Analysis

  • max time kernel
    151s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2022 01:26

General

  • Target

    file.exe

  • Size

    128KB

  • MD5

    3cce7367f243eb4d34e04b27f658dc8d

  • SHA1

    7d954515c3612f574ac6c5f7a674c44dfc023ecd

  • SHA256

    04be226a715297ac67ea6e4b1d7e5426838bd42733ffcdd2359987a2fe6a4c85

  • SHA512

    7bd87f3a0ef561e591523b7f954febcdebd2ca7cfe7f3be613870d80c98b14823d01036b10a0906f36e7917e485875c38bcaf8740e6981a96a27e897b4fb4e0e

  • SSDEEP

    3072:tqvpU9TI56gjU4q/JnEEsSlwbM2iA4K/5x05B:topHAZB7RzA4KB

Malware Config

Extracted

Family

danabot

Attributes
  • embedded_hash

    6618C163D57D6441FCCA65D86C4D380D

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 39 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2472
  • C:\Users\Admin\AppData\Local\Temp\6503.exe
    C:\Users\Admin\AppData\Local\Temp\6503.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Windows\SysWOW64\agentactivationruntimestarter.exe
      C:\Windows\system32\agentactivationruntimestarter.exe
      2⤵
        PID:1252
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 620
        2⤵
        • Program crash
        PID:2304
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:3824
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x498 0x324
      1⤵
        PID:988
      • C:\Users\Admin\AppData\Local\Temp\C506.exe
        C:\Users\Admin\AppData\Local\Temp\C506.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4224
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 1508
          2⤵
          • Program crash
          PID:4192
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4224 -ip 4224
        1⤵
          PID:4520
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2492 -ip 2492
          1⤵
            PID:3536

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\6503.exe
            Filesize

            1.2MB

            MD5

            b36c6847d5869ecec3b972acd92bb012

            SHA1

            b75b3d199370606558f54d7128f8997f05eb8ea1

            SHA256

            2273c16e6bf0e6149472869ad7edb62c61501e1d34be52c57e9f473f2fb26d7a

            SHA512

            25dce16692bc3404647bdaf261188e420c24f8e7d472761b60b877aa60d316cefdcfbb501487bafa54b685029ba30354ec272c9285740883110b8ad3991bcfb7

          • C:\Users\Admin\AppData\Local\Temp\6503.exe
            Filesize

            1.2MB

            MD5

            b36c6847d5869ecec3b972acd92bb012

            SHA1

            b75b3d199370606558f54d7128f8997f05eb8ea1

            SHA256

            2273c16e6bf0e6149472869ad7edb62c61501e1d34be52c57e9f473f2fb26d7a

            SHA512

            25dce16692bc3404647bdaf261188e420c24f8e7d472761b60b877aa60d316cefdcfbb501487bafa54b685029ba30354ec272c9285740883110b8ad3991bcfb7

          • C:\Users\Admin\AppData\Local\Temp\C506.exe
            Filesize

            304KB

            MD5

            15f1517f0ceaaf9b6c78cf7625510c07

            SHA1

            8aabce20aff43476586a1b69b0b761a7f39d1e7e

            SHA256

            d0d47dec11c63b6fa1a2dcac89e5a7352220e371b728781de041bf42fa8965fb

            SHA512

            931a79a6e0d38c9b59b03a68d31e3c8fdb2b51e5eeed1df45790eba38f516f767ed67d9edd10bef16d169dc253c81ba6afb5d52738761cc2fa84f601f86b3516

          • C:\Users\Admin\AppData\Local\Temp\C506.exe
            Filesize

            304KB

            MD5

            15f1517f0ceaaf9b6c78cf7625510c07

            SHA1

            8aabce20aff43476586a1b69b0b761a7f39d1e7e

            SHA256

            d0d47dec11c63b6fa1a2dcac89e5a7352220e371b728781de041bf42fa8965fb

            SHA512

            931a79a6e0d38c9b59b03a68d31e3c8fdb2b51e5eeed1df45790eba38f516f767ed67d9edd10bef16d169dc253c81ba6afb5d52738761cc2fa84f601f86b3516

          • memory/1252-141-0x0000000000000000-mapping.dmp
          • memory/2472-133-0x00000000006D0000-0x00000000006D9000-memory.dmp
            Filesize

            36KB

          • memory/2472-134-0x0000000000400000-0x000000000057D000-memory.dmp
            Filesize

            1.5MB

          • memory/2472-135-0x0000000000400000-0x000000000057D000-memory.dmp
            Filesize

            1.5MB

          • memory/2472-132-0x0000000000759000-0x000000000076A000-memory.dmp
            Filesize

            68KB

          • memory/2492-140-0x00000000024D0000-0x00000000027AB000-memory.dmp
            Filesize

            2.9MB

          • memory/2492-142-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/2492-143-0x00000000024D0000-0x00000000027AB000-memory.dmp
            Filesize

            2.9MB

          • memory/2492-144-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/2492-169-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/2492-139-0x000000000239B000-0x00000000024C1000-memory.dmp
            Filesize

            1.1MB

          • memory/2492-136-0x0000000000000000-mapping.dmp
          • memory/2492-168-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/2492-167-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/4224-150-0x0000000000400000-0x00000000005A5000-memory.dmp
            Filesize

            1.6MB

          • memory/4224-159-0x0000000006740000-0x000000000675E000-memory.dmp
            Filesize

            120KB

          • memory/4224-152-0x00000000052C0000-0x00000000058D8000-memory.dmp
            Filesize

            6.1MB

          • memory/4224-153-0x0000000005940000-0x0000000005952000-memory.dmp
            Filesize

            72KB

          • memory/4224-154-0x0000000005960000-0x0000000005A6A000-memory.dmp
            Filesize

            1.0MB

          • memory/4224-155-0x0000000005A90000-0x0000000005ACC000-memory.dmp
            Filesize

            240KB

          • memory/4224-156-0x0000000005DA0000-0x0000000005E06000-memory.dmp
            Filesize

            408KB

          • memory/4224-157-0x0000000006550000-0x00000000065E2000-memory.dmp
            Filesize

            584KB

          • memory/4224-158-0x0000000007520000-0x0000000007596000-memory.dmp
            Filesize

            472KB

          • memory/4224-151-0x0000000004D10000-0x00000000052B4000-memory.dmp
            Filesize

            5.6MB

          • memory/4224-160-0x0000000007650000-0x00000000076A0000-memory.dmp
            Filesize

            320KB

          • memory/4224-161-0x00000000008D9000-0x0000000000903000-memory.dmp
            Filesize

            168KB

          • memory/4224-162-0x0000000000400000-0x00000000005A5000-memory.dmp
            Filesize

            1.6MB

          • memory/4224-163-0x0000000006870000-0x0000000006A32000-memory.dmp
            Filesize

            1.8MB

          • memory/4224-164-0x0000000006A50000-0x0000000006F7C000-memory.dmp
            Filesize

            5.2MB

          • memory/4224-165-0x00000000008D9000-0x0000000000903000-memory.dmp
            Filesize

            168KB

          • memory/4224-166-0x0000000000400000-0x00000000005A5000-memory.dmp
            Filesize

            1.6MB

          • memory/4224-149-0x00000000006F0000-0x0000000000727000-memory.dmp
            Filesize

            220KB

          • memory/4224-148-0x00000000008D9000-0x0000000000903000-memory.dmp
            Filesize

            168KB

          • memory/4224-145-0x0000000000000000-mapping.dmp