File name:

WZJ000883.xlsm

Full analysis: https://app.any.run/tasks/3fda5a0b-09c4-492d-b79d-64a2d01d220f
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: June 02, 2022, 08:09:28
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
emotet-doc
emotet
Indicators:
MIME: application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
File info: Microsoft Excel 2007+
MD5:

00BD27A66D752E35A41CB7CE82524C3C

SHA1:

3E62B73A46E418B2AC1EB2D37A4EBF7F61C891B1

SHA256:

33DC0546D60F496508E95293772364BF7E913D52EC3D606B326ADFF6CBFE7FD7

SSDEEP:

768:Ub/Mvd5dhTJxmxE7l0VGpevZCw4VmUxjfC30+kS4QyoX0VyY5G:Ubmd5zmxE7W0XYk4pEVyV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • EXCEL.EXE (PID: 3208)
      • rundll32.exe (PID: 3224)
    • Executable content was dropped or overwritten

      • EXCEL.EXE (PID: 3208)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 3208)
    • Loads dropped or rewritten executable

      • rundll32.exe (PID: 2344)
      • SearchProtocolHost.exe (PID: 1448)
      • rundll32.exe (PID: 3224)
      • rundll32.exe (PID: 764)
      • rundll32.exe (PID: 3720)
    • Changes the autorun value in the registry

      • rundll32.exe (PID: 3720)
    • Connects to CnC server

      • rundll32.exe (PID: 3720)
    • EMOTET detected by memory dumps

      • rundll32.exe (PID: 3720)
  • SUSPICIOUS

    • Reads default file associations for system extensions

      • SearchProtocolHost.exe (PID: 1448)
      • rundll32.exe (PID: 3224)
    • Uses RUNDLL32.EXE to load library

      • EXCEL.EXE (PID: 3208)
      • rundll32.exe (PID: 2344)
      • rundll32.exe (PID: 3224)
      • rundll32.exe (PID: 764)
    • Drops a file with a compile date too recent

      • EXCEL.EXE (PID: 3208)
      • rundll32.exe (PID: 3224)
    • Starts itself from another location

      • rundll32.exe (PID: 2344)
    • Executable content was dropped or overwritten

      • rundll32.exe (PID: 3224)
    • Application launched itself

      • rundll32.exe (PID: 3224)
      • rundll32.exe (PID: 764)
  • INFO

    • Checks supported languages

      • EXCEL.EXE (PID: 3208)
      • rundll32.exe (PID: 3224)
      • rundll32.exe (PID: 2344)
      • rundll32.exe (PID: 764)
      • rundll32.exe (PID: 3720)
    • Reads the computer name

      • EXCEL.EXE (PID: 3208)
      • rundll32.exe (PID: 3224)
      • rundll32.exe (PID: 3720)
    • Reads settings of System Certificates

      • EXCEL.EXE (PID: 3208)
      • rundll32.exe (PID: 3720)
    • Checks Windows Trust Settings

      • EXCEL.EXE (PID: 3208)
      • rundll32.exe (PID: 3720)
    • Creates files in the user directory

      • EXCEL.EXE (PID: 3208)
    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 3208)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Emotet

(PID) Process(3720) rundll32.exe
ECK1-----BEGIN PUBLIC KEY----- MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE86M1tQ4uK/Q1Vs0KTCk+fPEQ3cuw TyCz+gIgzky2DB5Elr60DubJW5q9Tr2dj8/gEFs0TIIEJgLTuqzx+58sdg== -----END PUBLIC KEY-----
ECS1-----BEGIN PUBLIC KEY----- MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEQF90tsTY3Aw9HwZ6N9y5+be9Xoov pqHyD6F5DRTl9THosAoePIs/e5AdJiYxhmV8Gq3Zw1ysSPBghxjZdDxY+Q== -----END PUBLIC KEY-----
C2 (31)172.104.227.98:443
31.207.89.74:8080
46.55.222.11:443
41.76.108.46:8080
103.8.26.103:8080
185.184.25.237:8080
103.8.26.102:8080
203.114.109.124:443
45.118.115.99:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
192.254.71.210:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
212.237.17.99:8080
212.237.56.116:7080
216.158.226.206:443
110.232.117.186:8080
158.69.222.101:443
107.182.225.142:8080
176.104.106.96:8080
81.0.236.90:443
50.116.54.215:443
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
No Malware configuration.

TRiD

.xlsx | Excel Microsoft Office Open XML Format document (61.2)
.zip | Open Packaging Conventions container (31.5)
.zip | ZIP compressed archive (7.2)

EXIF

XML

AppVersion: 16.03
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
Company: -
TitlesOfParts:
  • Fbbsib1
  • Sheet
  • Fbe1
  • Gef1
  • Gef2
  • GOT
  • Scq1
  • Scq2
  • Scq3
  • Scq4
  • Scq5
  • Scq6
HeadingPairs:
  • Листы
  • 5
  • Макросы Excel 4.0
  • 7
ScaleCrop: No
DocSecurity: None
Application: Microsoft Excel
ModifyDate: 2021:12:03 13:37:58Z
CreateDate: 2015:06:05 18:19:34Z
LastModifiedBy: Админ

XMP

Creator: Админ

ZIP

ZipFileName: [Content_Types].xml
ZipUncompressedSize: 2833
ZipCompressedSize: 505
ZipCRC: 0x5ba70022
ZipModifyDate: 1980:01:01 00:00:00
ZipCompression: Deflated
ZipBitFlag: 0x0006
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
6
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start excel.exe rundll32.exe no specs searchprotocolhost.exe no specs rundll32.exe rundll32.exe no specs #EMOTET rundll32.exe

Process information

PID
CMD
Path
Indicators
Parent process
3208"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\microsoft office\office14\excel.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2344C:\Windows\SysWow64\rundll32.exe ..\bestb.ocx,D"&"l"&"l"&"R"&"eg"&"i"&"s"&"t"&"erServerC:\Windows\SysWow64\rundll32.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
1448"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe4_ Global\UsGthrCtrlFltPipeMssGthrPipe4 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3224C:\Windows\system32\rundll32.exe "C:\Users\admin\bestb.ocx",DllRegisterServerC:\Windows\system32\rundll32.exe
rundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\imagehlp.dll
764C:\Windows\system32\rundll32.exe "C:\Users\admin\AppData\Local\Hspakb\bilal.bay",iwfEvdvgZDHtvSUC:\Windows\system32\rundll32.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
3720C:\Windows\system32\rundll32.exe "C:\Users\admin\AppData\Local\Hspakb\bilal.bay",DllRegisterServerC:\Windows\system32\rundll32.exe
rundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Emotet
(PID) Process(3720) rundll32.exe
ECK1-----BEGIN PUBLIC KEY----- MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE86M1tQ4uK/Q1Vs0KTCk+fPEQ3cuw TyCz+gIgzky2DB5Elr60DubJW5q9Tr2dj8/gEFs0TIIEJgLTuqzx+58sdg== -----END PUBLIC KEY-----
ECS1-----BEGIN PUBLIC KEY----- MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEQF90tsTY3Aw9HwZ6N9y5+be9Xoov pqHyD6F5DRTl9THosAoePIs/e5AdJiYxhmV8Gq3Zw1ysSPBghxjZdDxY+Q== -----END PUBLIC KEY-----
C2 (31)172.104.227.98:443
31.207.89.74:8080
46.55.222.11:443
41.76.108.46:8080
103.8.26.103:8080
185.184.25.237:8080
103.8.26.102:8080
203.114.109.124:443
45.118.115.99:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
192.254.71.210:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
212.237.17.99:8080
212.237.56.116:7080
216.158.226.206:443
110.232.117.186:8080
158.69.222.101:443
107.182.225.142:8080
176.104.106.96:8080
81.0.236.90:443
50.116.54.215:443
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Total events
9 974
Read events
9 854
Write events
108
Delete events
12

Modification events

(PID) Process:(3208) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:writeName:'}?
Value:
277D3F00880C0000010000000000000000000000
(PID) Process:(3208) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(3208) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
Off
(PID) Process:(3208) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
Off
(PID) Process:(3208) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
Off
(PID) Process:(3208) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
Off
(PID) Process:(3208) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
Off
(PID) Process:(3208) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1049
Value:
Off
(PID) Process:(3208) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:3082
Value:
Off
(PID) Process:(3208) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1042
Value:
Off
Executable files
3
Suspicious files
7
Text files
2
Unknown types
5

Dropped files

PID
Process
Filename
Type
3208EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR4D87.tmp.cvr
MD5:
SHA256:
3208EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\WZJ000883.xlsm.LNKlnk
MD5:3007BB59CD077D220241C51C0ED577C1
SHA256:E2F1889FF6A4B485C2F9AB061FFB02363F50BE259F31B1A56D2A1E96A1437AD3
3224rundll32.exeC:\Users\admin\AppData\Local\Hspakb\bilal.bayexecutable
MD5:2F93CB3701205B257B8EF5E76545923B
SHA256:16211B428F9D5DA08B3A0D77589BF217F34558388D52D294F7D37DFE5E44B2E0
3208EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\IQ497C8W.txttext
MD5:CE5899405CE8A98B5157A64962B9FBC7
SHA256:7C233E0578B01D39FF2DB0B63F8A24AC68CF5A4D8943635A39C5367592720171
3208EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E20BC11E69EA6FC0A4EBF4F49320B908der
MD5:6A2A3521A4EA2156858503E3584CA5D0
SHA256:A0860AFF95C598A5AF4682EDB8880E0B081C9AD05C9E4C2DAA25ED0454DF2759
3208EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:308336E7F515478969B24C13DED11EDE
SHA256:889B832323726A9F10AD03F85562048FDCFE20C9FF6F9D37412CF477B4E92FF9
3208EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:D4BD3E9D9D59D5F27C4639F9A1473170
SHA256:F3A0359C025B157BAB128747FA6D625B419DD8C42B1DAA3CE87A4F8CBA0E4556
3208EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:E02745D781E7FEFD27AFB64C025CDAF3
SHA256:F9A18D13BFFFA073F60DA0BFC50D7F9707CB498B10BCACB48C9248E144CBFDBB
3208EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:8349BF3709C339B5031747FBA75F47B6
SHA256:3F7AA71ACA10CF681027AB701776B9B52F4F4F0A5B7955DD18E51040C5B9851C
3208EXCEL.EXEC:\Users\admin\AppData\Local\Temp\Cab63DF.tmpcompressed
MD5:308336E7F515478969B24C13DED11EDE
SHA256:889B832323726A9F10AD03F85562048FDCFE20C9FF6F9D37412CF477B4E92FF9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
10
DNS requests
4
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3208
EXCEL.EXE
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?5b28546cff9a7f3b
US
compressed
60.0 Kb
whitelisted
3208
EXCEL.EXE
GET
200
104.90.178.254:80
http://x1.c.lencr.org/
NL
der
717 b
whitelisted
3208
EXCEL.EXE
GET
200
92.123.195.28:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgQ8o0nj%2Fz2ePJs9pMIFRPxL2A%3D%3D
unknown
der
503 b
shared
3208
EXCEL.EXE
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?168c8e68a620006e
US
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3720
rundll32.exe
46.55.222.11:443
Cifrova Kabelna Korporacia EOOD
BG
malicious
3208
EXCEL.EXE
42.2.93.31:443
ordereasy.hk
PCCW Limited
HK
unknown
3720
rundll32.exe
172.104.227.98:443
US
malicious
3720
rundll32.exe
31.207.89.74:8080
Propelin Consulting S.L.U.
ES
malicious
3208
EXCEL.EXE
92.123.195.28:80
r3.o.lencr.org
Akamai International B.V.
suspicious
3208
EXCEL.EXE
93.184.221.240:80
ctldl.windowsupdate.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3208
EXCEL.EXE
104.90.178.254:80
x1.c.lencr.org
Akamai Technologies, Inc.
NL
unknown

DNS requests

Domain
IP
Reputation
ordereasy.hk
  • 42.2.93.31
unknown
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
x1.c.lencr.org
  • 104.90.178.254
whitelisted
r3.o.lencr.org
  • 92.123.195.28
  • 92.123.195.35
shared

Threats

PID
Process
Class
Message
A Network Trojan was detected
ET CNC Feodo Tracker Reported CnC Server group 19
2 ETPRO signatures available at the full report
No debug info