Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
17/10/2022, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
b154251b524721e5bbd59b830e76e4cb7c8e20c0555c2d1d4092c7c970a4a879.exe
Resource
win10-20220812-en
General
-
Target
b154251b524721e5bbd59b830e76e4cb7c8e20c0555c2d1d4092c7c970a4a879.exe
-
Size
216KB
-
MD5
4ae89242ec0cfd7252d7d2b2def33e53
-
SHA1
2699edbdfac71959cd2b76b78ad4d0e851bdc418
-
SHA256
b154251b524721e5bbd59b830e76e4cb7c8e20c0555c2d1d4092c7c970a4a879
-
SHA512
6c304ccaa39eb7d7a71169dab94fe913a67ea4afaa36ed8cf47847ae81184babf4ad15c65658456a2c176b9f47231a6d47c57498f98560368f666108f2e2e4f9
-
SSDEEP
3072:GRAZfSxKeEYzwK9CJLtEkYaiEMCZBkboMQ/bMpkor03pp:GGZY5zlILtXYaEoMYbVog3p
Malware Config
Extracted
danabot
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/4324-151-0x00000000005F0000-0x00000000005F9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3784 F6C8.exe -
Deletes itself 1 IoCs
pid Process 2064 Process not Found -
Program crash 2 IoCs
pid pid_target Process procid_target 4296 3784 WerFault.exe 66 3580 3784 WerFault.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b154251b524721e5bbd59b830e76e4cb7c8e20c0555c2d1d4092c7c970a4a879.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b154251b524721e5bbd59b830e76e4cb7c8e20c0555c2d1d4092c7c970a4a879.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b154251b524721e5bbd59b830e76e4cb7c8e20c0555c2d1d4092c7c970a4a879.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4324 b154251b524721e5bbd59b830e76e4cb7c8e20c0555c2d1d4092c7c970a4a879.exe 4324 b154251b524721e5bbd59b830e76e4cb7c8e20c0555c2d1d4092c7c970a4a879.exe 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2064 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4324 b154251b524721e5bbd59b830e76e4cb7c8e20c0555c2d1d4092c7c970a4a879.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2064 Process not Found Token: SeCreatePagefilePrivilege 2064 Process not Found Token: SeShutdownPrivilege 2064 Process not Found Token: SeCreatePagefilePrivilege 2064 Process not Found Token: SeShutdownPrivilege 2064 Process not Found Token: SeCreatePagefilePrivilege 2064 Process not Found Token: SeShutdownPrivilege 2064 Process not Found Token: SeCreatePagefilePrivilege 2064 Process not Found -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2064 wrote to memory of 3784 2064 Process not Found 66 PID 2064 wrote to memory of 3784 2064 Process not Found 66 PID 2064 wrote to memory of 3784 2064 Process not Found 66 PID 3784 wrote to memory of 3056 3784 F6C8.exe 67 PID 3784 wrote to memory of 3056 3784 F6C8.exe 67 PID 3784 wrote to memory of 3056 3784 F6C8.exe 67 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70 PID 3784 wrote to memory of 4272 3784 F6C8.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\b154251b524721e5bbd59b830e76e4cb7c8e20c0555c2d1d4092c7c970a4a879.exe"C:\Users\Admin\AppData\Local\Temp\b154251b524721e5bbd59b830e76e4cb7c8e20c0555c2d1d4092c7c970a4a879.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4324
-
C:\Users\Admin\AppData\Local\Temp\F6C8.exeC:\Users\Admin\AppData\Local\Temp\F6C8.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\appidtel.exeC:\Windows\system32\appidtel.exe2⤵PID:3056
-
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 6042⤵
- Program crash
PID:4296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 6082⤵
- Program crash
PID:3580
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD54301b70694aa61bc7bd67e4abdd2d701
SHA1d5a591abb49bd6770ce778b852f17f64d7d2a827
SHA256c2c61cdd983e97eccc60d93ce4d30c9acba5fcd02c99f9378d374bb2eb64193c
SHA512a5136cc158db7fe7e4bb2028d929e2aec0c65cee07c457bc01c38e774e3cf8b363237e5c61f670f32f335881eea835c96e66abffe10f5021b2ec2972dbc75726
-
Filesize
1.3MB
MD54301b70694aa61bc7bd67e4abdd2d701
SHA1d5a591abb49bd6770ce778b852f17f64d7d2a827
SHA256c2c61cdd983e97eccc60d93ce4d30c9acba5fcd02c99f9378d374bb2eb64193c
SHA512a5136cc158db7fe7e4bb2028d929e2aec0c65cee07c457bc01c38e774e3cf8b363237e5c61f670f32f335881eea835c96e66abffe10f5021b2ec2972dbc75726