Analysis
-
max time kernel
129s -
max time network
132s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
23-11-2020 13:18
Static task
static1
Behavioral task
behavioral1
Sample
Inv_26726_06464.xlsm
Resource
win7v20201028
General
-
Target
Inv_26726_06464.xlsm
-
Size
54KB
-
MD5
b403bcb2e1902f9851753976c5e6c3a7
-
SHA1
845932e0c3c0b743f5fb5eb56d3e056706ab91d6
-
SHA256
7ce03706ca499ae052de8bdaf9181f4f059cae19fd22fd52a902e2fcdb27f32e
-
SHA512
30367dc639491a990ea5c7e9ec2adbbb19f305fe6157c35a0b4a0f974cb8151fabdf3ff3f1a99603f73191fbe4676cf9f29e132558aac881a776ba3d796a7436
Malware Config
Extracted
smokeloader
2020
http://penodux.com/xsmkld/index.php
http://tommusikirtyur.com/xsmkld/index.php
http://ploaernysannyer.com/xsmkld/index.php
http://dersmasfannyer.com/xsmkld/index.php
http://derdsgdannyer.com/xsmkld/index.php
Extracted
dridex
10444
175.126.167.148:443
173.249.20.233:8043
162.241.204.233:4443
138.122.143.40:8043
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
resource yara_rule behavioral2/files/0x000200000001ab92-13.dat cryptone behavioral2/files/0x000200000001ab92-15.dat cryptone -
resource yara_rule behavioral2/memory/3268-25-0x0000000004820000-0x000000000485D000-memory.dmp dridex_ldr behavioral2/memory/800-163-0x0000000010000000-0x000000001001D000-memory.dmp dridex_ldr -
Executes dropped EXE 2 IoCs
pid Process 3776 nqxzcqsl.exe 800 48CE.exe -
Loads dropped DLL 2 IoCs
pid Process 3776 nqxzcqsl.exe 3268 regsvr32.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI nqxzcqsl.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI nqxzcqsl.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI nqxzcqsl.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 984 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3776 nqxzcqsl.exe 3776 nqxzcqsl.exe 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found -
Suspicious behavior: MapViewOfSection 13 IoCs
pid Process 3776 nqxzcqsl.exe 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found 2144 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 2144 Process not Found Token: SeCreatePagefilePrivilege 2144 Process not Found Token: SeShutdownPrivilege 2144 Process not Found Token: SeCreatePagefilePrivilege 2144 Process not Found -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 984 wrote to memory of 3776 984 EXCEL.EXE 78 PID 984 wrote to memory of 3776 984 EXCEL.EXE 78 PID 984 wrote to memory of 3776 984 EXCEL.EXE 78 PID 2144 wrote to memory of 2004 2144 Process not Found 80 PID 2144 wrote to memory of 2004 2144 Process not Found 80 PID 2004 wrote to memory of 3268 2004 regsvr32.exe 81 PID 2004 wrote to memory of 3268 2004 regsvr32.exe 81 PID 2004 wrote to memory of 3268 2004 regsvr32.exe 81 PID 2144 wrote to memory of 800 2144 Process not Found 82 PID 2144 wrote to memory of 800 2144 Process not Found 82 PID 2144 wrote to memory of 800 2144 Process not Found 82 PID 2144 wrote to memory of 2544 2144 Process not Found 83 PID 2144 wrote to memory of 2544 2144 Process not Found 83 PID 2144 wrote to memory of 2544 2144 Process not Found 83 PID 2144 wrote to memory of 2544 2144 Process not Found 83 PID 2144 wrote to memory of 496 2144 Process not Found 84 PID 2144 wrote to memory of 496 2144 Process not Found 84 PID 2144 wrote to memory of 496 2144 Process not Found 84 PID 2144 wrote to memory of 1540 2144 Process not Found 85 PID 2144 wrote to memory of 1540 2144 Process not Found 85 PID 2144 wrote to memory of 1540 2144 Process not Found 85 PID 2144 wrote to memory of 1540 2144 Process not Found 85 PID 2144 wrote to memory of 1284 2144 Process not Found 86 PID 2144 wrote to memory of 1284 2144 Process not Found 86 PID 2144 wrote to memory of 1284 2144 Process not Found 86 PID 2144 wrote to memory of 1284 2144 Process not Found 86 PID 2144 wrote to memory of 3324 2144 Process not Found 87 PID 2144 wrote to memory of 3324 2144 Process not Found 87 PID 2144 wrote to memory of 3324 2144 Process not Found 87 PID 2144 wrote to memory of 668 2144 Process not Found 88 PID 2144 wrote to memory of 668 2144 Process not Found 88 PID 2144 wrote to memory of 668 2144 Process not Found 88
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Inv_26726_06464.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\sledPro\nqxzcqsl.exe"C:\Users\Admin\sledPro\nqxzcqsl.exe" 02⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3776
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\410C.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\410C.dll2⤵
- Loads dropped DLL
PID:3268
-
-
C:\Users\Admin\AppData\Local\Temp\48CE.exeC:\Users\Admin\AppData\Local\Temp\48CE.exe1⤵
- Executes dropped EXE
PID:800
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2544
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:496
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1540
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1284
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3324
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:668