Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12/10/2022, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
3cc059f1b24d12f7b80420e603fd1ebf96f42fe2f4e6258d6db2c243b89d2c29.exe
Resource
win10-20220812-en
General
-
Target
3cc059f1b24d12f7b80420e603fd1ebf96f42fe2f4e6258d6db2c243b89d2c29.exe
-
Size
295KB
-
MD5
a1ba4e09726e081a6ec2a809cfbb9e4a
-
SHA1
826b76447e9ed29cbdf2f7235e03262a468c41a0
-
SHA256
3cc059f1b24d12f7b80420e603fd1ebf96f42fe2f4e6258d6db2c243b89d2c29
-
SHA512
83792cfe26c719834f9f13af6ca2ae90bfbf1fb9c604e3321b8737a7408d83dc128c0b002b74f7615bfee5a8f0b960c1ecccb354e1f82e2a6f2a1c77d3a5c919
-
SSDEEP
6144:S5COjHJSNXbrG5qVSFqyW9G4xceigavwVfC:SjjoVbrFV3y0JcTZ
Malware Config
Extracted
danabot
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/2696-152-0x00000000001D0000-0x00000000001D9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3416 4D07.exe -
Deletes itself 1 IoCs
pid Process 2328 Process not Found -
Program crash 2 IoCs
pid pid_target Process procid_target 3484 3416 WerFault.exe 66 4100 3416 WerFault.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3cc059f1b24d12f7b80420e603fd1ebf96f42fe2f4e6258d6db2c243b89d2c29.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3cc059f1b24d12f7b80420e603fd1ebf96f42fe2f4e6258d6db2c243b89d2c29.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3cc059f1b24d12f7b80420e603fd1ebf96f42fe2f4e6258d6db2c243b89d2c29.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2696 3cc059f1b24d12f7b80420e603fd1ebf96f42fe2f4e6258d6db2c243b89d2c29.exe 2696 3cc059f1b24d12f7b80420e603fd1ebf96f42fe2f4e6258d6db2c243b89d2c29.exe 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2328 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2696 3cc059f1b24d12f7b80420e603fd1ebf96f42fe2f4e6258d6db2c243b89d2c29.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2328 Process not Found Token: SeCreatePagefilePrivilege 2328 Process not Found Token: SeShutdownPrivilege 2328 Process not Found Token: SeCreatePagefilePrivilege 2328 Process not Found Token: SeShutdownPrivilege 2328 Process not Found Token: SeCreatePagefilePrivilege 2328 Process not Found Token: SeShutdownPrivilege 2328 Process not Found Token: SeCreatePagefilePrivilege 2328 Process not Found -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2328 wrote to memory of 3416 2328 Process not Found 66 PID 2328 wrote to memory of 3416 2328 Process not Found 66 PID 2328 wrote to memory of 3416 2328 Process not Found 66 PID 3416 wrote to memory of 3668 3416 4D07.exe 67 PID 3416 wrote to memory of 3668 3416 4D07.exe 67 PID 3416 wrote to memory of 3668 3416 4D07.exe 67 PID 3416 wrote to memory of 1600 3416 4D07.exe 71 PID 3416 wrote to memory of 1600 3416 4D07.exe 71 PID 3416 wrote to memory of 1600 3416 4D07.exe 71 PID 3416 wrote to memory of 1600 3416 4D07.exe 71 PID 3416 wrote to memory of 1600 3416 4D07.exe 71 PID 3416 wrote to memory of 1600 3416 4D07.exe 71 PID 3416 wrote to memory of 1600 3416 4D07.exe 71 PID 3416 wrote to memory of 1600 3416 4D07.exe 71 PID 3416 wrote to memory of 1600 3416 4D07.exe 71 PID 3416 wrote to memory of 1600 3416 4D07.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cc059f1b24d12f7b80420e603fd1ebf96f42fe2f4e6258d6db2c243b89d2c29.exe"C:\Users\Admin\AppData\Local\Temp\3cc059f1b24d12f7b80420e603fd1ebf96f42fe2f4e6258d6db2c243b89d2c29.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2696
-
C:\Users\Admin\AppData\Local\Temp\4D07.exeC:\Users\Admin\AppData\Local\Temp\4D07.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\appidtel.exeC:\Windows\system32\appidtel.exe2⤵PID:3668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 6202⤵
- Program crash
PID:3484
-
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵PID:1600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 5922⤵
- Program crash
PID:4100
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD56a1f168b1e392b432135c181515d493c
SHA1f7538296961d01ee93158bca2c50eb804c5544c8
SHA2568e2eb8d5fd30baf39cdc6a7fadc7651a90bdee0ab9176af839294cec61c31c3b
SHA512a0aec30d05861acbbedd99d7036533cdd48521d48692281b694718ebe84fd37d587833a96315bc54b9568645ebc24ce8ee0d2b78cc51b9d3ae3c3e3a284d1c1a
-
Filesize
1.3MB
MD56a1f168b1e392b432135c181515d493c
SHA1f7538296961d01ee93158bca2c50eb804c5544c8
SHA2568e2eb8d5fd30baf39cdc6a7fadc7651a90bdee0ab9176af839294cec61c31c3b
SHA512a0aec30d05861acbbedd99d7036533cdd48521d48692281b694718ebe84fd37d587833a96315bc54b9568645ebc24ce8ee0d2b78cc51b9d3ae3c3e3a284d1c1a