Analysis
-
max time kernel
129s -
max time network
132s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
23-11-2020 13:18
Static task
static1
Behavioral task
behavioral1
Sample
Inv_26726_06464.xlsm
Resource
win7v20201028
General
-
Target
Inv_26726_06464.xlsm
-
Size
54KB
-
MD5
b403bcb2e1902f9851753976c5e6c3a7
-
SHA1
845932e0c3c0b743f5fb5eb56d3e056706ab91d6
-
SHA256
7ce03706ca499ae052de8bdaf9181f4f059cae19fd22fd52a902e2fcdb27f32e
-
SHA512
30367dc639491a990ea5c7e9ec2adbbb19f305fe6157c35a0b4a0f974cb8151fabdf3ff3f1a99603f73191fbe4676cf9f29e132558aac881a776ba3d796a7436
Malware Config
Extracted
smokeloader
2020
http://penodux.com/xsmkld/index.php
http://tommusikirtyur.com/xsmkld/index.php
http://ploaernysannyer.com/xsmkld/index.php
http://dersmasfannyer.com/xsmkld/index.php
http://derdsgdannyer.com/xsmkld/index.php
Extracted
dridex
10444
175.126.167.148:443
173.249.20.233:8043
162.241.204.233:4443
138.122.143.40:8043
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\410C.dll cryptone \Users\Admin\AppData\Local\Temp\410C.dll cryptone -
Processes:
resource yara_rule behavioral2/memory/3268-25-0x0000000004820000-0x000000000485D000-memory.dmp dridex_ldr behavioral2/memory/800-163-0x0000000010000000-0x000000001001D000-memory.dmp dridex_ldr -
Executes dropped EXE 2 IoCs
Processes:
nqxzcqsl.exe48CE.exepid process 3776 nqxzcqsl.exe 800 48CE.exe -
Loads dropped DLL 2 IoCs
Processes:
nqxzcqsl.exeregsvr32.exepid process 3776 nqxzcqsl.exe 3268 regsvr32.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
nqxzcqsl.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI nqxzcqsl.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI nqxzcqsl.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI nqxzcqsl.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 984 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
nqxzcqsl.exepid process 3776 nqxzcqsl.exe 3776 nqxzcqsl.exe 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 -
Suspicious behavior: MapViewOfSection 13 IoCs
Processes:
nqxzcqsl.exepid process 3776 nqxzcqsl.exe 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 2144 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2144 Token: SeCreatePagefilePrivilege 2144 Token: SeShutdownPrivilege 2144 Token: SeCreatePagefilePrivilege 2144 -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
EXCEL.EXEregsvr32.exedescription pid process target process PID 984 wrote to memory of 3776 984 EXCEL.EXE nqxzcqsl.exe PID 984 wrote to memory of 3776 984 EXCEL.EXE nqxzcqsl.exe PID 984 wrote to memory of 3776 984 EXCEL.EXE nqxzcqsl.exe PID 2144 wrote to memory of 2004 2144 regsvr32.exe PID 2144 wrote to memory of 2004 2144 regsvr32.exe PID 2004 wrote to memory of 3268 2004 regsvr32.exe regsvr32.exe PID 2004 wrote to memory of 3268 2004 regsvr32.exe regsvr32.exe PID 2004 wrote to memory of 3268 2004 regsvr32.exe regsvr32.exe PID 2144 wrote to memory of 800 2144 48CE.exe PID 2144 wrote to memory of 800 2144 48CE.exe PID 2144 wrote to memory of 800 2144 48CE.exe PID 2144 wrote to memory of 2544 2144 explorer.exe PID 2144 wrote to memory of 2544 2144 explorer.exe PID 2144 wrote to memory of 2544 2144 explorer.exe PID 2144 wrote to memory of 2544 2144 explorer.exe PID 2144 wrote to memory of 496 2144 explorer.exe PID 2144 wrote to memory of 496 2144 explorer.exe PID 2144 wrote to memory of 496 2144 explorer.exe PID 2144 wrote to memory of 1540 2144 explorer.exe PID 2144 wrote to memory of 1540 2144 explorer.exe PID 2144 wrote to memory of 1540 2144 explorer.exe PID 2144 wrote to memory of 1540 2144 explorer.exe PID 2144 wrote to memory of 1284 2144 explorer.exe PID 2144 wrote to memory of 1284 2144 explorer.exe PID 2144 wrote to memory of 1284 2144 explorer.exe PID 2144 wrote to memory of 1284 2144 explorer.exe PID 2144 wrote to memory of 3324 2144 explorer.exe PID 2144 wrote to memory of 3324 2144 explorer.exe PID 2144 wrote to memory of 3324 2144 explorer.exe PID 2144 wrote to memory of 668 2144 explorer.exe PID 2144 wrote to memory of 668 2144 explorer.exe PID 2144 wrote to memory of 668 2144 explorer.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Inv_26726_06464.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\sledPro\nqxzcqsl.exe"C:\Users\Admin\sledPro\nqxzcqsl.exe" 02⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3776
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\410C.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\410C.dll2⤵
- Loads dropped DLL
PID:3268
-
-
C:\Users\Admin\AppData\Local\Temp\48CE.exeC:\Users\Admin\AppData\Local\Temp\48CE.exe1⤵
- Executes dropped EXE
PID:800
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2544
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:496
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1540
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1284
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3324
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:668
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0ca63fc69b7983bbecce6722abff8e86
SHA1f63b03836896bbb8a19baac85c05ca8a9e73054b
SHA2562f38ab60dc994e973ed1269a8d0c0e534235f2e39c29af52f899ecf089908dc1
SHA51234348595fa082d26961731c8fac19719c2a1998b308e8dc68be4435a23f61feb2f5131d660dce9f581ad6dd169a48ffe6c717a7212ec0d666fe08a3676e70e91
-
MD5
2f66e11030122a8e381f5806543f45a2
SHA18760dae8485027db5d36bfb634b438f1f433e842
SHA25630ce3fd6112a662fe576a70816ffab8f9c0b1cabe93ab14c1a5cd85d3a37b510
SHA512d9ee3eb3b21042a114b06fb3e949771662ae5e08a691336c8080f315640250e3f50f48127b5fab8ba8ad2298e9e97ff4bbe9dbea0022d48a9eb2ab566e726292
-
MD5
2f66e11030122a8e381f5806543f45a2
SHA18760dae8485027db5d36bfb634b438f1f433e842
SHA25630ce3fd6112a662fe576a70816ffab8f9c0b1cabe93ab14c1a5cd85d3a37b510
SHA512d9ee3eb3b21042a114b06fb3e949771662ae5e08a691336c8080f315640250e3f50f48127b5fab8ba8ad2298e9e97ff4bbe9dbea0022d48a9eb2ab566e726292
-
MD5
c966ec47c0480c3a6be2a1231a83c8a1
SHA1b15e12449be1ea174dfd224935fa6d78e1c58f5a
SHA2564b1f2c18b149fd0e878c362ffba50bb553d7bea93a795b33e398d032dc0b7663
SHA51235b3b6e9aebaa447f2cbf6a9fb7d24985475870285c6ea1bde7b8ccfd3ea956761691e44103d391ec89d8af6f43d73627a09c1c36b19f24caeab1453edd69f5e
-
MD5
c966ec47c0480c3a6be2a1231a83c8a1
SHA1b15e12449be1ea174dfd224935fa6d78e1c58f5a
SHA2564b1f2c18b149fd0e878c362ffba50bb553d7bea93a795b33e398d032dc0b7663
SHA51235b3b6e9aebaa447f2cbf6a9fb7d24985475870285c6ea1bde7b8ccfd3ea956761691e44103d391ec89d8af6f43d73627a09c1c36b19f24caeab1453edd69f5e
-
MD5
0ca63fc69b7983bbecce6722abff8e86
SHA1f63b03836896bbb8a19baac85c05ca8a9e73054b
SHA2562f38ab60dc994e973ed1269a8d0c0e534235f2e39c29af52f899ecf089908dc1
SHA51234348595fa082d26961731c8fac19719c2a1998b308e8dc68be4435a23f61feb2f5131d660dce9f581ad6dd169a48ffe6c717a7212ec0d666fe08a3676e70e91
-
MD5
50741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3