Analysis
-
max time kernel
138s -
max time network
131s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
11-01-2021 11:32
Static task
static1
Behavioral task
behavioral1
Sample
swift 0182021.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
swift 0182021.xls
Resource
win10v20201028
General
-
Target
swift 0182021.xls
-
Size
215KB
-
MD5
d5185ca33c490e907fc4fa6b22558890
-
SHA1
151f729d65c4241ccde8e7055b57d1176d29198d
-
SHA256
eaa14ff5cdf3ec428bd1b0c2689272996741a4c93f3c1289934057c3c5cafc78
-
SHA512
b214da4e9284615faebdd60fd45f8f161aabc06428ac40f0cd8ec83a870dd225dfbe9795a6d8e1e192734f748a92b5d7da6f436325e8de60ed4e46fcd41dcbbf
Malware Config
Extracted
lokibot
http://worldpackmx.com/fretyuil/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe modiloader_stage1 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe modiloader_stage1 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe modiloader_stage1 -
Executes dropped EXE 2 IoCs
Processes:
CLIDSXX.exeCLIDSXX.exepid process 3464 CLIDSXX.exe 2176 CLIDSXX.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
CLIDSXX.exedescription pid process target process PID 3464 set thread context of 2176 3464 CLIDSXX.exe CLIDSXX.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 3940 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
CLIDSXX.exedescription pid process Token: SeDebugPrivilege 2176 CLIDSXX.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
EXCEL.EXECLIDSXX.exedescription pid process target process PID 3940 wrote to memory of 3464 3940 EXCEL.EXE CLIDSXX.exe PID 3940 wrote to memory of 3464 3940 EXCEL.EXE CLIDSXX.exe PID 3940 wrote to memory of 3464 3940 EXCEL.EXE CLIDSXX.exe PID 3464 wrote to memory of 2176 3464 CLIDSXX.exe CLIDSXX.exe PID 3464 wrote to memory of 2176 3464 CLIDSXX.exe CLIDSXX.exe PID 3464 wrote to memory of 2176 3464 CLIDSXX.exe CLIDSXX.exe PID 3464 wrote to memory of 2176 3464 CLIDSXX.exe CLIDSXX.exe PID 3464 wrote to memory of 2176 3464 CLIDSXX.exe CLIDSXX.exe PID 3464 wrote to memory of 2176 3464 CLIDSXX.exe CLIDSXX.exe PID 3464 wrote to memory of 2176 3464 CLIDSXX.exe CLIDSXX.exe PID 3464 wrote to memory of 2176 3464 CLIDSXX.exe CLIDSXX.exe PID 3464 wrote to memory of 2176 3464 CLIDSXX.exe CLIDSXX.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\swift 0182021.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4MD5
360fbabd1b026cecf94e2727287b802a
SHA10f4e121a315d0fe1ff85b8252d3d863a4d828f49
SHA256da6164e0668bfc439fb6f2f94070fed5f8cf8fe278cff65902f3a560c9b7efe2
SHA5122de4e4c0147c74e59b39fc6bcc4c036e59946cbb4214f23af49846f036cd323f8ca176532e4e6d21470923e9133783195743965fe7aae14abf5649b1edee6431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4MD5
eb2c8fd894014a019dc3c22479a961ff
SHA1b0976d5b26a6d33c74da2f53210dc453cead62b3
SHA2564305b508d9eda048b65c6a6ba33293f2aef7fde88b6ee55a1db0a03d83a08804
SHA512e3b5d989b776fabb3f71aec75071a327b9f02491f84ea7004c439327bb85c1ee9767acdef6e3a1284e432ebb1d9a68d2a7b5119662d330f852d2e1416abdf10f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exeMD5
d684fa1626b63d9a17c8818a63a23975
SHA158b118874ca88dc269d7345fa84fb33e3e42aab7
SHA25602944dc72a15e92ec94c453c74c9564cb59ac7717dffcb25fa854a2e587fb737
SHA5125f3a889a73b8ace63b9d48518871a0effb65d3581d4fce0bea28576ffdccef6a5d4f8d974f87bf6047ea514748ed88f52572eea8053b4bf4e17e373725ade20b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exeMD5
d684fa1626b63d9a17c8818a63a23975
SHA158b118874ca88dc269d7345fa84fb33e3e42aab7
SHA25602944dc72a15e92ec94c453c74c9564cb59ac7717dffcb25fa854a2e587fb737
SHA5125f3a889a73b8ace63b9d48518871a0effb65d3581d4fce0bea28576ffdccef6a5d4f8d974f87bf6047ea514748ed88f52572eea8053b4bf4e17e373725ade20b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CLIDSXX.exeMD5
d684fa1626b63d9a17c8818a63a23975
SHA158b118874ca88dc269d7345fa84fb33e3e42aab7
SHA25602944dc72a15e92ec94c453c74c9564cb59ac7717dffcb25fa854a2e587fb737
SHA5125f3a889a73b8ace63b9d48518871a0effb65d3581d4fce0bea28576ffdccef6a5d4f8d974f87bf6047ea514748ed88f52572eea8053b4bf4e17e373725ade20b
-
memory/2176-8-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/2176-9-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/2176-10-0x00000000004139DE-mapping.dmp
-
memory/3464-3-0x0000000000000000-mapping.dmp
-
memory/3940-2-0x00007FF8E8ED0000-0x00007FF8E9507000-memory.dmpFilesize
6.2MB