Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-09-2022 16:52

General

  • Target

    8e515af7458e5ba4c811105fd16aa55a7b2d4746d8d6455d4de171e1bcb4f491.exe

  • Size

    329KB

  • MD5

    3760371240026648da3a426888ec2767

  • SHA1

    dfedf2d331df88103ea9449f00927322ad523710

  • SHA256

    8e515af7458e5ba4c811105fd16aa55a7b2d4746d8d6455d4de171e1bcb4f491

  • SHA512

    7748eff2c69a414b8e70979afdf3a342a6bab799bdafae7481cade210111baa29bfa7e36499c793c7a279dc9e800215c37f88e6a3ead51f9a50d284419774962

  • SSDEEP

    6144:NYn7gjbhe56QIAwkGCCImLd0RTcnigabwVfs:NYn7gBe5jxwk+imiB

Malware Config

Extracted

Family

danabot

Attributes
  • embedded_hash

    6618C163D57D6441FCCA65D86C4D380D

  • type

    loader

Extracted

Family

redline

Botnet

insmix

C2

jamesmillion2.xyz:9420

Attributes
  • auth_value

    f388a05524f756108c9e4b0f4c4bafb6

Extracted

Family

systembc

C2

141.98.82.229:4001

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e515af7458e5ba4c811105fd16aa55a7b2d4746d8d6455d4de171e1bcb4f491.exe
    "C:\Users\Admin\AppData\Local\Temp\8e515af7458e5ba4c811105fd16aa55a7b2d4746d8d6455d4de171e1bcb4f491.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:344
  • C:\Users\Admin\AppData\Local\Temp\3B24.exe
    C:\Users\Admin\AppData\Local\Temp\3B24.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Windows\SysWOW64\appidtel.exe
      C:\Windows\system32\appidtel.exe
      2⤵
        PID:4040
    • C:\Users\Admin\AppData\Local\Temp\AE42.exe
      C:\Users\Admin\AppData\Local\Temp\AE42.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4608
    • C:\Users\Admin\AppData\Local\Temp\EE2B.exe
      C:\Users\Admin\AppData\Local\Temp\EE2B.exe
      1⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:4892
    • C:\ProgramData\meqjpxb\nhabvr.exe
      C:\ProgramData\meqjpxb\nhabvr.exe start
      1⤵
      • Executes dropped EXE
      PID:384

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    2
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\meqjpxb\nhabvr.exe
      Filesize

      329KB

      MD5

      5a97df322aaa1061de7186b345a03a85

      SHA1

      1aa1df1b086e92c4d29435de5ec20897e531f862

      SHA256

      ecc6272c6638604a841838537580c6f935c0701f0ada36a1ebf056b7b262cbb9

      SHA512

      22e36053ff0a2866295dda8be6bbaf912c55f882d54aab98e1b17712ceaa860f8f5ad8a1458fb89a3465c09cbbea37123d9d4cb6b09239f981debba866b08e13

    • C:\ProgramData\meqjpxb\nhabvr.exe
      Filesize

      329KB

      MD5

      5a97df322aaa1061de7186b345a03a85

      SHA1

      1aa1df1b086e92c4d29435de5ec20897e531f862

      SHA256

      ecc6272c6638604a841838537580c6f935c0701f0ada36a1ebf056b7b262cbb9

      SHA512

      22e36053ff0a2866295dda8be6bbaf912c55f882d54aab98e1b17712ceaa860f8f5ad8a1458fb89a3465c09cbbea37123d9d4cb6b09239f981debba866b08e13

    • C:\Users\Admin\AppData\Local\Temp\3B24.exe
      Filesize

      1.4MB

      MD5

      fc33cf03d61eaeff9d0556d2bede67f0

      SHA1

      21170d09ff52a09b127341db22a195015d9b517d

      SHA256

      0b138f03a0188e07a25495c5be7f5794c7f66ee121960019ded8264bc41b9a10

      SHA512

      8bcfa32d5291244d1b7e490d8dc0b34436476206c62eb7d3f234228df42ad11612534cea5946c107ac631fffa10e14ec3f8d2cf87ef425c95b187043a58eafb3

    • C:\Users\Admin\AppData\Local\Temp\3B24.exe
      Filesize

      1.4MB

      MD5

      fc33cf03d61eaeff9d0556d2bede67f0

      SHA1

      21170d09ff52a09b127341db22a195015d9b517d

      SHA256

      0b138f03a0188e07a25495c5be7f5794c7f66ee121960019ded8264bc41b9a10

      SHA512

      8bcfa32d5291244d1b7e490d8dc0b34436476206c62eb7d3f234228df42ad11612534cea5946c107ac631fffa10e14ec3f8d2cf87ef425c95b187043a58eafb3

    • C:\Users\Admin\AppData\Local\Temp\AE42.exe
      Filesize

      304KB

      MD5

      15f1517f0ceaaf9b6c78cf7625510c07

      SHA1

      8aabce20aff43476586a1b69b0b761a7f39d1e7e

      SHA256

      d0d47dec11c63b6fa1a2dcac89e5a7352220e371b728781de041bf42fa8965fb

      SHA512

      931a79a6e0d38c9b59b03a68d31e3c8fdb2b51e5eeed1df45790eba38f516f767ed67d9edd10bef16d169dc253c81ba6afb5d52738761cc2fa84f601f86b3516

    • C:\Users\Admin\AppData\Local\Temp\AE42.exe
      Filesize

      304KB

      MD5

      15f1517f0ceaaf9b6c78cf7625510c07

      SHA1

      8aabce20aff43476586a1b69b0b761a7f39d1e7e

      SHA256

      d0d47dec11c63b6fa1a2dcac89e5a7352220e371b728781de041bf42fa8965fb

      SHA512

      931a79a6e0d38c9b59b03a68d31e3c8fdb2b51e5eeed1df45790eba38f516f767ed67d9edd10bef16d169dc253c81ba6afb5d52738761cc2fa84f601f86b3516

    • C:\Users\Admin\AppData\Local\Temp\EE2B.exe
      Filesize

      329KB

      MD5

      5a97df322aaa1061de7186b345a03a85

      SHA1

      1aa1df1b086e92c4d29435de5ec20897e531f862

      SHA256

      ecc6272c6638604a841838537580c6f935c0701f0ada36a1ebf056b7b262cbb9

      SHA512

      22e36053ff0a2866295dda8be6bbaf912c55f882d54aab98e1b17712ceaa860f8f5ad8a1458fb89a3465c09cbbea37123d9d4cb6b09239f981debba866b08e13

    • C:\Users\Admin\AppData\Local\Temp\EE2B.exe
      Filesize

      329KB

      MD5

      5a97df322aaa1061de7186b345a03a85

      SHA1

      1aa1df1b086e92c4d29435de5ec20897e531f862

      SHA256

      ecc6272c6638604a841838537580c6f935c0701f0ada36a1ebf056b7b262cbb9

      SHA512

      22e36053ff0a2866295dda8be6bbaf912c55f882d54aab98e1b17712ceaa860f8f5ad8a1458fb89a3465c09cbbea37123d9d4cb6b09239f981debba866b08e13

    • memory/344-146-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-151-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-130-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-131-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-132-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-134-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-133-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-135-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-136-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-137-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-138-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-139-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-140-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-141-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-142-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-144-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-143-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-145-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-128-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-147-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-148-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-149-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-150-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-129-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-152-0x000000000067C000-0x000000000068D000-memory.dmp
      Filesize

      68KB

    • memory/344-153-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-154-0x00000000001E0000-0x00000000001E9000-memory.dmp
      Filesize

      36KB

    • memory/344-156-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/344-155-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-157-0x000000000067C000-0x000000000068D000-memory.dmp
      Filesize

      68KB

    • memory/344-158-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/344-121-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-127-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-122-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-120-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-123-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-124-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-126-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/344-125-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/384-423-0x0000000000755000-0x0000000000765000-memory.dmp
      Filesize

      64KB

    • memory/384-425-0x00000000004A0000-0x00000000005EA000-memory.dmp
      Filesize

      1.3MB

    • memory/384-435-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/384-438-0x0000000000755000-0x0000000000765000-memory.dmp
      Filesize

      64KB

    • memory/384-439-0x00000000004A0000-0x00000000005EA000-memory.dmp
      Filesize

      1.3MB

    • memory/4040-195-0x0000000000000000-mapping.dmp
    • memory/4608-274-0x0000000005220000-0x0000000005826000-memory.dmp
      Filesize

      6.0MB

    • memory/4608-323-0x0000000000400000-0x00000000005A5000-memory.dmp
      Filesize

      1.6MB

    • memory/4608-322-0x0000000000816000-0x0000000000840000-memory.dmp
      Filesize

      168KB

    • memory/4608-317-0x00000000005B0000-0x00000000006FA000-memory.dmp
      Filesize

      1.3MB

    • memory/4608-316-0x0000000000816000-0x0000000000840000-memory.dmp
      Filesize

      168KB

    • memory/4608-310-0x00000000068B0000-0x0000000006DDC000-memory.dmp
      Filesize

      5.2MB

    • memory/4608-309-0x00000000066D0000-0x0000000006892000-memory.dmp
      Filesize

      1.8MB

    • memory/4608-308-0x0000000006680000-0x00000000066D0000-memory.dmp
      Filesize

      320KB

    • memory/4608-307-0x00000000065D0000-0x00000000065EE000-memory.dmp
      Filesize

      120KB

    • memory/4608-306-0x0000000006510000-0x0000000006586000-memory.dmp
      Filesize

      472KB

    • memory/4608-298-0x0000000005D50000-0x0000000005DB6000-memory.dmp
      Filesize

      408KB

    • memory/4608-296-0x0000000005CB0000-0x0000000005D42000-memory.dmp
      Filesize

      584KB

    • memory/4608-287-0x0000000005A10000-0x0000000005A5B000-memory.dmp
      Filesize

      300KB

    • memory/4608-279-0x00000000059A0000-0x00000000059DE000-memory.dmp
      Filesize

      248KB

    • memory/4608-276-0x0000000005870000-0x000000000597A000-memory.dmp
      Filesize

      1.0MB

    • memory/4608-275-0x0000000005840000-0x0000000005852000-memory.dmp
      Filesize

      72KB

    • memory/4608-263-0x0000000004C40000-0x0000000004C6E000-memory.dmp
      Filesize

      184KB

    • memory/4608-261-0x0000000004D20000-0x000000000521E000-memory.dmp
      Filesize

      5.0MB

    • memory/4608-256-0x0000000002420000-0x0000000002450000-memory.dmp
      Filesize

      192KB

    • memory/4608-253-0x0000000000400000-0x00000000005A5000-memory.dmp
      Filesize

      1.6MB

    • memory/4608-252-0x00000000005B0000-0x00000000006FA000-memory.dmp
      Filesize

      1.3MB

    • memory/4608-250-0x0000000000816000-0x0000000000840000-memory.dmp
      Filesize

      168KB

    • memory/4608-210-0x0000000000000000-mapping.dmp
    • memory/4616-180-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-193-0x00000000023E0000-0x0000000002512000-memory.dmp
      Filesize

      1.2MB

    • memory/4616-178-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-172-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-171-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-173-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-196-0x0000000000400000-0x00000000006E8000-memory.dmp
      Filesize

      2.9MB

    • memory/4616-179-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-192-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-191-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-190-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-170-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-208-0x00000000023E0000-0x0000000002512000-memory.dmp
      Filesize

      1.2MB

    • memory/4616-188-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-186-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-185-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-184-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-183-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-182-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-181-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-189-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-209-0x0000000000400000-0x00000000006E8000-memory.dmp
      Filesize

      2.9MB

    • memory/4616-194-0x0000000002550000-0x000000000282B000-memory.dmp
      Filesize

      2.9MB

    • memory/4616-177-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-176-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-174-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-175-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-159-0x0000000000000000-mapping.dmp
    • memory/4616-169-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-167-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-161-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-437-0x0000000000400000-0x00000000006E8000-memory.dmp
      Filesize

      2.9MB

    • memory/4616-163-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-166-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-165-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-162-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4616-164-0x0000000077170000-0x00000000772FE000-memory.dmp
      Filesize

      1.6MB

    • memory/4892-414-0x00000000005A0000-0x00000000006EA000-memory.dmp
      Filesize

      1.3MB

    • memory/4892-383-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/4892-382-0x0000000000580000-0x0000000000589000-memory.dmp
      Filesize

      36KB

    • memory/4892-381-0x00000000005A0000-0x00000000006EA000-memory.dmp
      Filesize

      1.3MB

    • memory/4892-324-0x0000000000000000-mapping.dmp