Analysis

  • max time kernel
    151s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2022 11:24

General

  • Target

    file.exe

  • Size

    276KB

  • MD5

    8a16ba45656454f73c16169a88d867fd

  • SHA1

    cbd09b4d43c2acf42c87d9a6554fc7287d2cf52f

  • SHA256

    94a24841df9e30fab797665446d3ebbf9af6c8157a99d4c3f7afbe64d58777c6

  • SHA512

    de459bfe8839ab647921fb1d6a8e97fafa99a8f56d6e79ca50665c962f4e4751c2c7fda71e5e30b36c5780b6cbded1590775cd1ccea804891cbeaa270b98df43

  • SSDEEP

    6144:sFV1oU2xqOUjJn3CP4XI5obljmGrwVfquS:sFgU28OUSh+dd

Malware Config

Extracted

Family

danabot

C2

192.236.233.188:443

192.119.70.159:443

23.106.124.171:443

213.227.155.103:443

Attributes
  • embedded_hash

    56951C922035D696BFCE443750496462

  • type

    loader

Extracted

Family

systembc

C2

45.182.189.231:443

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 39 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 50 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2620
  • C:\Users\Admin\AppData\Local\Temp\1CB0.exe
    C:\Users\Admin\AppData\Local\Temp\1CB0.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:3360
    • C:\Windows\SysWOW64\agentactivationruntimestarter.exe
      C:\Windows\system32\agentactivationruntimestarter.exe
      2⤵
        PID:3564
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        PID:68
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 620
        2⤵
        • Program crash
        PID:944
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 880
        2⤵
        • Program crash
        PID:3852
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 944
        2⤵
        • Program crash
        PID:3956
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4716
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 944
        2⤵
        • Program crash
        PID:2424
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 1088
        2⤵
        • Program crash
        PID:1372
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 1096
        2⤵
        • Program crash
        PID:1392
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:3844
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x434 0x2d0
      1⤵
        PID:404
      • C:\Users\Admin\AppData\Local\Temp\D3FA.exe
        C:\Users\Admin\AppData\Local\Temp\D3FA.exe
        1⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:4396
      • C:\ProgramData\lmeq\jjtxr.exe
        C:\ProgramData\lmeq\jjtxr.exe start
        1⤵
        • Executes dropped EXE
        PID:1548
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3360 -ip 3360
        1⤵
          PID:4844
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3360 -ip 3360
          1⤵
            PID:4308
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3360 -ip 3360
            1⤵
              PID:3596
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3360 -ip 3360
              1⤵
                PID:4656
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3360 -ip 3360
                1⤵
                  PID:2352
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3360 -ip 3360
                  1⤵
                    PID:792

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Defense Evasion

                  Modify Registry

                  1
                  T1112

                  Discovery

                  System Information Discovery

                  3
                  T1082

                  Query Registry

                  2
                  T1012

                  Peripheral Device Discovery

                  1
                  T1120

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\ProgramData\lmeq\jjtxr.exe
                    Filesize

                    276KB

                    MD5

                    d66be42ac16824299b55cdee82364d6f

                    SHA1

                    2e45e3ea10a9ee00fd3d495e15cef4cf8ca8f4d0

                    SHA256

                    2354b336950524c3f8800bf7f7e812866a64275f8eb590c68e88834ea0f7fb6b

                    SHA512

                    bc6ff2c7e5b36874513f0a8803a6346041bacd6f8bb52c932b25d7dba2f571106250ddef26cc9ee2b45ebe299c94051427c5edd511ea5efc5cfcf3cd675c90c5

                  • C:\ProgramData\lmeq\jjtxr.exe
                    Filesize

                    276KB

                    MD5

                    d66be42ac16824299b55cdee82364d6f

                    SHA1

                    2e45e3ea10a9ee00fd3d495e15cef4cf8ca8f4d0

                    SHA256

                    2354b336950524c3f8800bf7f7e812866a64275f8eb590c68e88834ea0f7fb6b

                    SHA512

                    bc6ff2c7e5b36874513f0a8803a6346041bacd6f8bb52c932b25d7dba2f571106250ddef26cc9ee2b45ebe299c94051427c5edd511ea5efc5cfcf3cd675c90c5

                  • C:\Users\Admin\AppData\Local\Temp\1CB0.exe
                    Filesize

                    1.3MB

                    MD5

                    542994bb707e825fce92a1c80de5c1de

                    SHA1

                    6c5a8fd8d0e74a46ba377870c3ca79de96091edd

                    SHA256

                    f9642f4cd784385d050bef551549507dc8cc295fcd14c62c1c16ba9e11174b0e

                    SHA512

                    72cc54bd47ac2b41904761d24b9071614bef33236123da2ba3b71fc509a167ad042e4ce42d68296616b75a761ab6b0a6ae715aeed733305f5c4fd0fb06d6aa2f

                  • C:\Users\Admin\AppData\Local\Temp\1CB0.exe
                    Filesize

                    1.3MB

                    MD5

                    542994bb707e825fce92a1c80de5c1de

                    SHA1

                    6c5a8fd8d0e74a46ba377870c3ca79de96091edd

                    SHA256

                    f9642f4cd784385d050bef551549507dc8cc295fcd14c62c1c16ba9e11174b0e

                    SHA512

                    72cc54bd47ac2b41904761d24b9071614bef33236123da2ba3b71fc509a167ad042e4ce42d68296616b75a761ab6b0a6ae715aeed733305f5c4fd0fb06d6aa2f

                  • C:\Users\Admin\AppData\Local\Temp\D3FA.exe
                    Filesize

                    276KB

                    MD5

                    d66be42ac16824299b55cdee82364d6f

                    SHA1

                    2e45e3ea10a9ee00fd3d495e15cef4cf8ca8f4d0

                    SHA256

                    2354b336950524c3f8800bf7f7e812866a64275f8eb590c68e88834ea0f7fb6b

                    SHA512

                    bc6ff2c7e5b36874513f0a8803a6346041bacd6f8bb52c932b25d7dba2f571106250ddef26cc9ee2b45ebe299c94051427c5edd511ea5efc5cfcf3cd675c90c5

                  • C:\Users\Admin\AppData\Local\Temp\D3FA.exe
                    Filesize

                    276KB

                    MD5

                    d66be42ac16824299b55cdee82364d6f

                    SHA1

                    2e45e3ea10a9ee00fd3d495e15cef4cf8ca8f4d0

                    SHA256

                    2354b336950524c3f8800bf7f7e812866a64275f8eb590c68e88834ea0f7fb6b

                    SHA512

                    bc6ff2c7e5b36874513f0a8803a6346041bacd6f8bb52c932b25d7dba2f571106250ddef26cc9ee2b45ebe299c94051427c5edd511ea5efc5cfcf3cd675c90c5

                  • C:\Users\Admin\AppData\Local\Temp\Sepawuaopqtypsq.tmp
                    Filesize

                    3.3MB

                    MD5

                    8b9c0f72deaf2ee06e7441209cbe4ffb

                    SHA1

                    34912f3c7f4285d85497c96e95c33e5d6a597c97

                    SHA256

                    1e7242ac7c025b87636e59c07e3601f1bbf5894ce0b23709405b6fefbca4dabe

                    SHA512

                    db8fb980b6331f494fea8dd4adf6d8724c9ad1a7a2048c6d91e49d9e81fc83700c1195854efc5dcbe2b3aef8d94b5f0ddd7ae8910f40b9cdab017e381f855cd7

                  • memory/68-162-0x00000000005B0000-0x00000000005B4000-memory.dmp
                    Filesize

                    16KB

                  • memory/68-157-0x0000000000000000-mapping.dmp
                  • memory/68-171-0x0000000000830000-0x0000000000834000-memory.dmp
                    Filesize

                    16KB

                  • memory/68-165-0x00000000005E0000-0x00000000005E4000-memory.dmp
                    Filesize

                    16KB

                  • memory/68-166-0x00000000005F0000-0x00000000005F4000-memory.dmp
                    Filesize

                    16KB

                  • memory/68-167-0x0000000000800000-0x0000000000804000-memory.dmp
                    Filesize

                    16KB

                  • memory/68-168-0x0000000000810000-0x0000000000814000-memory.dmp
                    Filesize

                    16KB

                  • memory/68-169-0x0000000000820000-0x0000000000824000-memory.dmp
                    Filesize

                    16KB

                  • memory/68-170-0x0000000000830000-0x0000000000834000-memory.dmp
                    Filesize

                    16KB

                  • memory/68-164-0x00000000005D0000-0x00000000005D4000-memory.dmp
                    Filesize

                    16KB

                  • memory/68-163-0x00000000005C0000-0x00000000005C4000-memory.dmp
                    Filesize

                    16KB

                  • memory/68-161-0x00000000005A0000-0x00000000005A4000-memory.dmp
                    Filesize

                    16KB

                  • memory/68-159-0x0000000000580000-0x0000000000584000-memory.dmp
                    Filesize

                    16KB

                  • memory/68-160-0x0000000000590000-0x0000000000594000-memory.dmp
                    Filesize

                    16KB

                  • memory/68-158-0x0000000000570000-0x0000000000574000-memory.dmp
                    Filesize

                    16KB

                  • memory/1548-154-0x0000000000400000-0x000000000044B000-memory.dmp
                    Filesize

                    300KB

                  • memory/1548-153-0x0000000000772000-0x0000000000782000-memory.dmp
                    Filesize

                    64KB

                  • memory/2620-135-0x0000000000400000-0x000000000044B000-memory.dmp
                    Filesize

                    300KB

                  • memory/2620-133-0x0000000000590000-0x0000000000599000-memory.dmp
                    Filesize

                    36KB

                  • memory/2620-132-0x00000000007B7000-0x00000000007C7000-memory.dmp
                    Filesize

                    64KB

                  • memory/2620-134-0x0000000000400000-0x000000000044B000-memory.dmp
                    Filesize

                    300KB

                  • memory/3360-182-0x0000000003E30000-0x0000000003F70000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/3360-177-0x0000000003E30000-0x0000000003F70000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/3360-136-0x0000000000000000-mapping.dmp
                  • memory/3360-193-0x0000000003130000-0x0000000003BF3000-memory.dmp
                    Filesize

                    10.8MB

                  • memory/3360-192-0x0000000000400000-0x00000000006CE000-memory.dmp
                    Filesize

                    2.8MB

                  • memory/3360-184-0x0000000003E30000-0x0000000003F70000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/3360-183-0x0000000003E30000-0x0000000003F70000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/3360-144-0x0000000000400000-0x00000000006CE000-memory.dmp
                    Filesize

                    2.8MB

                  • memory/3360-143-0x00000000024D0000-0x0000000002792000-memory.dmp
                    Filesize

                    2.8MB

                  • memory/3360-142-0x0000000000400000-0x00000000006CE000-memory.dmp
                    Filesize

                    2.8MB

                  • memory/3360-140-0x00000000024D0000-0x0000000002792000-memory.dmp
                    Filesize

                    2.8MB

                  • memory/3360-139-0x0000000000C07000-0x0000000000D25000-memory.dmp
                    Filesize

                    1.1MB

                  • memory/3360-156-0x0000000000400000-0x00000000006CE000-memory.dmp
                    Filesize

                    2.8MB

                  • memory/3360-173-0x0000000003130000-0x0000000003BF3000-memory.dmp
                    Filesize

                    10.8MB

                  • memory/3360-174-0x0000000003130000-0x0000000003BF3000-memory.dmp
                    Filesize

                    10.8MB

                  • memory/3360-175-0x0000000003130000-0x0000000003BF3000-memory.dmp
                    Filesize

                    10.8MB

                  • memory/3360-176-0x0000000003E30000-0x0000000003F70000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/3360-155-0x0000000000400000-0x00000000006CE000-memory.dmp
                    Filesize

                    2.8MB

                  • memory/3360-178-0x0000000003E30000-0x0000000003F70000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/3360-180-0x0000000000400000-0x00000000006CE000-memory.dmp
                    Filesize

                    2.8MB

                  • memory/3360-179-0x0000000003E30000-0x0000000003F70000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/3360-181-0x0000000003E30000-0x0000000003F70000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/3564-141-0x0000000000000000-mapping.dmp
                  • memory/4396-150-0x0000000000400000-0x000000000044B000-memory.dmp
                    Filesize

                    300KB

                  • memory/4396-145-0x0000000000000000-mapping.dmp
                  • memory/4396-148-0x0000000000737000-0x0000000000747000-memory.dmp
                    Filesize

                    64KB

                  • memory/4396-149-0x0000000000560000-0x0000000000569000-memory.dmp
                    Filesize

                    36KB

                  • memory/4716-185-0x0000000000000000-mapping.dmp
                  • memory/4716-186-0x0000000002980000-0x0000000003443000-memory.dmp
                    Filesize

                    10.8MB

                  • memory/4716-187-0x0000000003510000-0x0000000003650000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/4716-188-0x0000000003510000-0x0000000003650000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/4716-189-0x0000000000600000-0x0000000000FA4000-memory.dmp
                    Filesize

                    9.6MB

                  • memory/4716-190-0x0000000002980000-0x0000000003443000-memory.dmp
                    Filesize

                    10.8MB

                  • memory/4716-191-0x0000000002980000-0x0000000003443000-memory.dmp
                    Filesize

                    10.8MB