Analysis

  • max time kernel
    156s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 16:25

General

  • Target

    6a5cae6d9f10a5bf3bae6240be9b655c30c7ef61805efa18c46b36561284ccbd.exe

  • Size

    145KB

  • MD5

    d02170372ec1718dd970344a82b59c68

  • SHA1

    2a5848e782349bbd844fdd22c69357518e5fda36

  • SHA256

    6a5cae6d9f10a5bf3bae6240be9b655c30c7ef61805efa18c46b36561284ccbd

  • SHA512

    4c3395c9abdb99f57a1732c6d856e91d8c99051d9eb322228203bab9b9533c3adbfa2e041217d25382e639649bc307a3a136134bfc34c60fd1d3fe798fae133e

  • SSDEEP

    3072:84i18a9a3vwVjvDFa3WSuPpaLdzamS12j+O:84n+vDFaGR4ZzpNj+

Malware Config

Extracted

Family

danabot

C2

192.236.233.188:443

192.119.70.159:443

23.106.124.171:443

Attributes
  • embedded_hash

    F11D3871631E16E8DE15C24B32328D98

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 39 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a5cae6d9f10a5bf3bae6240be9b655c30c7ef61805efa18c46b36561284ccbd.exe
    "C:\Users\Admin\AppData\Local\Temp\6a5cae6d9f10a5bf3bae6240be9b655c30c7ef61805efa18c46b36561284ccbd.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:5012
  • C:\Users\Admin\AppData\Local\Temp\7CA2.exe
    C:\Users\Admin\AppData\Local\Temp\7CA2.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3532
    • C:\Windows\SysWOW64\agentactivationruntimestarter.exe
      C:\Windows\system32\agentactivationruntimestarter.exe
      2⤵
        PID:4680
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
          PID:844
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 632
          2⤵
          • Program crash
          PID:1908
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:1132
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x31c 0x454
        1⤵
          PID:4652
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3532 -ip 3532
          1⤵
            PID:1876

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\7CA2.exe

            Filesize

            1.2MB

            MD5

            b5a46f5ab767dd7634ab9dec3de237f1

            SHA1

            aa5be200af2d298e355246c4f597fe90fb248f59

            SHA256

            d4c052cb93c7dea741e2ad6572f6d83c23a2f35bf9ca0c45155ca969cf3513a7

            SHA512

            4c91da8bc5c790cae334051e694f3259075762505da5aab3efba7d7be5cc112f69def2ad54dab3a0f508982972362223d243406be65e23d2f1a1bfa4a12f1124

          • C:\Users\Admin\AppData\Local\Temp\7CA2.exe

            Filesize

            1.2MB

            MD5

            b5a46f5ab767dd7634ab9dec3de237f1

            SHA1

            aa5be200af2d298e355246c4f597fe90fb248f59

            SHA256

            d4c052cb93c7dea741e2ad6572f6d83c23a2f35bf9ca0c45155ca969cf3513a7

            SHA512

            4c91da8bc5c790cae334051e694f3259075762505da5aab3efba7d7be5cc112f69def2ad54dab3a0f508982972362223d243406be65e23d2f1a1bfa4a12f1124

          • memory/3532-141-0x0000000002363000-0x000000000247E000-memory.dmp

            Filesize

            1.1MB

          • memory/3532-142-0x0000000002480000-0x000000000273B000-memory.dmp

            Filesize

            2.7MB

          • memory/3532-143-0x0000000000400000-0x00000000006C7000-memory.dmp

            Filesize

            2.8MB

          • memory/3532-144-0x0000000000400000-0x00000000006C7000-memory.dmp

            Filesize

            2.8MB

          • memory/3532-145-0x0000000000400000-0x00000000006C7000-memory.dmp

            Filesize

            2.8MB

          • memory/3532-146-0x0000000000400000-0x00000000006C7000-memory.dmp

            Filesize

            2.8MB

          • memory/5012-135-0x000000000082D000-0x000000000083D000-memory.dmp

            Filesize

            64KB

          • memory/5012-136-0x0000000000400000-0x0000000000581000-memory.dmp

            Filesize

            1.5MB

          • memory/5012-134-0x0000000000400000-0x0000000000581000-memory.dmp

            Filesize

            1.5MB

          • memory/5012-133-0x0000000000640000-0x0000000000649000-memory.dmp

            Filesize

            36KB

          • memory/5012-132-0x000000000082D000-0x000000000083D000-memory.dmp

            Filesize

            64KB