Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26-09-2022 16:43

General

  • Target

    9dfcfa3b6819a4026e4e4561f66c2f1c391b1a40abe43c115229b53b113ccab2.exe

  • Size

    153KB

  • MD5

    077c613cd7bf15a2c6f1c3d92e121508

  • SHA1

    724d221547a5dbb3430b6de4754e0a23dd3459a8

  • SHA256

    9dfcfa3b6819a4026e4e4561f66c2f1c391b1a40abe43c115229b53b113ccab2

  • SHA512

    d6ab2deffe10ace45e43d7645f52d73c0729471e6d97baf3a15109ab4c3237bff220534f452bc973f5bccfe26e077d1a2168f032967778bb0542cb244f80dd02

  • SSDEEP

    3072:+0WK2BTc5KrlZcn2fUyxmZwwjGNz+PEgKHHu6BIAB5B:abrlqfEATjizE9v3

Malware Config

Extracted

Family

danabot

C2

198.15.112.179:443

185.62.56.245:443

153.92.223.225:443

192.119.70.159:443

Attributes
  • embedded_hash

    6618C163D57D6441FCCA65D86C4D380D

  • type

    loader

Extracted

Family

redline

Botnet

insmix

C2

jamesmillion2.xyz:9420

Attributes
  • auth_value

    f388a05524f756108c9e4b0f4c4bafb6

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9dfcfa3b6819a4026e4e4561f66c2f1c391b1a40abe43c115229b53b113ccab2.exe
    "C:\Users\Admin\AppData\Local\Temp\9dfcfa3b6819a4026e4e4561f66c2f1c391b1a40abe43c115229b53b113ccab2.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3824
  • C:\Users\Admin\AppData\Local\Temp\56E.exe
    C:\Users\Admin\AppData\Local\Temp\56E.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Windows\SysWOW64\appidtel.exe
      C:\Windows\system32\appidtel.exe
      2⤵
        PID:3572
      • C:\Windows\syswow64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
          PID:4656
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 608
          2⤵
          • Program crash
          PID:4776
      • C:\Users\Admin\AppData\Local\Temp\5CF6.exe
        C:\Users\Admin\AppData\Local\Temp\5CF6.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3316

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\56E.exe
        Filesize

        1.2MB

        MD5

        ca6efc760f3ed4fdcf9c8872e273a05a

        SHA1

        bbf446b4fd9502dfc29f82cd96f740dc1345781a

        SHA256

        62ef1e13afc32dbc6c19c6de8bae14acf26424dedea85341e4b307bce8145609

        SHA512

        c79bebab9758693036524194bc1d88298f46aad142c8364f363096ed1ec2d7ee214fa155a4e9ac73adfced99185333fbb14e596b5298f165cabca66114378be5

      • C:\Users\Admin\AppData\Local\Temp\56E.exe
        Filesize

        1.2MB

        MD5

        ca6efc760f3ed4fdcf9c8872e273a05a

        SHA1

        bbf446b4fd9502dfc29f82cd96f740dc1345781a

        SHA256

        62ef1e13afc32dbc6c19c6de8bae14acf26424dedea85341e4b307bce8145609

        SHA512

        c79bebab9758693036524194bc1d88298f46aad142c8364f363096ed1ec2d7ee214fa155a4e9ac73adfced99185333fbb14e596b5298f165cabca66114378be5

      • C:\Users\Admin\AppData\Local\Temp\5CF6.exe
        Filesize

        304KB

        MD5

        15f1517f0ceaaf9b6c78cf7625510c07

        SHA1

        8aabce20aff43476586a1b69b0b761a7f39d1e7e

        SHA256

        d0d47dec11c63b6fa1a2dcac89e5a7352220e371b728781de041bf42fa8965fb

        SHA512

        931a79a6e0d38c9b59b03a68d31e3c8fdb2b51e5eeed1df45790eba38f516f767ed67d9edd10bef16d169dc253c81ba6afb5d52738761cc2fa84f601f86b3516

      • C:\Users\Admin\AppData\Local\Temp\5CF6.exe
        Filesize

        304KB

        MD5

        15f1517f0ceaaf9b6c78cf7625510c07

        SHA1

        8aabce20aff43476586a1b69b0b761a7f39d1e7e

        SHA256

        d0d47dec11c63b6fa1a2dcac89e5a7352220e371b728781de041bf42fa8965fb

        SHA512

        931a79a6e0d38c9b59b03a68d31e3c8fdb2b51e5eeed1df45790eba38f516f767ed67d9edd10bef16d169dc253c81ba6afb5d52738761cc2fa84f601f86b3516

      • memory/3316-273-0x0000000004D20000-0x0000000004D32000-memory.dmp
        Filesize

        72KB

      • memory/3316-259-0x0000000004E90000-0x000000000538E000-memory.dmp
        Filesize

        5.0MB

      • memory/3316-309-0x0000000000996000-0x00000000009C0000-memory.dmp
        Filesize

        168KB

      • memory/3316-305-0x00000000066D0000-0x0000000006746000-memory.dmp
        Filesize

        472KB

      • memory/3316-304-0x0000000006670000-0x00000000066C0000-memory.dmp
        Filesize

        320KB

      • memory/3316-303-0x0000000006360000-0x00000000063F2000-memory.dmp
        Filesize

        584KB

      • memory/3316-295-0x0000000005CB0000-0x0000000005D16000-memory.dmp
        Filesize

        408KB

      • memory/3316-285-0x0000000005B10000-0x0000000005B5B000-memory.dmp
        Filesize

        300KB

      • memory/3316-277-0x00000000059A0000-0x00000000059DE000-memory.dmp
        Filesize

        248KB

      • memory/3316-274-0x0000000004D50000-0x0000000004E5A000-memory.dmp
        Filesize

        1.0MB

      • memory/3316-311-0x00000000076E0000-0x0000000007C0C000-memory.dmp
        Filesize

        5.2MB

      • memory/3316-272-0x0000000005390000-0x0000000005996000-memory.dmp
        Filesize

        6.0MB

      • memory/3316-261-0x00000000026F0000-0x000000000271E000-memory.dmp
        Filesize

        184KB

      • memory/3316-310-0x0000000007510000-0x00000000076D2000-memory.dmp
        Filesize

        1.8MB

      • memory/3316-254-0x00000000023C0000-0x00000000023F0000-memory.dmp
        Filesize

        192KB

      • memory/3316-249-0x0000000000400000-0x00000000005A5000-memory.dmp
        Filesize

        1.6MB

      • memory/3316-248-0x00000000008E0000-0x0000000000917000-memory.dmp
        Filesize

        220KB

      • memory/3316-247-0x0000000000996000-0x00000000009C0000-memory.dmp
        Filesize

        168KB

      • memory/3316-314-0x00000000069A0000-0x00000000069BE000-memory.dmp
        Filesize

        120KB

      • memory/3316-208-0x0000000000000000-mapping.dmp
      • memory/3316-319-0x0000000000996000-0x00000000009C0000-memory.dmp
        Filesize

        168KB

      • memory/3316-320-0x0000000000400000-0x00000000005A5000-memory.dmp
        Filesize

        1.6MB

      • memory/3572-193-0x0000000000000000-mapping.dmp
      • memory/3572-194-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3572-195-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-146-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-147-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-153-0x0000000000400000-0x0000000000583000-memory.dmp
        Filesize

        1.5MB

      • memory/3824-154-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-155-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-150-0x00000000006F0000-0x00000000006F9000-memory.dmp
        Filesize

        36KB

      • memory/3824-149-0x00000000008A6000-0x00000000008B6000-memory.dmp
        Filesize

        64KB

      • memory/3824-156-0x0000000000400000-0x0000000000583000-memory.dmp
        Filesize

        1.5MB

      • memory/3824-151-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-121-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-122-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-123-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-124-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-125-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-126-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-127-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-128-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-129-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-130-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-152-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-131-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-132-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-133-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-134-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-135-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-148-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-136-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-137-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-138-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-139-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-140-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-141-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-142-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-143-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-144-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-145-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/3824-120-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-169-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-177-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-189-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-190-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-191-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-192-0x0000000000400000-0x00000000006E8000-memory.dmp
        Filesize

        2.9MB

      • memory/4812-187-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-185-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-186-0x0000000002500000-0x00000000027DB000-memory.dmp
        Filesize

        2.9MB

      • memory/4812-205-0x0000000002390000-0x00000000024B8000-memory.dmp
        Filesize

        1.2MB

      • memory/4812-206-0x0000000002500000-0x00000000027DB000-memory.dmp
        Filesize

        2.9MB

      • memory/4812-207-0x0000000000400000-0x00000000006E8000-memory.dmp
        Filesize

        2.9MB

      • memory/4812-184-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-183-0x0000000002390000-0x00000000024B8000-memory.dmp
        Filesize

        1.2MB

      • memory/4812-182-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-181-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-180-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-178-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-179-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-188-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-176-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-174-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-173-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-172-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-171-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-170-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-168-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-167-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-165-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-164-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-163-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-162-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-161-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-160-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-159-0x0000000077600000-0x000000007778E000-memory.dmp
        Filesize

        1.6MB

      • memory/4812-157-0x0000000000000000-mapping.dmp
      • memory/4812-322-0x0000000000400000-0x00000000006E8000-memory.dmp
        Filesize

        2.9MB

      • memory/4812-335-0x0000000000400000-0x00000000006E8000-memory.dmp
        Filesize

        2.9MB