windows directory 2 IoCs
Processes:
Taskmgr.exedescription ioc process File created C:\Windows\rescache\_merged\4183903823\810424605.pri Taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri Taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXETaskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2496 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exeregsvr32.exeTaskmgr.exepid process 3488 regsvr32.exe 3488 regsvr32.exe 5108 regsvr32.exe 5108 regsvr32.exe 5108 regsvr32.exe 5108 regsvr32.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Taskmgr.exepid process 4736 Taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Taskmgr.exedescription pid process Token: SeDebugPrivilege 4736 Taskmgr.exe Token: SeSystemProfilePrivilege 4736 Taskmgr.exe Token: SeCreateGlobalPrivilege 4736 Taskmgr.exe Token: 33 4736 Taskmgr.exe Token: SeIncBasePriorityPrivilege 4736 Taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
Taskmgr.exepid process 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
Taskmgr.exepid process 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe 4736 Taskmgr.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 2496 EXCEL.EXE 2496 EXCEL.EXE 2496 EXCEL.EXE 2496 EXCEL.EXE 2496 EXCEL.EXE 2496 EXCEL.EXE 2496 EXCEL.EXE 2496 EXCEL.EXE 2496 EXCEL.EXE 2496 EXCEL.EXE 2496 EXCEL.EXE 2496 EXCEL.EXE 2496 EXCEL.EXE 2496 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
EXCEL.EXEregsvr32.exelaunchtm.exedescription pid process target process PID 2496 wrote to memory of 4860 2496 EXCEL.EXE regsvr32.exe PID 2496 wrote to memory of 4860 2496 EXCEL.EXE regsvr32.exe PID 2496 wrote to memory of 4932 2496 EXCEL.EXE regsvr32.exe PID 2496 wrote to memory of 4932 2496 EXCEL.EXE regsvr32.exe PID 2496 wrote to memory of 3464 2496 EXCEL.EXE regsvr32.exe PID 2496 wrote to memory of 3464 2496 EXCEL.EXE regsvr32.exe PID 2496 wrote to memory of 3488 2496 EXCEL.EXE regsvr32.exe PID 2496 wrote to memory of 3488 2496 EXCEL.EXE regsvr32.exe PID 3488 wrote to memory of 5108 3488 regsvr32.exe regsvr32.exe PID 3488 wrote to memory of 5108 3488 regsvr32.exe regsvr32.exe PID 4704 wrote to memory of 4736 4704 launchtm.exe Taskmgr.exe PID 4704 wrote to memory of 4736 4704 launchtm.exe Taskmgr.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\36985560c3a24e6cead3e70fea55dd84cab03d9b88704906893bc70c45389f9e.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci1.ocx2⤵
- Process spawned unexpected child process
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci2.ocx2⤵
- Process spawned unexpected child process
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci3.ocx2⤵
- Process spawned unexpected child process
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\soci4.ocx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\QgouUvVCuDHgpRB\Adse.dll"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
-
C:\Windows\system32\launchtm.exelaunchtm.exe /21⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe" /22⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\soci4.ocxFilesize
551KB
MD5615f4fc0eb24ecb044f532a4c1cf20e1
SHA1738f9243e0b115a51826820c0ed92040b64615c5
SHA256b1704fff5112536cfb3a23b7f0ae3922a1418b2e3ca56340ca5537f08b7be7b6
SHA512776153b81aff092bdaff76332f8f0d4d9df175b80df8eaf80dac96fa192898256533ba589354b06c21881f0c45b0cf3b2ef1aeb0a0cc35bc3fc8105a8022c822
-
\Users\Admin\soci4.ocxFilesize
551KB
MD5615f4fc0eb24ecb044f532a4c1cf20e1
SHA1738f9243e0b115a51826820c0ed92040b64615c5
SHA256b1704fff5112536cfb3a23b7f0ae3922a1418b2e3ca56340ca5537f08b7be7b6
SHA512776153b81aff092bdaff76332f8f0d4d9df175b80df8eaf80dac96fa192898256533ba589354b06c21881f0c45b0cf3b2ef1aeb0a0cc35bc3fc8105a8022c822
-
memory/2496-133-0x00007FFD39420000-0x00007FFD39430000-memory.dmpFilesize
64KB
-
memory/2496-340-0x00007FFD3CA80000-0x00007FFD3CA90000-memory.dmpFilesize
64KB
-
memory/2496-121-0x00007FFD3CA80000-0x00007FFD3CA90000-memory.dmpFilesize
64KB
-
memory/2496-134-0x00007FFD39420000-0x00007FFD39430000-memory.dmpFilesize
64KB
-
memory/2496-276-0x000002BD0E290000-0x000002BD0E2BF000-memory.dmpFilesize
188KB
-
memory/2496-123-0x00007FFD3CA80000-0x00007FFD3CA90000-memory.dmpFilesize
64KB
-
memory/2496-122-0x00007FFD3CA80000-0x00007FFD3CA90000-memory.dmpFilesize
64KB
-
memory/2496-344-0x000002BD0E290000-0x000002BD0E2BF000-memory.dmpFilesize
188KB
-
memory/2496-343-0x00007FFD3CA80000-0x00007FFD3CA90000-memory.dmpFilesize
64KB
-
memory/2496-310-0x000002BD0E290000-0x000002BD0E2BF000-memory.dmpFilesize
188KB
-
memory/2496-124-0x00007FFD3CA80000-0x00007FFD3CA90000-memory.dmpFilesize
64KB
-
memory/2496-341-0x00007FFD3CA80000-0x00007FFD3CA90000-memory.dmpFilesize
64KB
-
memory/2496-342-0x00007FFD3CA80000-0x00007FFD3CA90000-memory.dmpFilesize
64KB
-
memory/3488-293-0x0000000000F60000-0x0000000000F61000-memory.dmpFilesize
4KB
-
memory/3488-286-0x00000000029B0000-0x0000000002A0E000-memory.dmpFilesize
376KB