Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2022 00:09

General

  • Target

    file.exe

  • Size

    129KB

  • MD5

    56baf889e727b4f3f6c8b046c0d9d2ff

  • SHA1

    09923bf99249d962e0546deedc210530ab359da6

  • SHA256

    5dcffd6a989fbd0402981422bc7c0201d769d999ae58d6862672eccbfc160aed

  • SHA512

    8f6c062c0754b220bd97c8f96aea157f9017264d7ea6c486e45ad24c9bc8ae95a4544a168456a26506b7fb5c5dfc22a40e3dc724ecfcecdb2d5395330fdc3cbd

  • SSDEEP

    3072:eSWHsTI5q/cNeenWb4mygrrE2KrTsAOJeqnTGtWzwI45B:ehyiiLZj8iJtnTnz

Malware Config

Extracted

Family

danabot

Attributes
  • embedded_hash

    6618C163D57D6441FCCA65D86C4D380D

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 42 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2564
  • C:\Users\Admin\AppData\Local\Temp\F811.exe
    C:\Users\Admin\AppData\Local\Temp\F811.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Windows\SysWOW64\agentactivationruntimestarter.exe
      C:\Windows\system32\agentactivationruntimestarter.exe
      2⤵
        PID:2292
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 428
        2⤵
        • Program crash
        PID:1780
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:1908
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x2f8 0x3bc
      1⤵
        PID:800
      • C:\Users\Admin\AppData\Roaming\btbwjef
        C:\Users\Admin\AppData\Roaming\btbwjef
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:2336
      • C:\Users\Admin\AppData\Local\Temp\7FC0.exe
        C:\Users\Admin\AppData\Local\Temp\7FC0.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3432
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1192 -ip 1192
        1⤵
          PID:4228

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Discovery

        Query Registry

        1
        T1012

        Peripheral Device Discovery

        1
        T1120

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7FC0.exe
          Filesize

          304KB

          MD5

          15f1517f0ceaaf9b6c78cf7625510c07

          SHA1

          8aabce20aff43476586a1b69b0b761a7f39d1e7e

          SHA256

          d0d47dec11c63b6fa1a2dcac89e5a7352220e371b728781de041bf42fa8965fb

          SHA512

          931a79a6e0d38c9b59b03a68d31e3c8fdb2b51e5eeed1df45790eba38f516f767ed67d9edd10bef16d169dc253c81ba6afb5d52738761cc2fa84f601f86b3516

        • C:\Users\Admin\AppData\Local\Temp\7FC0.exe
          Filesize

          304KB

          MD5

          15f1517f0ceaaf9b6c78cf7625510c07

          SHA1

          8aabce20aff43476586a1b69b0b761a7f39d1e7e

          SHA256

          d0d47dec11c63b6fa1a2dcac89e5a7352220e371b728781de041bf42fa8965fb

          SHA512

          931a79a6e0d38c9b59b03a68d31e3c8fdb2b51e5eeed1df45790eba38f516f767ed67d9edd10bef16d169dc253c81ba6afb5d52738761cc2fa84f601f86b3516

        • C:\Users\Admin\AppData\Local\Temp\F811.exe
          Filesize

          1.2MB

          MD5

          b36c6847d5869ecec3b972acd92bb012

          SHA1

          b75b3d199370606558f54d7128f8997f05eb8ea1

          SHA256

          2273c16e6bf0e6149472869ad7edb62c61501e1d34be52c57e9f473f2fb26d7a

          SHA512

          25dce16692bc3404647bdaf261188e420c24f8e7d472761b60b877aa60d316cefdcfbb501487bafa54b685029ba30354ec272c9285740883110b8ad3991bcfb7

        • C:\Users\Admin\AppData\Local\Temp\F811.exe
          Filesize

          1.2MB

          MD5

          b36c6847d5869ecec3b972acd92bb012

          SHA1

          b75b3d199370606558f54d7128f8997f05eb8ea1

          SHA256

          2273c16e6bf0e6149472869ad7edb62c61501e1d34be52c57e9f473f2fb26d7a

          SHA512

          25dce16692bc3404647bdaf261188e420c24f8e7d472761b60b877aa60d316cefdcfbb501487bafa54b685029ba30354ec272c9285740883110b8ad3991bcfb7

        • C:\Users\Admin\AppData\Roaming\btbwjef
          Filesize

          129KB

          MD5

          56baf889e727b4f3f6c8b046c0d9d2ff

          SHA1

          09923bf99249d962e0546deedc210530ab359da6

          SHA256

          5dcffd6a989fbd0402981422bc7c0201d769d999ae58d6862672eccbfc160aed

          SHA512

          8f6c062c0754b220bd97c8f96aea157f9017264d7ea6c486e45ad24c9bc8ae95a4544a168456a26506b7fb5c5dfc22a40e3dc724ecfcecdb2d5395330fdc3cbd

        • C:\Users\Admin\AppData\Roaming\btbwjef
          Filesize

          129KB

          MD5

          56baf889e727b4f3f6c8b046c0d9d2ff

          SHA1

          09923bf99249d962e0546deedc210530ab359da6

          SHA256

          5dcffd6a989fbd0402981422bc7c0201d769d999ae58d6862672eccbfc160aed

          SHA512

          8f6c062c0754b220bd97c8f96aea157f9017264d7ea6c486e45ad24c9bc8ae95a4544a168456a26506b7fb5c5dfc22a40e3dc724ecfcecdb2d5395330fdc3cbd

        • memory/1192-161-0x0000000000400000-0x00000000006E8000-memory.dmp
          Filesize

          2.9MB

        • memory/1192-140-0x0000000002351000-0x0000000002477000-memory.dmp
          Filesize

          1.1MB

        • memory/1192-141-0x0000000002480000-0x000000000275B000-memory.dmp
          Filesize

          2.9MB

        • memory/1192-142-0x0000000000400000-0x00000000006E8000-memory.dmp
          Filesize

          2.9MB

        • memory/1192-143-0x0000000000400000-0x00000000006E8000-memory.dmp
          Filesize

          2.9MB

        • memory/1192-136-0x0000000000000000-mapping.dmp
        • memory/1192-162-0x0000000000400000-0x00000000006E8000-memory.dmp
          Filesize

          2.9MB

        • memory/1192-163-0x0000000000400000-0x00000000006E8000-memory.dmp
          Filesize

          2.9MB

        • memory/2292-139-0x0000000000000000-mapping.dmp
        • memory/2336-148-0x0000000000400000-0x000000000057E000-memory.dmp
          Filesize

          1.5MB

        • memory/2336-147-0x0000000000400000-0x000000000057E000-memory.dmp
          Filesize

          1.5MB

        • memory/2336-146-0x0000000000848000-0x0000000000859000-memory.dmp
          Filesize

          68KB

        • memory/2564-132-0x0000000000789000-0x000000000079A000-memory.dmp
          Filesize

          68KB

        • memory/2564-133-0x0000000000710000-0x0000000000719000-memory.dmp
          Filesize

          36KB

        • memory/2564-134-0x0000000000400000-0x000000000057E000-memory.dmp
          Filesize

          1.5MB

        • memory/2564-135-0x0000000000400000-0x000000000057E000-memory.dmp
          Filesize

          1.5MB

        • memory/3432-156-0x00000000052B0000-0x00000000058C8000-memory.dmp
          Filesize

          6.1MB

        • memory/3432-155-0x0000000000400000-0x00000000005A5000-memory.dmp
          Filesize

          1.6MB

        • memory/3432-154-0x0000000002210000-0x0000000002247000-memory.dmp
          Filesize

          220KB

        • memory/3432-157-0x0000000005940000-0x0000000005952000-memory.dmp
          Filesize

          72KB

        • memory/3432-158-0x0000000005960000-0x0000000005A6A000-memory.dmp
          Filesize

          1.0MB

        • memory/3432-159-0x0000000005A90000-0x0000000005ACC000-memory.dmp
          Filesize

          240KB

        • memory/3432-160-0x00000000005F9000-0x0000000000623000-memory.dmp
          Filesize

          168KB

        • memory/3432-153-0x00000000005F9000-0x0000000000623000-memory.dmp
          Filesize

          168KB

        • memory/3432-152-0x0000000004D00000-0x00000000052A4000-memory.dmp
          Filesize

          5.6MB

        • memory/3432-149-0x0000000000000000-mapping.dmp