Analysis
-
max time kernel
97s -
max time network
123s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
11-01-2021 11:32
Static task
static1
Behavioral task
behavioral1
Sample
swift 0182021.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
swift 0182021.xls
Resource
win10v20201028
General
-
Target
swift 0182021.xls
-
Size
215KB
-
MD5
d5185ca33c490e907fc4fa6b22558890
-
SHA1
151f729d65c4241ccde8e7055b57d1176d29198d
-
SHA256
eaa14ff5cdf3ec428bd1b0c2689272996741a4c93f3c1289934057c3c5cafc78
-
SHA512
b214da4e9284615faebdd60fd45f8f161aabc06428ac40f0cd8ec83a870dd225dfbe9795a6d8e1e192734f748a92b5d7da6f436325e8de60ed4e46fcd41dcbbf
Malware Config
Extracted
lokibot
http://worldpackmx.com/fretyuil/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 8 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe modiloader_stage1 \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe modiloader_stage1 \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe modiloader_stage1 \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe modiloader_stage1 \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe modiloader_stage1 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe modiloader_stage1 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe modiloader_stage1 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe modiloader_stage1 -
Executes dropped EXE 2 IoCs
Processes:
CLIDSXX.exeCLIDSXX.exepid process 1208 CLIDSXX.exe 1600 CLIDSXX.exe -
Loads dropped DLL 5 IoCs
Processes:
EXCEL.EXEpid process 1068 EXCEL.EXE 1068 EXCEL.EXE 1068 EXCEL.EXE 1068 EXCEL.EXE 1068 EXCEL.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
CLIDSXX.exedescription pid process target process PID 1208 set thread context of 1600 1208 CLIDSXX.exe CLIDSXX.exe -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 18 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1068 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
CLIDSXX.exedescription pid process Token: SeDebugPrivilege 1600 CLIDSXX.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 1068 EXCEL.EXE 1068 EXCEL.EXE 1068 EXCEL.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
EXCEL.EXECLIDSXX.exedescription pid process target process PID 1068 wrote to memory of 1208 1068 EXCEL.EXE CLIDSXX.exe PID 1068 wrote to memory of 1208 1068 EXCEL.EXE CLIDSXX.exe PID 1068 wrote to memory of 1208 1068 EXCEL.EXE CLIDSXX.exe PID 1068 wrote to memory of 1208 1068 EXCEL.EXE CLIDSXX.exe PID 1208 wrote to memory of 1600 1208 CLIDSXX.exe CLIDSXX.exe PID 1208 wrote to memory of 1600 1208 CLIDSXX.exe CLIDSXX.exe PID 1208 wrote to memory of 1600 1208 CLIDSXX.exe CLIDSXX.exe PID 1208 wrote to memory of 1600 1208 CLIDSXX.exe CLIDSXX.exe PID 1208 wrote to memory of 1600 1208 CLIDSXX.exe CLIDSXX.exe PID 1208 wrote to memory of 1600 1208 CLIDSXX.exe CLIDSXX.exe PID 1208 wrote to memory of 1600 1208 CLIDSXX.exe CLIDSXX.exe PID 1208 wrote to memory of 1600 1208 CLIDSXX.exe CLIDSXX.exe PID 1208 wrote to memory of 1600 1208 CLIDSXX.exe CLIDSXX.exe PID 1208 wrote to memory of 1600 1208 CLIDSXX.exe CLIDSXX.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\swift 0182021.xls"1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4MD5
360fbabd1b026cecf94e2727287b802a
SHA10f4e121a315d0fe1ff85b8252d3d863a4d828f49
SHA256da6164e0668bfc439fb6f2f94070fed5f8cf8fe278cff65902f3a560c9b7efe2
SHA5122de4e4c0147c74e59b39fc6bcc4c036e59946cbb4214f23af49846f036cd323f8ca176532e4e6d21470923e9133783195743965fe7aae14abf5649b1edee6431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4MD5
6afe3b70b924730791a5051510faba9a
SHA12859b54e7207d1ebc21a0c84da039ef0cb5a8d4d
SHA256c1bf94b838a659c7b83e1bab3745dd1dedce59ab8bec8185d1e52486470de426
SHA512548d032ebf1ee07693e768518d1788b5ec98045d561155947d49910e095a708febe57d81f2397688deb3ac1ee86657b17dec9c6208822ef4bf907941e39d8186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
69653a219a74a70c7c80e4a4cd17b063
SHA153d745f16b44f72c232440920e6f47da31045049
SHA256ffbce7291032c88fce8a90c336c8fbe9ee35515b964e5ca89d6a2e8741fc2a24
SHA512aad20214aa45c46fad62819f18979bfc268fdb9656e0f04c4d25675935fa5569be107df8a1fdc08a82501657f5c9fa3c9cb82622e12402354d4c6d40e6483089
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exeMD5
d684fa1626b63d9a17c8818a63a23975
SHA158b118874ca88dc269d7345fa84fb33e3e42aab7
SHA25602944dc72a15e92ec94c453c74c9564cb59ac7717dffcb25fa854a2e587fb737
SHA5125f3a889a73b8ace63b9d48518871a0effb65d3581d4fce0bea28576ffdccef6a5d4f8d974f87bf6047ea514748ed88f52572eea8053b4bf4e17e373725ade20b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exeMD5
d684fa1626b63d9a17c8818a63a23975
SHA158b118874ca88dc269d7345fa84fb33e3e42aab7
SHA25602944dc72a15e92ec94c453c74c9564cb59ac7717dffcb25fa854a2e587fb737
SHA5125f3a889a73b8ace63b9d48518871a0effb65d3581d4fce0bea28576ffdccef6a5d4f8d974f87bf6047ea514748ed88f52572eea8053b4bf4e17e373725ade20b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exeMD5
d684fa1626b63d9a17c8818a63a23975
SHA158b118874ca88dc269d7345fa84fb33e3e42aab7
SHA25602944dc72a15e92ec94c453c74c9564cb59ac7717dffcb25fa854a2e587fb737
SHA5125f3a889a73b8ace63b9d48518871a0effb65d3581d4fce0bea28576ffdccef6a5d4f8d974f87bf6047ea514748ed88f52572eea8053b4bf4e17e373725ade20b
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exeMD5
d684fa1626b63d9a17c8818a63a23975
SHA158b118874ca88dc269d7345fa84fb33e3e42aab7
SHA25602944dc72a15e92ec94c453c74c9564cb59ac7717dffcb25fa854a2e587fb737
SHA5125f3a889a73b8ace63b9d48518871a0effb65d3581d4fce0bea28576ffdccef6a5d4f8d974f87bf6047ea514748ed88f52572eea8053b4bf4e17e373725ade20b
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exeMD5
d684fa1626b63d9a17c8818a63a23975
SHA158b118874ca88dc269d7345fa84fb33e3e42aab7
SHA25602944dc72a15e92ec94c453c74c9564cb59ac7717dffcb25fa854a2e587fb737
SHA5125f3a889a73b8ace63b9d48518871a0effb65d3581d4fce0bea28576ffdccef6a5d4f8d974f87bf6047ea514748ed88f52572eea8053b4bf4e17e373725ade20b
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exeMD5
d684fa1626b63d9a17c8818a63a23975
SHA158b118874ca88dc269d7345fa84fb33e3e42aab7
SHA25602944dc72a15e92ec94c453c74c9564cb59ac7717dffcb25fa854a2e587fb737
SHA5125f3a889a73b8ace63b9d48518871a0effb65d3581d4fce0bea28576ffdccef6a5d4f8d974f87bf6047ea514748ed88f52572eea8053b4bf4e17e373725ade20b
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exeMD5
d684fa1626b63d9a17c8818a63a23975
SHA158b118874ca88dc269d7345fa84fb33e3e42aab7
SHA25602944dc72a15e92ec94c453c74c9564cb59ac7717dffcb25fa854a2e587fb737
SHA5125f3a889a73b8ace63b9d48518871a0effb65d3581d4fce0bea28576ffdccef6a5d4f8d974f87bf6047ea514748ed88f52572eea8053b4bf4e17e373725ade20b
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exeMD5
d684fa1626b63d9a17c8818a63a23975
SHA158b118874ca88dc269d7345fa84fb33e3e42aab7
SHA25602944dc72a15e92ec94c453c74c9564cb59ac7717dffcb25fa854a2e587fb737
SHA5125f3a889a73b8ace63b9d48518871a0effb65d3581d4fce0bea28576ffdccef6a5d4f8d974f87bf6047ea514748ed88f52572eea8053b4bf4e17e373725ade20b
-
memory/1208-8-0x0000000000000000-mapping.dmp
-
memory/1600-15-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1600-16-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1600-14-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1600-18-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1600-19-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1600-20-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1600-21-0x00000000004139DE-mapping.dmp
-
memory/1964-2-0x000007FEF7E60000-0x000007FEF80DA000-memory.dmpFilesize
2.5MB