Analysis
-
max time kernel
106s -
max time network
132s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
11-01-2021 11:22
Static task
static1
Behavioral task
behavioral1
Sample
swift 0182021.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
swift 0182021.xls
Resource
win10v20201028
General
-
Target
swift 0182021.xls
-
Size
215KB
-
MD5
d5185ca33c490e907fc4fa6b22558890
-
SHA1
151f729d65c4241ccde8e7055b57d1176d29198d
-
SHA256
eaa14ff5cdf3ec428bd1b0c2689272996741a4c93f3c1289934057c3c5cafc78
-
SHA512
b214da4e9284615faebdd60fd45f8f161aabc06428ac40f0cd8ec83a870dd225dfbe9795a6d8e1e192734f748a92b5d7da6f436325e8de60ed4e46fcd41dcbbf
Malware Config
Extracted
lokibot
http://worldpackmx.com/fretyuil/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe modiloader_stage1 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe modiloader_stage1 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe modiloader_stage1 -
ServiceHost packer 1 IoCs
Detects ServiceHost packer used for .NET malware
Processes:
resource yara_rule behavioral2/memory/884-12-0x00007FF748C90000-0x00007FF74C246000-memory.dmp servicehost -
Executes dropped EXE 2 IoCs
Processes:
CLIDSXX.exeCLIDSXX.exepid process 508 CLIDSXX.exe 1644 CLIDSXX.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
CLIDSXX.exedescription pid process target process PID 508 set thread context of 1644 508 CLIDSXX.exe CLIDSXX.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 37 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 38 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 884 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
CLIDSXX.exedescription pid process Token: SeDebugPrivilege 1644 CLIDSXX.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 884 EXCEL.EXE 884 EXCEL.EXE 884 EXCEL.EXE 884 EXCEL.EXE 884 EXCEL.EXE 884 EXCEL.EXE 884 EXCEL.EXE 884 EXCEL.EXE 884 EXCEL.EXE 884 EXCEL.EXE 884 EXCEL.EXE 884 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
EXCEL.EXECLIDSXX.exedescription pid process target process PID 884 wrote to memory of 508 884 EXCEL.EXE CLIDSXX.exe PID 884 wrote to memory of 508 884 EXCEL.EXE CLIDSXX.exe PID 884 wrote to memory of 508 884 EXCEL.EXE CLIDSXX.exe PID 508 wrote to memory of 1644 508 CLIDSXX.exe CLIDSXX.exe PID 508 wrote to memory of 1644 508 CLIDSXX.exe CLIDSXX.exe PID 508 wrote to memory of 1644 508 CLIDSXX.exe CLIDSXX.exe PID 508 wrote to memory of 1644 508 CLIDSXX.exe CLIDSXX.exe PID 508 wrote to memory of 1644 508 CLIDSXX.exe CLIDSXX.exe PID 508 wrote to memory of 1644 508 CLIDSXX.exe CLIDSXX.exe PID 508 wrote to memory of 1644 508 CLIDSXX.exe CLIDSXX.exe PID 508 wrote to memory of 1644 508 CLIDSXX.exe CLIDSXX.exe PID 508 wrote to memory of 1644 508 CLIDSXX.exe CLIDSXX.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\swift 0182021.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4MD5
360fbabd1b026cecf94e2727287b802a
SHA10f4e121a315d0fe1ff85b8252d3d863a4d828f49
SHA256da6164e0668bfc439fb6f2f94070fed5f8cf8fe278cff65902f3a560c9b7efe2
SHA5122de4e4c0147c74e59b39fc6bcc4c036e59946cbb4214f23af49846f036cd323f8ca176532e4e6d21470923e9133783195743965fe7aae14abf5649b1edee6431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4MD5
5f774d4a33bd47e4d9daf80e22eedf21
SHA134f06f0274d9cfad288d1f6f95a0cde7c278a5fb
SHA2569e72c96881c3f7ac19eabc60275ddfc1a6368dca60e5ec45d90700017a9c9f0f
SHA512f3b7087bee143258cbf2325f02d7c64c792c77b1733becd35457634074b2047ef44a559feaa676003a64856cdefbd409d83b40b1862d9f837b31bd565338e645
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exeMD5
d684fa1626b63d9a17c8818a63a23975
SHA158b118874ca88dc269d7345fa84fb33e3e42aab7
SHA25602944dc72a15e92ec94c453c74c9564cb59ac7717dffcb25fa854a2e587fb737
SHA5125f3a889a73b8ace63b9d48518871a0effb65d3581d4fce0bea28576ffdccef6a5d4f8d974f87bf6047ea514748ed88f52572eea8053b4bf4e17e373725ade20b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exeMD5
d684fa1626b63d9a17c8818a63a23975
SHA158b118874ca88dc269d7345fa84fb33e3e42aab7
SHA25602944dc72a15e92ec94c453c74c9564cb59ac7717dffcb25fa854a2e587fb737
SHA5125f3a889a73b8ace63b9d48518871a0effb65d3581d4fce0bea28576ffdccef6a5d4f8d974f87bf6047ea514748ed88f52572eea8053b4bf4e17e373725ade20b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exeMD5
d684fa1626b63d9a17c8818a63a23975
SHA158b118874ca88dc269d7345fa84fb33e3e42aab7
SHA25602944dc72a15e92ec94c453c74c9564cb59ac7717dffcb25fa854a2e587fb737
SHA5125f3a889a73b8ace63b9d48518871a0effb65d3581d4fce0bea28576ffdccef6a5d4f8d974f87bf6047ea514748ed88f52572eea8053b4bf4e17e373725ade20b
-
memory/508-3-0x0000000000000000-mapping.dmp
-
memory/884-2-0x00007FFA6A5E0000-0x00007FFA6AC17000-memory.dmpFilesize
6.2MB
-
memory/884-12-0x00007FF748C90000-0x00007FF74C246000-memory.dmpFilesize
53.7MB
-
memory/1644-8-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1644-9-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1644-10-0x00000000004139DE-mapping.dmp