Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09-01-2022 15:38
Static task
static1
Behavioral task
behavioral1
Sample
61dae93d780db_Sun139.exe
Resource
win7-en-20211208
General
-
Target
61dae93d780db_Sun139.exe
-
Size
293KB
-
MD5
c817d8a9ea3ed03f247e2f0a000a675a
-
SHA1
4194929b5a02524e1e24179014fa13e95a93ee1a
-
SHA256
ca8990349224f84d04c36c55bf71b11376e8c9008909680bcc63519b3f1c1439
-
SHA512
08369b4303d481e42a7923fcf7606fef1379060fd65ecd0e224af48f396370e58421e9247471327f44e27166479c0944a57d37312888d42f532bbd661378a618
Malware Config
Extracted
smokeloader
2020
http://nahbleiben.at/upload/
http://noblecreativeaz.com/upload/
http://tvqaq.cn/upload/
http://recmaster.ru/upload/
http://sovels.ru/upload/
Extracted
danabot
4
192.119.110.4:443
103.175.16.113:443
-
embedded_hash
422236FD601D11EE82825A484D26DD6F
-
type
loader
Signatures
-
Danabot Loader Component 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\AB9B.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\AB9B.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\AB9B.exe.dll DanabotLoader2021 behavioral1/memory/1380-82-0x0000000000940000-0x0000000000A8E000-memory.dmp DanabotLoader2021 \Users\Admin\AppData\Local\Temp\AB9B.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\AB9B.exe.dll DanabotLoader2021 -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
AB9B.exeuutfcrwD6B1.exepid process 1092 AB9B.exe 592 uutfcrw 744 D6B1.exe -
Deletes itself 1 IoCs
Processes:
pid process 1208 -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 1380 rundll32.exe 1380 rundll32.exe 1380 rundll32.exe 1380 rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
uutfcrw61dae93d780db_Sun139.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uutfcrw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 61dae93d780db_Sun139.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 61dae93d780db_Sun139.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 61dae93d780db_Sun139.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uutfcrw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uutfcrw -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
61dae93d780db_Sun139.exepid process 1588 61dae93d780db_Sun139.exe 1588 61dae93d780db_Sun139.exe 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
61dae93d780db_Sun139.exeuutfcrwpid process 1588 61dae93d780db_Sun139.exe 592 uutfcrw -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1208 1208 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1208 1208 -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
taskeng.exeAB9B.exedescription pid process target process PID 1208 wrote to memory of 1092 1208 AB9B.exe PID 1208 wrote to memory of 1092 1208 AB9B.exe PID 1208 wrote to memory of 1092 1208 AB9B.exe PID 1208 wrote to memory of 1092 1208 AB9B.exe PID 1528 wrote to memory of 592 1528 taskeng.exe uutfcrw PID 1528 wrote to memory of 592 1528 taskeng.exe uutfcrw PID 1528 wrote to memory of 592 1528 taskeng.exe uutfcrw PID 1528 wrote to memory of 592 1528 taskeng.exe uutfcrw PID 1208 wrote to memory of 744 1208 D6B1.exe PID 1208 wrote to memory of 744 1208 D6B1.exe PID 1208 wrote to memory of 744 1208 D6B1.exe PID 1208 wrote to memory of 744 1208 D6B1.exe PID 1092 wrote to memory of 1380 1092 AB9B.exe rundll32.exe PID 1092 wrote to memory of 1380 1092 AB9B.exe rundll32.exe PID 1092 wrote to memory of 1380 1092 AB9B.exe rundll32.exe PID 1092 wrote to memory of 1380 1092 AB9B.exe rundll32.exe PID 1092 wrote to memory of 1380 1092 AB9B.exe rundll32.exe PID 1092 wrote to memory of 1380 1092 AB9B.exe rundll32.exe PID 1092 wrote to memory of 1380 1092 AB9B.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61dae93d780db_Sun139.exe"C:\Users\Admin\AppData\Local\Temp\61dae93d780db_Sun139.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\AB9B.exeC:\Users\Admin\AppData\Local\Temp\AB9B.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\AB9B.exe.dll,z C:\Users\Admin\AppData\Local\Temp\AB9B.exe2⤵
- Loads dropped DLL
-
C:\Windows\system32\taskeng.exetaskeng.exe {62CB9813-5303-46B8-917D-F766E83F140F} S-1-5-21-3846991908-3261386348-1409841751-1000:VQVVOAJK\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\uutfcrwC:\Users\Admin\AppData\Roaming\uutfcrw2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\D6B1.exeC:\Users\Admin\AppData\Local\Temp\D6B1.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\AB9B.exeMD5
63d9b309582fbf651840182519c04f18
SHA1742539d685093f276242b1ca3fae82c0d20cad6a
SHA2568409da61f57fbdf4ad602f4065afaca1f98fce73277cd54163f8b3e39c03c8e3
SHA512c057b485f700071434df12cc27054936ecd904b4c302130c04f8317a0145f6e3c93ae556275b6d97bcddcbd7a26a1c22a112f9eb177c75fcc50cfb9cf1639385
-
C:\Users\Admin\AppData\Local\Temp\AB9B.exe.dllMD5
92f938645c119b58ff99e2211c8fb532
SHA137834ac4c83eb21fda06f7e94bd0913c02ba3d3e
SHA256b2c8059bb7cba32f2acae53c3e626bcea56918db9e391eddab96c6a089c9ced0
SHA512117c972ead27dce4e7ac2f6336fbe1fff2a6a3afbe208109109af8b26797634ac9688d69063be3d28d1f16a6851293671c8c63b62d56d7310b5e67914bbd3046
-
C:\Users\Admin\AppData\Local\Temp\D6B1.exeMD5
63d9b309582fbf651840182519c04f18
SHA1742539d685093f276242b1ca3fae82c0d20cad6a
SHA2568409da61f57fbdf4ad602f4065afaca1f98fce73277cd54163f8b3e39c03c8e3
SHA512c057b485f700071434df12cc27054936ecd904b4c302130c04f8317a0145f6e3c93ae556275b6d97bcddcbd7a26a1c22a112f9eb177c75fcc50cfb9cf1639385
-
C:\Users\Admin\AppData\Roaming\uutfcrwMD5
c817d8a9ea3ed03f247e2f0a000a675a
SHA14194929b5a02524e1e24179014fa13e95a93ee1a
SHA256ca8990349224f84d04c36c55bf71b11376e8c9008909680bcc63519b3f1c1439
SHA51208369b4303d481e42a7923fcf7606fef1379060fd65ecd0e224af48f396370e58421e9247471327f44e27166479c0944a57d37312888d42f532bbd661378a618
-
C:\Users\Admin\AppData\Roaming\uutfcrwMD5
c817d8a9ea3ed03f247e2f0a000a675a
SHA14194929b5a02524e1e24179014fa13e95a93ee1a
SHA256ca8990349224f84d04c36c55bf71b11376e8c9008909680bcc63519b3f1c1439
SHA51208369b4303d481e42a7923fcf7606fef1379060fd65ecd0e224af48f396370e58421e9247471327f44e27166479c0944a57d37312888d42f532bbd661378a618
-
\Users\Admin\AppData\Local\Temp\AB9B.exe.dllMD5
92f938645c119b58ff99e2211c8fb532
SHA137834ac4c83eb21fda06f7e94bd0913c02ba3d3e
SHA256b2c8059bb7cba32f2acae53c3e626bcea56918db9e391eddab96c6a089c9ced0
SHA512117c972ead27dce4e7ac2f6336fbe1fff2a6a3afbe208109109af8b26797634ac9688d69063be3d28d1f16a6851293671c8c63b62d56d7310b5e67914bbd3046
-
\Users\Admin\AppData\Local\Temp\AB9B.exe.dllMD5
92f938645c119b58ff99e2211c8fb532
SHA137834ac4c83eb21fda06f7e94bd0913c02ba3d3e
SHA256b2c8059bb7cba32f2acae53c3e626bcea56918db9e391eddab96c6a089c9ced0
SHA512117c972ead27dce4e7ac2f6336fbe1fff2a6a3afbe208109109af8b26797634ac9688d69063be3d28d1f16a6851293671c8c63b62d56d7310b5e67914bbd3046
-
\Users\Admin\AppData\Local\Temp\AB9B.exe.dllMD5
92f938645c119b58ff99e2211c8fb532
SHA137834ac4c83eb21fda06f7e94bd0913c02ba3d3e
SHA256b2c8059bb7cba32f2acae53c3e626bcea56918db9e391eddab96c6a089c9ced0
SHA512117c972ead27dce4e7ac2f6336fbe1fff2a6a3afbe208109109af8b26797634ac9688d69063be3d28d1f16a6851293671c8c63b62d56d7310b5e67914bbd3046
-
\Users\Admin\AppData\Local\Temp\AB9B.exe.dllMD5
92f938645c119b58ff99e2211c8fb532
SHA137834ac4c83eb21fda06f7e94bd0913c02ba3d3e
SHA256b2c8059bb7cba32f2acae53c3e626bcea56918db9e391eddab96c6a089c9ced0
SHA512117c972ead27dce4e7ac2f6336fbe1fff2a6a3afbe208109109af8b26797634ac9688d69063be3d28d1f16a6851293671c8c63b62d56d7310b5e67914bbd3046
-
memory/592-62-0x0000000000000000-mapping.dmp
-
memory/592-73-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/744-71-0x0000000000400000-0x0000000002C59000-memory.dmpFilesize
40.3MB
-
memory/744-64-0x0000000000000000-mapping.dmp
-
memory/1092-67-0x00000000046D0000-0x00000000047CA000-memory.dmpFilesize
1000KB
-
memory/1092-69-0x0000000000400000-0x0000000002C59000-memory.dmpFilesize
40.3MB
-
memory/1092-66-0x0000000004580000-0x0000000004663000-memory.dmpFilesize
908KB
-
memory/1092-59-0x0000000000000000-mapping.dmp
-
memory/1208-74-0x0000000002CB0000-0x0000000002CC6000-memory.dmpFilesize
88KB
-
memory/1208-58-0x0000000002B40000-0x0000000002B56000-memory.dmpFilesize
88KB
-
memory/1380-75-0x0000000000000000-mapping.dmp
-
memory/1380-82-0x0000000000940000-0x0000000000A8E000-memory.dmpFilesize
1.3MB
-
memory/1588-55-0x0000000076151000-0x0000000076153000-memory.dmpFilesize
8KB
-
memory/1588-57-0x00000000003B0000-0x00000000003B9000-memory.dmpFilesize
36KB
-
memory/1588-56-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/1588-54-0x00000000003A0000-0x00000000003A8000-memory.dmpFilesize
32KB