Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2022 13:08

General

  • Target

    file.exe

  • Size

    153KB

  • MD5

    7d53fa419ac8d29b79078ca0c4bb85c6

  • SHA1

    e051e6cf509d78cad4337ee84b1f4ffaa0c3ac8b

  • SHA256

    bc1c19fb9559d3e0f6ede05232c6f72d8306f8858f740bf9a8dd768c0cba92de

  • SHA512

    9232370c1f86cfae4c67b545c3a61374381d67bfa97ca64ee0bb9bc4b53f9de3c33ef0fcef012998fdde482c0ab5a7e52a55d0d32787c44a9f388a294929ce53

  • SSDEEP

    1536:VTcMoYs1izSP44tTF5YuMdb47ZPaEF1J3IcP9WlY9aRFucLyOGgxjYj1Ei/UunL2:VTSzTF5eb079pUx3TylgGBtJ+/aK5B

Malware Config

Extracted

Family

danabot

C2

198.15.112.179:443

185.62.56.245:443

153.92.223.225:443

192.119.70.159:443

49.0.50.0:57

51.0.52.0:0

53.0.54.0:1200

55.0.56.0:65535

Attributes
  • embedded_hash

    6618C163D57D6441FCCA65D86C4D380D

  • type

    loader

Extracted

Family

systembc

C2

141.98.82.229:4001

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 2 IoCs
  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 42 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4836
  • C:\Users\Admin\AppData\Local\Temp\1C33.exe
    C:\Users\Admin\AppData\Local\Temp\1C33.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Windows\SysWOW64\agentactivationruntimestarter.exe
      C:\Windows\system32\agentactivationruntimestarter.exe
      2⤵
        PID:4316
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        PID:2840
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:2664
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x50c 0x494
      1⤵
        PID:3708
      • C:\Users\Admin\AppData\Local\Temp\323C.exe
        C:\Users\Admin\AppData\Local\Temp\323C.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1864
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 1308
          2⤵
          • Program crash
          PID:2256
      • C:\Users\Admin\AppData\Local\Temp\3C40.exe
        C:\Users\Admin\AppData\Local\Temp\3C40.exe
        1⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:4916
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 492
          2⤵
          • Program crash
          PID:1296
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1864 -ip 1864
        1⤵
          PID:4084
        • C:\ProgramData\hdqfshu\lpvi.exe
          C:\ProgramData\hdqfshu\lpvi.exe start
          1⤵
          • Executes dropped EXE
          PID:2220
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4916 -ip 4916
          1⤵
            PID:2700
          • C:\Users\Admin\AppData\Roaming\erfdiwc
            C:\Users\Admin\AppData\Roaming\erfdiwc
            1⤵
            • Executes dropped EXE
            • Checks SCSI registry key(s)
            • Suspicious behavior: MapViewOfSection
            PID:4068

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Credential Access

          Credentials in Files

          2
          T1081

          Discovery

          Query Registry

          2
          T1012

          Peripheral Device Discovery

          1
          T1120

          System Information Discovery

          1
          T1082

          Collection

          Data from Local System

          2
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\hdqfshu\lpvi.exe
            Filesize

            153KB

            MD5

            a20d99e025fb23ba51d38a975bc10de5

            SHA1

            6d58a7dc6f4e84ed6cf70fb154e6af3193ff4045

            SHA256

            6278b1a4d8a19c7ac40ee309c100924427fb35028f3eadb96112c9b70c3a0d59

            SHA512

            a99ea0bc3d947e5048d92f8e5bdf1745c5d428f2934e29cb2d4f7d3bea029a467e01f28fdc5f09390141b80ad80e016b5b9171fb3b4bf2bd0e0a84a6d9328198

          • C:\ProgramData\hdqfshu\lpvi.exe
            Filesize

            153KB

            MD5

            a20d99e025fb23ba51d38a975bc10de5

            SHA1

            6d58a7dc6f4e84ed6cf70fb154e6af3193ff4045

            SHA256

            6278b1a4d8a19c7ac40ee309c100924427fb35028f3eadb96112c9b70c3a0d59

            SHA512

            a99ea0bc3d947e5048d92f8e5bdf1745c5d428f2934e29cb2d4f7d3bea029a467e01f28fdc5f09390141b80ad80e016b5b9171fb3b4bf2bd0e0a84a6d9328198

          • C:\Users\Admin\AppData\Local\Temp\1C33.exe
            Filesize

            1.2MB

            MD5

            08871b3362e21fa75c8820f4c03d94c7

            SHA1

            354d49a9152051aab205b6bc6b67a10a91106fbd

            SHA256

            69d81ef1b12e1746b92d0a873d170cf87c68dace0c95707e81abad3fd93233d4

            SHA512

            547d269e6efddbb48392dda042a87d8b18a22b37034ce2cbf536d11335dfa40a3bdc1606950c3107e0875f88527e6523892bd292bdc595bf82716ae437a7b3ab

          • C:\Users\Admin\AppData\Local\Temp\1C33.exe
            Filesize

            1.2MB

            MD5

            08871b3362e21fa75c8820f4c03d94c7

            SHA1

            354d49a9152051aab205b6bc6b67a10a91106fbd

            SHA256

            69d81ef1b12e1746b92d0a873d170cf87c68dace0c95707e81abad3fd93233d4

            SHA512

            547d269e6efddbb48392dda042a87d8b18a22b37034ce2cbf536d11335dfa40a3bdc1606950c3107e0875f88527e6523892bd292bdc595bf82716ae437a7b3ab

          • C:\Users\Admin\AppData\Local\Temp\323C.exe
            Filesize

            304KB

            MD5

            15f1517f0ceaaf9b6c78cf7625510c07

            SHA1

            8aabce20aff43476586a1b69b0b761a7f39d1e7e

            SHA256

            d0d47dec11c63b6fa1a2dcac89e5a7352220e371b728781de041bf42fa8965fb

            SHA512

            931a79a6e0d38c9b59b03a68d31e3c8fdb2b51e5eeed1df45790eba38f516f767ed67d9edd10bef16d169dc253c81ba6afb5d52738761cc2fa84f601f86b3516

          • C:\Users\Admin\AppData\Local\Temp\323C.exe
            Filesize

            304KB

            MD5

            15f1517f0ceaaf9b6c78cf7625510c07

            SHA1

            8aabce20aff43476586a1b69b0b761a7f39d1e7e

            SHA256

            d0d47dec11c63b6fa1a2dcac89e5a7352220e371b728781de041bf42fa8965fb

            SHA512

            931a79a6e0d38c9b59b03a68d31e3c8fdb2b51e5eeed1df45790eba38f516f767ed67d9edd10bef16d169dc253c81ba6afb5d52738761cc2fa84f601f86b3516

          • C:\Users\Admin\AppData\Local\Temp\3C40.exe
            Filesize

            153KB

            MD5

            a20d99e025fb23ba51d38a975bc10de5

            SHA1

            6d58a7dc6f4e84ed6cf70fb154e6af3193ff4045

            SHA256

            6278b1a4d8a19c7ac40ee309c100924427fb35028f3eadb96112c9b70c3a0d59

            SHA512

            a99ea0bc3d947e5048d92f8e5bdf1745c5d428f2934e29cb2d4f7d3bea029a467e01f28fdc5f09390141b80ad80e016b5b9171fb3b4bf2bd0e0a84a6d9328198

          • C:\Users\Admin\AppData\Local\Temp\3C40.exe
            Filesize

            153KB

            MD5

            a20d99e025fb23ba51d38a975bc10de5

            SHA1

            6d58a7dc6f4e84ed6cf70fb154e6af3193ff4045

            SHA256

            6278b1a4d8a19c7ac40ee309c100924427fb35028f3eadb96112c9b70c3a0d59

            SHA512

            a99ea0bc3d947e5048d92f8e5bdf1745c5d428f2934e29cb2d4f7d3bea029a467e01f28fdc5f09390141b80ad80e016b5b9171fb3b4bf2bd0e0a84a6d9328198

          • C:\Users\Admin\AppData\Local\Temp\Fiuepr.tmp
            Filesize

            3.3MB

            MD5

            be03bd71d3ba639632b50cb9a3931d56

            SHA1

            bcf03bb5c228044abd984485b0e10fc4e16c0c6c

            SHA256

            1e50f193c8e645a6c93feb42b1ffd46dec68738106dec79014815ac444612234

            SHA512

            fc0eada90ff1b4c5c805fd38c1bfade389f8b1d58c45611fdaa6a0c303a56cf4d78a49dabb1de0b9eb7458d952b65589256a82262a84c5914b6b7f974336bc8d

          • C:\Users\Admin\AppData\Roaming\erfdiwc
            Filesize

            153KB

            MD5

            7d53fa419ac8d29b79078ca0c4bb85c6

            SHA1

            e051e6cf509d78cad4337ee84b1f4ffaa0c3ac8b

            SHA256

            bc1c19fb9559d3e0f6ede05232c6f72d8306f8858f740bf9a8dd768c0cba92de

            SHA512

            9232370c1f86cfae4c67b545c3a61374381d67bfa97ca64ee0bb9bc4b53f9de3c33ef0fcef012998fdde482c0ab5a7e52a55d0d32787c44a9f388a294929ce53

          • C:\Users\Admin\AppData\Roaming\erfdiwc
            Filesize

            153KB

            MD5

            7d53fa419ac8d29b79078ca0c4bb85c6

            SHA1

            e051e6cf509d78cad4337ee84b1f4ffaa0c3ac8b

            SHA256

            bc1c19fb9559d3e0f6ede05232c6f72d8306f8858f740bf9a8dd768c0cba92de

            SHA512

            9232370c1f86cfae4c67b545c3a61374381d67bfa97ca64ee0bb9bc4b53f9de3c33ef0fcef012998fdde482c0ab5a7e52a55d0d32787c44a9f388a294929ce53

          • memory/1080-201-0x0000000003B80000-0x0000000003CC0000-memory.dmp
            Filesize

            1.2MB

          • memory/1080-162-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/1080-142-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/1080-198-0x0000000003B80000-0x0000000003CC0000-memory.dmp
            Filesize

            1.2MB

          • memory/1080-197-0x0000000002F60000-0x0000000003A1E000-memory.dmp
            Filesize

            10.7MB

          • memory/1080-196-0x0000000002F60000-0x0000000003A1E000-memory.dmp
            Filesize

            10.7MB

          • memory/1080-195-0x0000000002F60000-0x0000000003A1E000-memory.dmp
            Filesize

            10.7MB

          • memory/1080-141-0x0000000002490000-0x000000000276B000-memory.dmp
            Filesize

            2.9MB

          • memory/1080-140-0x000000000235B000-0x0000000002481000-memory.dmp
            Filesize

            1.1MB

          • memory/1080-199-0x0000000003B80000-0x0000000003CC0000-memory.dmp
            Filesize

            1.2MB

          • memory/1080-136-0x0000000000000000-mapping.dmp
          • memory/1080-202-0x0000000003B80000-0x0000000003CC0000-memory.dmp
            Filesize

            1.2MB

          • memory/1080-186-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/1080-177-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/1080-176-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/1080-203-0x0000000003B80000-0x0000000003CC0000-memory.dmp
            Filesize

            1.2MB

          • memory/1080-200-0x0000000003B80000-0x0000000003CC0000-memory.dmp
            Filesize

            1.2MB

          • memory/1864-168-0x0000000000688000-0x00000000006B2000-memory.dmp
            Filesize

            168KB

          • memory/1864-171-0x0000000000400000-0x00000000005A5000-memory.dmp
            Filesize

            1.6MB

          • memory/1864-160-0x0000000005C60000-0x0000000005CC6000-memory.dmp
            Filesize

            408KB

          • memory/1864-163-0x00000000066B0000-0x0000000006726000-memory.dmp
            Filesize

            472KB

          • memory/1864-164-0x0000000006750000-0x000000000676E000-memory.dmp
            Filesize

            120KB

          • memory/1864-165-0x0000000006810000-0x00000000069D2000-memory.dmp
            Filesize

            1.8MB

          • memory/1864-166-0x0000000007380000-0x00000000078AC000-memory.dmp
            Filesize

            5.2MB

          • memory/1864-167-0x0000000006C30000-0x0000000006C80000-memory.dmp
            Filesize

            320KB

          • memory/1864-143-0x0000000000000000-mapping.dmp
          • memory/1864-169-0x0000000000400000-0x00000000005A5000-memory.dmp
            Filesize

            1.6MB

          • memory/1864-170-0x0000000000688000-0x00000000006B2000-memory.dmp
            Filesize

            168KB

          • memory/1864-155-0x0000000005820000-0x000000000592A000-memory.dmp
            Filesize

            1.0MB

          • memory/1864-146-0x0000000000688000-0x00000000006B2000-memory.dmp
            Filesize

            168KB

          • memory/1864-147-0x0000000000630000-0x0000000000667000-memory.dmp
            Filesize

            220KB

          • memory/1864-161-0x0000000006450000-0x00000000064E2000-memory.dmp
            Filesize

            584KB

          • memory/1864-154-0x0000000005800000-0x0000000005812000-memory.dmp
            Filesize

            72KB

          • memory/1864-148-0x0000000000400000-0x00000000005A5000-memory.dmp
            Filesize

            1.6MB

          • memory/1864-156-0x0000000005950000-0x000000000598C000-memory.dmp
            Filesize

            240KB

          • memory/1864-149-0x0000000004B80000-0x0000000005124000-memory.dmp
            Filesize

            5.6MB

          • memory/1864-153-0x0000000005150000-0x0000000005768000-memory.dmp
            Filesize

            6.1MB

          • memory/2220-175-0x0000000000400000-0x0000000000581000-memory.dmp
            Filesize

            1.5MB

          • memory/2220-174-0x0000000000933000-0x0000000000943000-memory.dmp
            Filesize

            64KB

          • memory/2840-181-0x0000000000730000-0x0000000000733000-memory.dmp
            Filesize

            12KB

          • memory/2840-193-0x0000000000770000-0x0000000000773000-memory.dmp
            Filesize

            12KB

          • memory/2840-184-0x0000000000760000-0x0000000000763000-memory.dmp
            Filesize

            12KB

          • memory/2840-185-0x0000000000770000-0x0000000000773000-memory.dmp
            Filesize

            12KB

          • memory/2840-182-0x0000000000740000-0x0000000000743000-memory.dmp
            Filesize

            12KB

          • memory/2840-178-0x0000000000000000-mapping.dmp
          • memory/2840-180-0x0000000000720000-0x0000000000723000-memory.dmp
            Filesize

            12KB

          • memory/2840-179-0x0000000000710000-0x0000000000713000-memory.dmp
            Filesize

            12KB

          • memory/2840-183-0x0000000000750000-0x0000000000753000-memory.dmp
            Filesize

            12KB

          • memory/4068-192-0x0000000000400000-0x0000000000583000-memory.dmp
            Filesize

            1.5MB

          • memory/4068-190-0x00000000006B8000-0x00000000006C8000-memory.dmp
            Filesize

            64KB

          • memory/4068-191-0x0000000000400000-0x0000000000583000-memory.dmp
            Filesize

            1.5MB

          • memory/4316-139-0x0000000000000000-mapping.dmp
          • memory/4836-132-0x0000000000799000-0x00000000007A9000-memory.dmp
            Filesize

            64KB

          • memory/4836-133-0x0000000000720000-0x0000000000729000-memory.dmp
            Filesize

            36KB

          • memory/4836-134-0x0000000000400000-0x0000000000583000-memory.dmp
            Filesize

            1.5MB

          • memory/4836-135-0x0000000000400000-0x0000000000583000-memory.dmp
            Filesize

            1.5MB

          • memory/4916-150-0x0000000000000000-mapping.dmp
          • memory/4916-159-0x0000000000400000-0x0000000000581000-memory.dmp
            Filesize

            1.5MB

          • memory/4916-158-0x0000000000700000-0x0000000000709000-memory.dmp
            Filesize

            36KB

          • memory/4916-157-0x0000000000618000-0x0000000000629000-memory.dmp
            Filesize

            68KB

          • memory/4916-187-0x0000000000618000-0x0000000000629000-memory.dmp
            Filesize

            68KB