Analysis
-
max time kernel
157s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
d7b7d7150d8282dfdfc0de64b54f2c66c82b5e21d180c2dc3566a3205186278f.exe
Resource
win10v2004-20220812-en
General
-
Target
d7b7d7150d8282dfdfc0de64b54f2c66c82b5e21d180c2dc3566a3205186278f.exe
-
Size
193KB
-
MD5
056e389ed68b6441edc19c32cae3c36f
-
SHA1
e8eca80ac1eddd46702ea1f0bda93c537f611928
-
SHA256
d7b7d7150d8282dfdfc0de64b54f2c66c82b5e21d180c2dc3566a3205186278f
-
SHA512
61b3054a7a1f053516cfbdc3167ed044c72f36a2b155391283d5d8030e71ebab941d6ba6dcfef8b7a439b10bdeefb9020b122d4901cda8f741151b1708decbad
-
SSDEEP
3072:z2XOjuimzLDWEBXM05Ftyv4P8/hWQ2oOX0Kfj3:KOuimzLR5McEgkZWQ2TX0O
Malware Config
Extracted
danabot
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/5064-134-0x0000000002180000-0x0000000002189000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3676 4DAE.exe -
Checks SCSI registry key(s) 3 TTPs 39 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d7b7d7150d8282dfdfc0de64b54f2c66c82b5e21d180c2dc3566a3205186278f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 svchost.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d7b7d7150d8282dfdfc0de64b54f2c66c82b5e21d180c2dc3566a3205186278f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d7b7d7150d8282dfdfc0de64b54f2c66c82b5e21d180c2dc3566a3205186278f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5064 d7b7d7150d8282dfdfc0de64b54f2c66c82b5e21d180c2dc3566a3205186278f.exe 5064 d7b7d7150d8282dfdfc0de64b54f2c66c82b5e21d180c2dc3566a3205186278f.exe 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found 2704 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5064 d7b7d7150d8282dfdfc0de64b54f2c66c82b5e21d180c2dc3566a3205186278f.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 3356 svchost.exe Token: SeShutdownPrivilege 3356 svchost.exe Token: SeCreatePagefilePrivilege 3356 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2704 wrote to memory of 3676 2704 Process not Found 90 PID 2704 wrote to memory of 3676 2704 Process not Found 90 PID 2704 wrote to memory of 3676 2704 Process not Found 90 PID 3676 wrote to memory of 2076 3676 4DAE.exe 91 PID 3676 wrote to memory of 2076 3676 4DAE.exe 91 PID 3676 wrote to memory of 2076 3676 4DAE.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7b7d7150d8282dfdfc0de64b54f2c66c82b5e21d180c2dc3566a3205186278f.exe"C:\Users\Admin\AppData\Local\Temp\d7b7d7150d8282dfdfc0de64b54f2c66c82b5e21d180c2dc3566a3205186278f.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5064
-
C:\Users\Admin\AppData\Local\Temp\4DAE.exeC:\Users\Admin\AppData\Local\Temp\4DAE.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\agentactivationruntimestarter.exeC:\Windows\system32\agentactivationruntimestarter.exe2⤵PID:2076
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x49c 0x4f01⤵PID:4384
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5e6c9669200bcd09bc7d634ed43d23c06
SHA1caa393016b0e944f6fb53424161b48b449b0f46b
SHA2563d71d4985c8c7b1183fcee2a969b6267f72e6f3a99f794e52e01229d1e7e5bf0
SHA5125adc06a84be2dacfd266da58d2323bfeae214e1e87ab8cfeae98d7ff6bb39c4b0796aeb0da5a23572a259702584b586cfcc8109044a3f2226e7afe32f8cfcec4
-
Filesize
1.2MB
MD5e6c9669200bcd09bc7d634ed43d23c06
SHA1caa393016b0e944f6fb53424161b48b449b0f46b
SHA2563d71d4985c8c7b1183fcee2a969b6267f72e6f3a99f794e52e01229d1e7e5bf0
SHA5125adc06a84be2dacfd266da58d2323bfeae214e1e87ab8cfeae98d7ff6bb39c4b0796aeb0da5a23572a259702584b586cfcc8109044a3f2226e7afe32f8cfcec4