Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-09-2022 20:52

General

  • Target

    file.exe

  • Size

    270KB

  • MD5

    8e585d7c9fcc8aef9ab94febdc17de82

  • SHA1

    df345a065922b89243780b45d5fd8769a7e7b24c

  • SHA256

    a6650e8e5968e516505133725bc634c8d524c925bed6de04b068f0f25d469d2b

  • SHA512

    060a11693aa56a03ccc71a54b246264e87c5ce207cbd2dd75fc0e4667f238fa4a9ac163f59b9f7060e0a26b65a8bea81325f48f42785f480ac76b034c5d03f07

  • SSDEEP

    3072:EXhklC/qA0TAJ5MD4/Mb5pBMEcTTvrZakX+cePKOG7xysxkgaBChUpZa9uD6VdyE:A+l3cJ5S46YTQk7eKxviga3wVfg

Malware Config

Extracted

Family

danabot

C2

198.15.112.179:443

185.62.56.245:443

153.92.223.225:443

192.119.70.159:443

Attributes
  • embedded_hash

    6618C163D57D6441FCCA65D86C4D380D

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 39 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4800
  • C:\Users\Admin\AppData\Local\Temp\151E.exe
    C:\Users\Admin\AppData\Local\Temp\151E.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3288
    • C:\Windows\SysWOW64\agentactivationruntimestarter.exe
      C:\Windows\system32\agentactivationruntimestarter.exe
      2⤵
        PID:2504
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        PID:4496
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 620
        2⤵
        • Program crash
        PID:2720
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:996
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4a8 0x4ac
      1⤵
        PID:3184
      • C:\Users\Admin\AppData\Local\Temp\86E4.exe
        C:\Users\Admin\AppData\Local\Temp\86E4.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3660
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3288 -ip 3288
        1⤵
          PID:1852

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\151E.exe

          Filesize

          1.4MB

          MD5

          f403f225202172f1503d4976f6570d3b

          SHA1

          17e90a26988904252e4dffbb5b0a843ef2fc4022

          SHA256

          74ba5191b358bca3cf41a77e2315dbb7d5be92623de497b5b50d0c5edd3fdad7

          SHA512

          b6a0532b2c9e46562d43da470bc7649147dcf73dd9ee2a9b9e00ff3e1208c494bfc5bda47d2bede77d52aee01f26c40db60ad25f2be44f0286be7cc6bebf036f

        • C:\Users\Admin\AppData\Local\Temp\151E.exe

          Filesize

          1.4MB

          MD5

          f403f225202172f1503d4976f6570d3b

          SHA1

          17e90a26988904252e4dffbb5b0a843ef2fc4022

          SHA256

          74ba5191b358bca3cf41a77e2315dbb7d5be92623de497b5b50d0c5edd3fdad7

          SHA512

          b6a0532b2c9e46562d43da470bc7649147dcf73dd9ee2a9b9e00ff3e1208c494bfc5bda47d2bede77d52aee01f26c40db60ad25f2be44f0286be7cc6bebf036f

        • C:\Users\Admin\AppData\Local\Temp\86E4.exe

          Filesize

          304KB

          MD5

          15f1517f0ceaaf9b6c78cf7625510c07

          SHA1

          8aabce20aff43476586a1b69b0b761a7f39d1e7e

          SHA256

          d0d47dec11c63b6fa1a2dcac89e5a7352220e371b728781de041bf42fa8965fb

          SHA512

          931a79a6e0d38c9b59b03a68d31e3c8fdb2b51e5eeed1df45790eba38f516f767ed67d9edd10bef16d169dc253c81ba6afb5d52738761cc2fa84f601f86b3516

        • C:\Users\Admin\AppData\Local\Temp\86E4.exe

          Filesize

          304KB

          MD5

          15f1517f0ceaaf9b6c78cf7625510c07

          SHA1

          8aabce20aff43476586a1b69b0b761a7f39d1e7e

          SHA256

          d0d47dec11c63b6fa1a2dcac89e5a7352220e371b728781de041bf42fa8965fb

          SHA512

          931a79a6e0d38c9b59b03a68d31e3c8fdb2b51e5eeed1df45790eba38f516f767ed67d9edd10bef16d169dc253c81ba6afb5d52738761cc2fa84f601f86b3516

        • memory/2504-140-0x0000000000000000-mapping.dmp

        • memory/3288-136-0x0000000000000000-mapping.dmp

        • memory/3288-156-0x0000000000400000-0x00000000006E8000-memory.dmp

          Filesize

          2.9MB

        • memory/3288-139-0x0000000000948000-0x0000000000A6E000-memory.dmp

          Filesize

          1.1MB

        • memory/3288-141-0x0000000002450000-0x000000000272B000-memory.dmp

          Filesize

          2.9MB

        • memory/3288-157-0x0000000000400000-0x00000000006E8000-memory.dmp

          Filesize

          2.9MB

        • memory/3288-142-0x0000000000400000-0x00000000006E8000-memory.dmp

          Filesize

          2.9MB

        • memory/3288-143-0x0000000000400000-0x00000000006E8000-memory.dmp

          Filesize

          2.9MB

        • memory/3288-170-0x0000000000400000-0x00000000006E8000-memory.dmp

          Filesize

          2.9MB

        • memory/3660-150-0x0000000004BB0000-0x0000000005154000-memory.dmp

          Filesize

          5.6MB

        • memory/3660-155-0x0000000000769000-0x0000000000793000-memory.dmp

          Filesize

          168KB

        • memory/3660-147-0x0000000000769000-0x0000000000793000-memory.dmp

          Filesize

          168KB

        • memory/3660-148-0x0000000000620000-0x0000000000657000-memory.dmp

          Filesize

          220KB

        • memory/3660-149-0x0000000000400000-0x00000000005A5000-memory.dmp

          Filesize

          1.6MB

        • memory/3660-144-0x0000000000000000-mapping.dmp

        • memory/3660-151-0x00000000052A0000-0x00000000058B8000-memory.dmp

          Filesize

          6.1MB

        • memory/3660-152-0x0000000005940000-0x0000000005952000-memory.dmp

          Filesize

          72KB

        • memory/3660-153-0x0000000005960000-0x0000000005A6A000-memory.dmp

          Filesize

          1.0MB

        • memory/3660-154-0x0000000005A90000-0x0000000005ACC000-memory.dmp

          Filesize

          240KB

        • memory/4496-158-0x0000000000000000-mapping.dmp

        • memory/4496-162-0x00000000008D0000-0x00000000008D4000-memory.dmp

          Filesize

          16KB

        • memory/4496-169-0x0000000000940000-0x0000000000944000-memory.dmp

          Filesize

          16KB

        • memory/4496-168-0x0000000000930000-0x0000000000934000-memory.dmp

          Filesize

          16KB

        • memory/4496-159-0x00000000008A0000-0x00000000008A4000-memory.dmp

          Filesize

          16KB

        • memory/4496-160-0x00000000008B0000-0x00000000008B4000-memory.dmp

          Filesize

          16KB

        • memory/4496-161-0x00000000008C0000-0x00000000008C4000-memory.dmp

          Filesize

          16KB

        • memory/4496-167-0x0000000000920000-0x0000000000924000-memory.dmp

          Filesize

          16KB

        • memory/4496-163-0x00000000008E0000-0x00000000008E4000-memory.dmp

          Filesize

          16KB

        • memory/4496-164-0x00000000008F0000-0x00000000008F4000-memory.dmp

          Filesize

          16KB

        • memory/4496-165-0x0000000000900000-0x0000000000904000-memory.dmp

          Filesize

          16KB

        • memory/4496-166-0x0000000000910000-0x0000000000914000-memory.dmp

          Filesize

          16KB

        • memory/4800-135-0x0000000000400000-0x0000000000448000-memory.dmp

          Filesize

          288KB

        • memory/4800-132-0x0000000000603000-0x0000000000613000-memory.dmp

          Filesize

          64KB

        • memory/4800-134-0x0000000000400000-0x0000000000448000-memory.dmp

          Filesize

          288KB

        • memory/4800-133-0x00000000001F0000-0x00000000001F9000-memory.dmp

          Filesize

          36KB