Analysis
-
max time kernel
132s -
max time network
145s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
23-11-2020 18:36
Static task
static1
Behavioral task
behavioral1
Sample
inv_112020_65098.pif.exe
Resource
win7v20201028
General
-
Target
inv_112020_65098.pif.exe
-
Size
656KB
-
MD5
6e5017e2d0407e74578d1121233da979
-
SHA1
be9ad4ab667f1e8be4ad4848ad852d5a72aa4234
-
SHA256
7af038d2f4f41c0d130aaa1e4557d821e2b7f4c6bda2be44300e229cd5c721df
-
SHA512
b1f8e67c5373aef0e7997d2c4392078aa7f7f28b975fad0e06319a524a59ec98d328fd60438b00f05b6c16b6142065d995e1b88512fdd9e02839990407b15e61
Malware Config
Extracted
smokeloader
2020
http://penodux.com/xsmkld/index.php
http://tommusikirtyur.com/xsmkld/index.php
http://ploaernysannyer.com/xsmkld/index.php
http://dersmasfannyer.com/xsmkld/index.php
http://derdsgdannyer.com/xsmkld/index.php
Extracted
dridex
10444
175.126.167.148:443
173.249.20.233:8043
162.241.204.233:4443
138.122.143.40:8043
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\EA20.dll cryptone \Users\Admin\AppData\Local\Temp\EA20.dll cryptone -
Processes:
resource yara_rule behavioral1/memory/436-8-0x0000000000980000-0x00000000009BD000-memory.dmp dridex_ldr behavioral1/memory/336-14-0x0000000010000000-0x000000001001D000-memory.dmp dridex_ldr -
Executes dropped EXE 1 IoCs
Processes:
F1FE.exepid process 336 F1FE.exe -
Deletes itself 1 IoCs
Processes:
pid process 1268 -
Loads dropped DLL 2 IoCs
Processes:
inv_112020_65098.pif.exeregsvr32.exepid process 884 inv_112020_65098.pif.exe 436 regsvr32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
inv_112020_65098.pif.exedescription pid process target process PID 2028 set thread context of 884 2028 inv_112020_65098.pif.exe inv_112020_65098.pif.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
inv_112020_65098.pif.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI inv_112020_65098.pif.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI inv_112020_65098.pif.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI inv_112020_65098.pif.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
inv_112020_65098.pif.exepid process 884 inv_112020_65098.pif.exe 884 inv_112020_65098.pif.exe 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 -
Suspicious behavior: MapViewOfSection 11 IoCs
Processes:
inv_112020_65098.pif.exepid process 884 inv_112020_65098.pif.exe 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1268 1268 1268 1268 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1268 1268 1268 1268 -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
inv_112020_65098.pif.exeregsvr32.exedescription pid process target process PID 2028 wrote to memory of 884 2028 inv_112020_65098.pif.exe inv_112020_65098.pif.exe PID 2028 wrote to memory of 884 2028 inv_112020_65098.pif.exe inv_112020_65098.pif.exe PID 2028 wrote to memory of 884 2028 inv_112020_65098.pif.exe inv_112020_65098.pif.exe PID 2028 wrote to memory of 884 2028 inv_112020_65098.pif.exe inv_112020_65098.pif.exe PID 2028 wrote to memory of 884 2028 inv_112020_65098.pif.exe inv_112020_65098.pif.exe PID 2028 wrote to memory of 884 2028 inv_112020_65098.pif.exe inv_112020_65098.pif.exe PID 1268 wrote to memory of 1996 1268 regsvr32.exe PID 1268 wrote to memory of 1996 1268 regsvr32.exe PID 1268 wrote to memory of 1996 1268 regsvr32.exe PID 1268 wrote to memory of 1996 1268 regsvr32.exe PID 1268 wrote to memory of 1996 1268 regsvr32.exe PID 1996 wrote to memory of 436 1996 regsvr32.exe regsvr32.exe PID 1996 wrote to memory of 436 1996 regsvr32.exe regsvr32.exe PID 1996 wrote to memory of 436 1996 regsvr32.exe regsvr32.exe PID 1996 wrote to memory of 436 1996 regsvr32.exe regsvr32.exe PID 1996 wrote to memory of 436 1996 regsvr32.exe regsvr32.exe PID 1996 wrote to memory of 436 1996 regsvr32.exe regsvr32.exe PID 1996 wrote to memory of 436 1996 regsvr32.exe regsvr32.exe PID 1268 wrote to memory of 336 1268 F1FE.exe PID 1268 wrote to memory of 336 1268 F1FE.exe PID 1268 wrote to memory of 336 1268 F1FE.exe PID 1268 wrote to memory of 336 1268 F1FE.exe PID 1268 wrote to memory of 628 1268 explorer.exe PID 1268 wrote to memory of 628 1268 explorer.exe PID 1268 wrote to memory of 628 1268 explorer.exe PID 1268 wrote to memory of 628 1268 explorer.exe PID 1268 wrote to memory of 628 1268 explorer.exe PID 1268 wrote to memory of 1312 1268 explorer.exe PID 1268 wrote to memory of 1312 1268 explorer.exe PID 1268 wrote to memory of 1312 1268 explorer.exe PID 1268 wrote to memory of 1312 1268 explorer.exe PID 1268 wrote to memory of 1988 1268 explorer.exe PID 1268 wrote to memory of 1988 1268 explorer.exe PID 1268 wrote to memory of 1988 1268 explorer.exe PID 1268 wrote to memory of 1988 1268 explorer.exe PID 1268 wrote to memory of 1988 1268 explorer.exe PID 1268 wrote to memory of 1692 1268 explorer.exe PID 1268 wrote to memory of 1692 1268 explorer.exe PID 1268 wrote to memory of 1692 1268 explorer.exe PID 1268 wrote to memory of 1692 1268 explorer.exe PID 1268 wrote to memory of 1692 1268 explorer.exe PID 1268 wrote to memory of 1244 1268 explorer.exe PID 1268 wrote to memory of 1244 1268 explorer.exe PID 1268 wrote to memory of 1244 1268 explorer.exe PID 1268 wrote to memory of 1244 1268 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\inv_112020_65098.pif.exe"C:\Users\Admin\AppData\Local\Temp\inv_112020_65098.pif.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\inv_112020_65098.pif.exe"C:\Users\Admin\AppData\Local\Temp\inv_112020_65098.pif.exe"2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:884
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\EA20.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\EA20.dll2⤵
- Loads dropped DLL
PID:436
-
-
C:\Users\Admin\AppData\Local\Temp\F1FE.exeC:\Users\Admin\AppData\Local\Temp\F1FE.exe1⤵
- Executes dropped EXE
PID:336
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:628
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1312
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1988
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1692
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1244
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e9468e28d01bad99d0cb9ad8a4bfe60a
SHA14b91dec1d0ad55372d11eb084a7e91ed3cc7dfa7
SHA2568bf0ee8a7e68a8e7b41ec6a54c7a0ef80ab28bcd55b27bffba99f2991950741a
SHA5129d5b5f6ad74e0cb3c041b28fcf3cc31beb67e57e883a1625c4c1261737ccd9d9bd12ab9367ffebda9e808c105dd16add85071d32be80b14ab3ff75fcae67474a
-
MD5
2f66e11030122a8e381f5806543f45a2
SHA18760dae8485027db5d36bfb634b438f1f433e842
SHA25630ce3fd6112a662fe576a70816ffab8f9c0b1cabe93ab14c1a5cd85d3a37b510
SHA512d9ee3eb3b21042a114b06fb3e949771662ae5e08a691336c8080f315640250e3f50f48127b5fab8ba8ad2298e9e97ff4bbe9dbea0022d48a9eb2ab566e726292
-
MD5
d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
MD5
e9468e28d01bad99d0cb9ad8a4bfe60a
SHA14b91dec1d0ad55372d11eb084a7e91ed3cc7dfa7
SHA2568bf0ee8a7e68a8e7b41ec6a54c7a0ef80ab28bcd55b27bffba99f2991950741a
SHA5129d5b5f6ad74e0cb3c041b28fcf3cc31beb67e57e883a1625c4c1261737ccd9d9bd12ab9367ffebda9e808c105dd16add85071d32be80b14ab3ff75fcae67474a