Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
30-09-2022 09:32
Static task
static1
Behavioral task
behavioral1
Sample
685df8974de3a8819711378c48cf2c4393fbef75fe4681438d7ea514efd31542.exe
Resource
win10-20220901-en
General
-
Target
685df8974de3a8819711378c48cf2c4393fbef75fe4681438d7ea514efd31542.exe
-
Size
142KB
-
MD5
0ab96a48cb8cff39cc0528124c467f7e
-
SHA1
5f87e75058bef5af8cb58443c4c2dcbc17a61757
-
SHA256
685df8974de3a8819711378c48cf2c4393fbef75fe4681438d7ea514efd31542
-
SHA512
d4339a4a611555702367d49d1e58ac2498c907453b196679f1a466e415b04b8626857f696825d4f866229143fd213e7aee9c6a50335958d8b57de553f9353df0
-
SSDEEP
3072:/vQUKyj3nlqRdeVHd7t9+vMZBu/EWENqV3MIWxt:vj36QHd7W/EW9Wf
Malware Config
Extracted
danabot
-
embedded_hash
A813CAF845B5703DA814AF785BB60B21
-
type
loader
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/2652-142-0x00000000001E0000-0x00000000001E9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4264 34AC.exe -
Deletes itself 1 IoCs
pid Process 2056 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 685df8974de3a8819711378c48cf2c4393fbef75fe4681438d7ea514efd31542.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 685df8974de3a8819711378c48cf2c4393fbef75fe4681438d7ea514efd31542.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 685df8974de3a8819711378c48cf2c4393fbef75fe4681438d7ea514efd31542.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2652 685df8974de3a8819711378c48cf2c4393fbef75fe4681438d7ea514efd31542.exe 2652 685df8974de3a8819711378c48cf2c4393fbef75fe4681438d7ea514efd31542.exe 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2056 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2652 685df8974de3a8819711378c48cf2c4393fbef75fe4681438d7ea514efd31542.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2056 Process not Found Token: SeCreatePagefilePrivilege 2056 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2056 wrote to memory of 4264 2056 Process not Found 66 PID 2056 wrote to memory of 4264 2056 Process not Found 66 PID 2056 wrote to memory of 4264 2056 Process not Found 66 PID 4264 wrote to memory of 3692 4264 34AC.exe 67 PID 4264 wrote to memory of 3692 4264 34AC.exe 67 PID 4264 wrote to memory of 3692 4264 34AC.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\685df8974de3a8819711378c48cf2c4393fbef75fe4681438d7ea514efd31542.exe"C:\Users\Admin\AppData\Local\Temp\685df8974de3a8819711378c48cf2c4393fbef75fe4681438d7ea514efd31542.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2652
-
C:\Users\Admin\AppData\Local\Temp\34AC.exeC:\Users\Admin\AppData\Local\Temp\34AC.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\appidtel.exeC:\Windows\system32\appidtel.exe2⤵PID:3692
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD57ef0f2ddb052bd5729f6edefd746ab08
SHA1807be81a05efaa42446fededa63c24b40821b091
SHA256950c2f09c77abe2909d1ea99aef20164f517a768a36a79856a1b502b3d1bc2dc
SHA512dcc1f1d47911cb0c3b9dfa99bc6ffa14ecb9771bf052fae8cbbd5afbdf4966995f67838ac8d19b344998026788ac48f7d2e3f9efcd679e6e8c0ddc78dd8f2911
-
Filesize
1.2MB
MD57ef0f2ddb052bd5729f6edefd746ab08
SHA1807be81a05efaa42446fededa63c24b40821b091
SHA256950c2f09c77abe2909d1ea99aef20164f517a768a36a79856a1b502b3d1bc2dc
SHA512dcc1f1d47911cb0c3b9dfa99bc6ffa14ecb9771bf052fae8cbbd5afbdf4966995f67838ac8d19b344998026788ac48f7d2e3f9efcd679e6e8c0ddc78dd8f2911