Analysis
-
max time kernel
67s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
23-11-2020 18:36
Static task
static1
Behavioral task
behavioral1
Sample
inv_112020_65098.pif.exe
Resource
win7v20201028
General
-
Target
inv_112020_65098.pif.exe
-
Size
656KB
-
MD5
6e5017e2d0407e74578d1121233da979
-
SHA1
be9ad4ab667f1e8be4ad4848ad852d5a72aa4234
-
SHA256
7af038d2f4f41c0d130aaa1e4557d821e2b7f4c6bda2be44300e229cd5c721df
-
SHA512
b1f8e67c5373aef0e7997d2c4392078aa7f7f28b975fad0e06319a524a59ec98d328fd60438b00f05b6c16b6142065d995e1b88512fdd9e02839990407b15e61
Malware Config
Extracted
smokeloader
2020
http://penodux.com/xsmkld/index.php
http://tommusikirtyur.com/xsmkld/index.php
http://ploaernysannyer.com/xsmkld/index.php
http://dersmasfannyer.com/xsmkld/index.php
http://derdsgdannyer.com/xsmkld/index.php
Extracted
dridex
10444
175.126.167.148:443
173.249.20.233:8043
162.241.204.233:4443
138.122.143.40:8043
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\9253.dll cryptone \Users\Admin\AppData\Local\Temp\9253.dll cryptone -
Processes:
resource yara_rule behavioral2/memory/1928-11-0x0000000004340000-0x000000000437D000-memory.dmp dridex_ldr behavioral2/memory/4000-73-0x0000000010000000-0x000000001001D000-memory.dmp dridex_ldr -
Executes dropped EXE 1 IoCs
Processes:
98EB.exepid process 4000 98EB.exe -
Deletes itself 1 IoCs
Processes:
pid process 2828 -
Loads dropped DLL 2 IoCs
Processes:
inv_112020_65098.pif.exeregsvr32.exepid process 1640 inv_112020_65098.pif.exe 1928 regsvr32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
inv_112020_65098.pif.exedescription pid process target process PID 3372 set thread context of 1640 3372 inv_112020_65098.pif.exe inv_112020_65098.pif.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
inv_112020_65098.pif.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI inv_112020_65098.pif.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI inv_112020_65098.pif.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI inv_112020_65098.pif.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
inv_112020_65098.pif.exepid process 1640 inv_112020_65098.pif.exe 1640 inv_112020_65098.pif.exe 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 -
Suspicious behavior: MapViewOfSection 21 IoCs
Processes:
inv_112020_65098.pif.exepid process 1640 inv_112020_65098.pif.exe 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 2828 -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
inv_112020_65098.pif.exeregsvr32.exedescription pid process target process PID 3372 wrote to memory of 1640 3372 inv_112020_65098.pif.exe inv_112020_65098.pif.exe PID 3372 wrote to memory of 1640 3372 inv_112020_65098.pif.exe inv_112020_65098.pif.exe PID 3372 wrote to memory of 1640 3372 inv_112020_65098.pif.exe inv_112020_65098.pif.exe PID 3372 wrote to memory of 1640 3372 inv_112020_65098.pif.exe inv_112020_65098.pif.exe PID 3372 wrote to memory of 1640 3372 inv_112020_65098.pif.exe inv_112020_65098.pif.exe PID 2828 wrote to memory of 2640 2828 regsvr32.exe PID 2828 wrote to memory of 2640 2828 regsvr32.exe PID 2640 wrote to memory of 1928 2640 regsvr32.exe regsvr32.exe PID 2640 wrote to memory of 1928 2640 regsvr32.exe regsvr32.exe PID 2640 wrote to memory of 1928 2640 regsvr32.exe regsvr32.exe PID 2828 wrote to memory of 4000 2828 98EB.exe PID 2828 wrote to memory of 4000 2828 98EB.exe PID 2828 wrote to memory of 4000 2828 98EB.exe PID 2828 wrote to memory of 4076 2828 explorer.exe PID 2828 wrote to memory of 4076 2828 explorer.exe PID 2828 wrote to memory of 4076 2828 explorer.exe PID 2828 wrote to memory of 4076 2828 explorer.exe PID 2828 wrote to memory of 976 2828 explorer.exe PID 2828 wrote to memory of 976 2828 explorer.exe PID 2828 wrote to memory of 976 2828 explorer.exe PID 2828 wrote to memory of 2080 2828 explorer.exe PID 2828 wrote to memory of 2080 2828 explorer.exe PID 2828 wrote to memory of 2080 2828 explorer.exe PID 2828 wrote to memory of 2080 2828 explorer.exe PID 2828 wrote to memory of 3852 2828 explorer.exe PID 2828 wrote to memory of 3852 2828 explorer.exe PID 2828 wrote to memory of 3852 2828 explorer.exe PID 2828 wrote to memory of 3852 2828 explorer.exe PID 2828 wrote to memory of 2276 2828 explorer.exe PID 2828 wrote to memory of 2276 2828 explorer.exe PID 2828 wrote to memory of 2276 2828 explorer.exe PID 2828 wrote to memory of 3132 2828 explorer.exe PID 2828 wrote to memory of 3132 2828 explorer.exe PID 2828 wrote to memory of 3132 2828 explorer.exe PID 2828 wrote to memory of 3132 2828 explorer.exe PID 2828 wrote to memory of 2680 2828 explorer.exe PID 2828 wrote to memory of 2680 2828 explorer.exe PID 2828 wrote to memory of 2680 2828 explorer.exe PID 2828 wrote to memory of 3140 2828 explorer.exe PID 2828 wrote to memory of 3140 2828 explorer.exe PID 2828 wrote to memory of 3140 2828 explorer.exe PID 2828 wrote to memory of 3140 2828 explorer.exe PID 2828 wrote to memory of 1044 2828 explorer.exe PID 2828 wrote to memory of 1044 2828 explorer.exe PID 2828 wrote to memory of 1044 2828 explorer.exe PID 2828 wrote to memory of 1044 2828 explorer.exe PID 2828 wrote to memory of 1712 2828 explorer.exe PID 2828 wrote to memory of 1712 2828 explorer.exe PID 2828 wrote to memory of 1712 2828 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\inv_112020_65098.pif.exe"C:\Users\Admin\AppData\Local\Temp\inv_112020_65098.pif.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\inv_112020_65098.pif.exe"C:\Users\Admin\AppData\Local\Temp\inv_112020_65098.pif.exe"2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1640
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\9253.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\9253.dll2⤵
- Loads dropped DLL
PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\98EB.exeC:\Users\Admin\AppData\Local\Temp\98EB.exe1⤵
- Executes dropped EXE
PID:4000
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4076
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:976
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2080
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3852
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2276
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3132
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2680
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3140
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1044
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e9468e28d01bad99d0cb9ad8a4bfe60a
SHA14b91dec1d0ad55372d11eb084a7e91ed3cc7dfa7
SHA2568bf0ee8a7e68a8e7b41ec6a54c7a0ef80ab28bcd55b27bffba99f2991950741a
SHA5129d5b5f6ad74e0cb3c041b28fcf3cc31beb67e57e883a1625c4c1261737ccd9d9bd12ab9367ffebda9e808c105dd16add85071d32be80b14ab3ff75fcae67474a
-
MD5
2f66e11030122a8e381f5806543f45a2
SHA18760dae8485027db5d36bfb634b438f1f433e842
SHA25630ce3fd6112a662fe576a70816ffab8f9c0b1cabe93ab14c1a5cd85d3a37b510
SHA512d9ee3eb3b21042a114b06fb3e949771662ae5e08a691336c8080f315640250e3f50f48127b5fab8ba8ad2298e9e97ff4bbe9dbea0022d48a9eb2ab566e726292
-
MD5
2f66e11030122a8e381f5806543f45a2
SHA18760dae8485027db5d36bfb634b438f1f433e842
SHA25630ce3fd6112a662fe576a70816ffab8f9c0b1cabe93ab14c1a5cd85d3a37b510
SHA512d9ee3eb3b21042a114b06fb3e949771662ae5e08a691336c8080f315640250e3f50f48127b5fab8ba8ad2298e9e97ff4bbe9dbea0022d48a9eb2ab566e726292
-
MD5
50741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
MD5
e9468e28d01bad99d0cb9ad8a4bfe60a
SHA14b91dec1d0ad55372d11eb084a7e91ed3cc7dfa7
SHA2568bf0ee8a7e68a8e7b41ec6a54c7a0ef80ab28bcd55b27bffba99f2991950741a
SHA5129d5b5f6ad74e0cb3c041b28fcf3cc31beb67e57e883a1625c4c1261737ccd9d9bd12ab9367ffebda9e808c105dd16add85071d32be80b14ab3ff75fcae67474a