Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
09-10-2022 18:20
Static task
static1
Behavioral task
behavioral1
Sample
5d862c236bceec83922b1179e7b38ad89dc29d55b478d031e17c1d5a01f55874.exe
Resource
win10-20220901-en
General
-
Target
5d862c236bceec83922b1179e7b38ad89dc29d55b478d031e17c1d5a01f55874.exe
-
Size
269KB
-
MD5
afa77851dfa878fa82de8dfd4184be3f
-
SHA1
17fae8932cf8c98512c5895b2628820dd5e21395
-
SHA256
5d862c236bceec83922b1179e7b38ad89dc29d55b478d031e17c1d5a01f55874
-
SHA512
7b8c14c10585fd66e7bd174906cdfff5581b548e2df9832fcf60863e33083fbb971b844830f1c5155bff70dd10a4063c16bb79eea5cfbb097b34b41d184f58db
-
SSDEEP
3072:+jXJH+hH7+5Pc6vFv5sb1sCVdHNMTj4lb/JP31HOMmBM/h3qpZa9uD6VdyhkhUux:+bRY76FmRsCVdHNQj4rJ4MmBrwVfquS
Malware Config
Extracted
danabot
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/2748-153-0x00000000005D0000-0x00000000005D9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4460 2F0F.exe -
Deletes itself 1 IoCs
pid Process 2364 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5d862c236bceec83922b1179e7b38ad89dc29d55b478d031e17c1d5a01f55874.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5d862c236bceec83922b1179e7b38ad89dc29d55b478d031e17c1d5a01f55874.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5d862c236bceec83922b1179e7b38ad89dc29d55b478d031e17c1d5a01f55874.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2748 5d862c236bceec83922b1179e7b38ad89dc29d55b478d031e17c1d5a01f55874.exe 2748 5d862c236bceec83922b1179e7b38ad89dc29d55b478d031e17c1d5a01f55874.exe 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2364 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2748 5d862c236bceec83922b1179e7b38ad89dc29d55b478d031e17c1d5a01f55874.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2364 Process not Found Token: SeCreatePagefilePrivilege 2364 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2364 wrote to memory of 4460 2364 Process not Found 66 PID 2364 wrote to memory of 4460 2364 Process not Found 66 PID 2364 wrote to memory of 4460 2364 Process not Found 66 PID 4460 wrote to memory of 3804 4460 2F0F.exe 67 PID 4460 wrote to memory of 3804 4460 2F0F.exe 67 PID 4460 wrote to memory of 3804 4460 2F0F.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d862c236bceec83922b1179e7b38ad89dc29d55b478d031e17c1d5a01f55874.exe"C:\Users\Admin\AppData\Local\Temp\5d862c236bceec83922b1179e7b38ad89dc29d55b478d031e17c1d5a01f55874.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2748
-
C:\Users\Admin\AppData\Local\Temp\2F0F.exeC:\Users\Admin\AppData\Local\Temp\2F0F.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\appidtel.exeC:\Windows\system32\appidtel.exe2⤵PID:3804
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD537fd0e3db49a2d9e870a2db891467670
SHA1704397d4906d5835bc9d0d0bfada4f609ebbde17
SHA2563a792be363e901365583a6b68b8f13c8ea2c67a70a086bba2e9a383f887b1e28
SHA512bdce3ff1b3778a838ec926c00d092b1b7020ed6964b2df8d30e2e761264f858385caf0f5ecbb92ae921b18a4abe6610ad30f3ac39bf2810f17035d45665d090d
-
Filesize
1.3MB
MD537fd0e3db49a2d9e870a2db891467670
SHA1704397d4906d5835bc9d0d0bfada4f609ebbde17
SHA2563a792be363e901365583a6b68b8f13c8ea2c67a70a086bba2e9a383f887b1e28
SHA512bdce3ff1b3778a838ec926c00d092b1b7020ed6964b2df8d30e2e761264f858385caf0f5ecbb92ae921b18a4abe6610ad30f3ac39bf2810f17035d45665d090d