Resubmissions
09-01-2022 14:33
220109-rwxq5sdhcr 1009-01-2022 14:06
220109-rejg7aded7 1009-01-2022 08:20
220109-j8fz6addd9 10Analysis
-
max time kernel
151s -
max time network
134s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09-01-2022 08:20
Static task
static1
Behavioral task
behavioral1
Sample
59ddabdcb5b43bbc66bbec89123d2627.exe
Resource
win7-en-20211208
General
-
Target
59ddabdcb5b43bbc66bbec89123d2627.exe
-
Size
265KB
-
MD5
59ddabdcb5b43bbc66bbec89123d2627
-
SHA1
6c33dde51d6b45319ad99408c10f6ad8b1340e2f
-
SHA256
2d0bd38ea59864cdcd710759abea3f670449eb4505b54c8a8d22128691deefc1
-
SHA512
56463528dc37c141519535140a24d0ce02ca2227ef8c302494e422109e5d6b83a5d6ac5f2b698838e29661cd9dd986d9a2dc0f7c3c4f025f5283cebca052b8b3
Malware Config
Extracted
smokeloader
2020
http://nahbleiben.at/upload/
http://noblecreativeaz.com/upload/
http://tvqaq.cn/upload/
http://recmaster.ru/upload/
http://sovels.ru/upload/
Extracted
danabot
4
192.119.110.4:443
103.175.16.113:443
-
embedded_hash
422236FD601D11EE82825A484D26DD6F
-
type
loader
Signatures
-
Danabot Loader Component 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\E8E5.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\E8E5.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\E8E5.exe.dll DanabotLoader2021 behavioral2/memory/2636-133-0x00000000041A0000-0x00000000042F1000-memory.dmp DanabotLoader2021 C:\Users\Admin\AppData\Local\Temp\6BF.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\6BF.exe.dll DanabotLoader2021 -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
E8E5.exe6BF.exepid process 2276 E8E5.exe 1416 6BF.exe -
Deletes itself 1 IoCs
Processes:
pid process 2072 -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exepid process 2636 rundll32.exe 2636 rundll32.exe 704 rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
59ddabdcb5b43bbc66bbec89123d2627.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 59ddabdcb5b43bbc66bbec89123d2627.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 59ddabdcb5b43bbc66bbec89123d2627.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 59ddabdcb5b43bbc66bbec89123d2627.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
59ddabdcb5b43bbc66bbec89123d2627.exepid process 3556 59ddabdcb5b43bbc66bbec89123d2627.exe 3556 59ddabdcb5b43bbc66bbec89123d2627.exe 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 2072 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2072 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
59ddabdcb5b43bbc66bbec89123d2627.exepid process 3556 59ddabdcb5b43bbc66bbec89123d2627.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
E8E5.exe6BF.exedescription pid process target process PID 2072 wrote to memory of 2276 2072 E8E5.exe PID 2072 wrote to memory of 2276 2072 E8E5.exe PID 2072 wrote to memory of 2276 2072 E8E5.exe PID 2072 wrote to memory of 1416 2072 6BF.exe PID 2072 wrote to memory of 1416 2072 6BF.exe PID 2072 wrote to memory of 1416 2072 6BF.exe PID 2276 wrote to memory of 2636 2276 E8E5.exe rundll32.exe PID 2276 wrote to memory of 2636 2276 E8E5.exe rundll32.exe PID 2276 wrote to memory of 2636 2276 E8E5.exe rundll32.exe PID 1416 wrote to memory of 704 1416 6BF.exe rundll32.exe PID 1416 wrote to memory of 704 1416 6BF.exe rundll32.exe PID 1416 wrote to memory of 704 1416 6BF.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59ddabdcb5b43bbc66bbec89123d2627.exe"C:\Users\Admin\AppData\Local\Temp\59ddabdcb5b43bbc66bbec89123d2627.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\E8E5.exeC:\Users\Admin\AppData\Local\Temp\E8E5.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\E8E5.exe.dll,z C:\Users\Admin\AppData\Local\Temp\E8E5.exe2⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\6BF.exeC:\Users\Admin\AppData\Local\Temp\6BF.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\6BF.exe.dll,z C:\Users\Admin\AppData\Local\Temp\6BF.exe2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6BF.exeMD5
f601ad405d65674d3fdd6d9625770487
SHA12d5a12ef12b560d3bb634fa37d78951169113949
SHA2562a009cecbb0b5f61ac6956e12a8ffd880a5c6c5fcce207d48a39dec829daff6d
SHA5121347e26b67ed12d3173196aaca8e9fcad5bb8f6ed17e0482c5b5e33ddbecb19b954d46fcea4ff9e07e7d116b2c3ba351a1ce3aae294e4ce9e176797115a8171f
-
C:\Users\Admin\AppData\Local\Temp\6BF.exeMD5
f601ad405d65674d3fdd6d9625770487
SHA12d5a12ef12b560d3bb634fa37d78951169113949
SHA2562a009cecbb0b5f61ac6956e12a8ffd880a5c6c5fcce207d48a39dec829daff6d
SHA5121347e26b67ed12d3173196aaca8e9fcad5bb8f6ed17e0482c5b5e33ddbecb19b954d46fcea4ff9e07e7d116b2c3ba351a1ce3aae294e4ce9e176797115a8171f
-
C:\Users\Admin\AppData\Local\Temp\6BF.exe.dllMD5
12cea97c5ccddf9b6f5b27f24de751ab
SHA13d5bbc18d79f3c6ac7f5ac3e7339c933d5ce1688
SHA2564dbe786bf280ffd7d6f9c34eb4ce7f3f358520d7763454b2115dd7ce6ead4659
SHA51236301621111b8678182d966fa89b51448f089d10758310ee2b11d04c9483c2a988de962f04ab345b82f45bbe0998b3a22df01f587cc71dc0fca475b72df5eda3
-
C:\Users\Admin\AppData\Local\Temp\E8E5.exeMD5
f601ad405d65674d3fdd6d9625770487
SHA12d5a12ef12b560d3bb634fa37d78951169113949
SHA2562a009cecbb0b5f61ac6956e12a8ffd880a5c6c5fcce207d48a39dec829daff6d
SHA5121347e26b67ed12d3173196aaca8e9fcad5bb8f6ed17e0482c5b5e33ddbecb19b954d46fcea4ff9e07e7d116b2c3ba351a1ce3aae294e4ce9e176797115a8171f
-
C:\Users\Admin\AppData\Local\Temp\E8E5.exeMD5
f601ad405d65674d3fdd6d9625770487
SHA12d5a12ef12b560d3bb634fa37d78951169113949
SHA2562a009cecbb0b5f61ac6956e12a8ffd880a5c6c5fcce207d48a39dec829daff6d
SHA5121347e26b67ed12d3173196aaca8e9fcad5bb8f6ed17e0482c5b5e33ddbecb19b954d46fcea4ff9e07e7d116b2c3ba351a1ce3aae294e4ce9e176797115a8171f
-
C:\Users\Admin\AppData\Local\Temp\E8E5.exe.dllMD5
474352d90b151dce6d9b324fb2b3a414
SHA15799bb2e66eead0200443590fc506bcb0c5de061
SHA256dad6f665ddd690b95b91428f312d3f958380240249fac2ff4d936d4d5af1b456
SHA5123503ee76dbeccac6339d9340610eb9ad23ff82f74bb56eb34e4892187a2609ae6f45056862ea5a816ef922d0bfd624f4133708dd2a1a27e968677ed8c0935979
-
\Users\Admin\AppData\Local\Temp\6BF.exe.dllMD5
12cea97c5ccddf9b6f5b27f24de751ab
SHA13d5bbc18d79f3c6ac7f5ac3e7339c933d5ce1688
SHA2564dbe786bf280ffd7d6f9c34eb4ce7f3f358520d7763454b2115dd7ce6ead4659
SHA51236301621111b8678182d966fa89b51448f089d10758310ee2b11d04c9483c2a988de962f04ab345b82f45bbe0998b3a22df01f587cc71dc0fca475b72df5eda3
-
\Users\Admin\AppData\Local\Temp\E8E5.exe.dllMD5
474352d90b151dce6d9b324fb2b3a414
SHA15799bb2e66eead0200443590fc506bcb0c5de061
SHA256dad6f665ddd690b95b91428f312d3f958380240249fac2ff4d936d4d5af1b456
SHA5123503ee76dbeccac6339d9340610eb9ad23ff82f74bb56eb34e4892187a2609ae6f45056862ea5a816ef922d0bfd624f4133708dd2a1a27e968677ed8c0935979
-
\Users\Admin\AppData\Local\Temp\E8E5.exe.dllMD5
474352d90b151dce6d9b324fb2b3a414
SHA15799bb2e66eead0200443590fc506bcb0c5de061
SHA256dad6f665ddd690b95b91428f312d3f958380240249fac2ff4d936d4d5af1b456
SHA5123503ee76dbeccac6339d9340610eb9ad23ff82f74bb56eb34e4892187a2609ae6f45056862ea5a816ef922d0bfd624f4133708dd2a1a27e968677ed8c0935979
-
memory/704-134-0x0000000000000000-mapping.dmp
-
memory/1416-125-0x0000000000000000-mapping.dmp
-
memory/1416-128-0x0000000000400000-0x0000000002C54000-memory.dmpFilesize
40.3MB
-
memory/2072-118-0x0000000000DF0000-0x0000000000E06000-memory.dmpFilesize
88KB
-
memory/2276-123-0x0000000004AA0000-0x0000000004B9C000-memory.dmpFilesize
1008KB
-
memory/2276-122-0x00000000049B0000-0x0000000004A94000-memory.dmpFilesize
912KB
-
memory/2276-124-0x0000000000400000-0x0000000002C54000-memory.dmpFilesize
40.3MB
-
memory/2276-119-0x0000000000000000-mapping.dmp
-
memory/2636-129-0x0000000000000000-mapping.dmp
-
memory/2636-133-0x00000000041A0000-0x00000000042F1000-memory.dmpFilesize
1.3MB
-
memory/3556-115-0x0000000002B80000-0x0000000002CCA000-memory.dmpFilesize
1.3MB
-
memory/3556-116-0x0000000002B80000-0x0000000002CCA000-memory.dmpFilesize
1.3MB
-
memory/3556-117-0x0000000000400000-0x0000000002B79000-memory.dmpFilesize
39.5MB