Analysis
-
max time kernel
182s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2022 07:48
Static task
static1
Behavioral task
behavioral1
Sample
a5b8a26e9a16c31c4e6cbec34860b681d59c86e18b69a35438b4b8e1eeed73bd.exe
Resource
win10v2004-20220812-en
General
-
Target
a5b8a26e9a16c31c4e6cbec34860b681d59c86e18b69a35438b4b8e1eeed73bd.exe
-
Size
382KB
-
MD5
bfdab4f18772cdd4872c99deae3a429e
-
SHA1
37c4606445870ec22fa03751e7273bb388b2df45
-
SHA256
a5b8a26e9a16c31c4e6cbec34860b681d59c86e18b69a35438b4b8e1eeed73bd
-
SHA512
e9f054f2a220164269f488a47adfdc35e21302fe59452d732d6a7cb8e7ce6e30baa9696de06f77989e95ae5345fa790a3890e367065233b70fb2bc4445fd9afa
-
SSDEEP
6144:3kDLlowxxoIRBDDkK61whwhh6K9W9Cbtded89kTt:34Bow39RB3J6RIK9W9pac
Malware Config
Extracted
danabot
-
embedded_hash
341D2FD1638BB267A80C7445E1909B57
-
type
loader
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/920-133-0x0000000000500000-0x0000000000509000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
efgwsii877B.exepid process 2428 efgwsii 4524 877B.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 5028 rundll32.exe 5028 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4196 4524 WerFault.exe 877B.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
a5b8a26e9a16c31c4e6cbec34860b681d59c86e18b69a35438b4b8e1eeed73bd.exeefgwsiidescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a5b8a26e9a16c31c4e6cbec34860b681d59c86e18b69a35438b4b8e1eeed73bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI efgwsii Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI efgwsii Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI efgwsii Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a5b8a26e9a16c31c4e6cbec34860b681d59c86e18b69a35438b4b8e1eeed73bd.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a5b8a26e9a16c31c4e6cbec34860b681d59c86e18b69a35438b4b8e1eeed73bd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a5b8a26e9a16c31c4e6cbec34860b681d59c86e18b69a35438b4b8e1eeed73bd.exepid process 920 a5b8a26e9a16c31c4e6cbec34860b681d59c86e18b69a35438b4b8e1eeed73bd.exe 920 a5b8a26e9a16c31c4e6cbec34860b681d59c86e18b69a35438b4b8e1eeed73bd.exe 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 3076 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3076 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
a5b8a26e9a16c31c4e6cbec34860b681d59c86e18b69a35438b4b8e1eeed73bd.exeefgwsiipid process 920 a5b8a26e9a16c31c4e6cbec34860b681d59c86e18b69a35438b4b8e1eeed73bd.exe 2428 efgwsii -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3076 Token: SeCreatePagefilePrivilege 3076 Token: SeShutdownPrivilege 3076 Token: SeCreatePagefilePrivilege 3076 -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
877B.exedescription pid process target process PID 3076 wrote to memory of 4524 3076 877B.exe PID 3076 wrote to memory of 4524 3076 877B.exe PID 3076 wrote to memory of 4524 3076 877B.exe PID 4524 wrote to memory of 5028 4524 877B.exe rundll32.exe PID 4524 wrote to memory of 5028 4524 877B.exe rundll32.exe PID 4524 wrote to memory of 5028 4524 877B.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5b8a26e9a16c31c4e6cbec34860b681d59c86e18b69a35438b4b8e1eeed73bd.exe"C:\Users\Admin\AppData\Local\Temp\a5b8a26e9a16c31c4e6cbec34860b681d59c86e18b69a35438b4b8e1eeed73bd.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Roaming\efgwsiiC:\Users\Admin\AppData\Roaming\efgwsii1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\877B.exeC:\Users\Admin\AppData\Local\Temp\877B.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Didddpquafu.dll,start2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 6202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4524 -ip 45241⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\877B.exeFilesize
2.6MB
MD5e7d4b22745e2ac7b9057ddb0d8be5ab6
SHA1adf825132fe114caff00de8f4b91f2e2b8c0d577
SHA2561c2d3e3a602530705040873f42a3bf8b93e711b28d122087c48cd0a839a49bc3
SHA51262a3e04dedd7adb38678d956e19b37f5105b9bf29400f6bc42772ed6237136cd5b82a70abf89f8af28ee59ac9d150e7ddd320f7740a02ca59a9bf011cd8e98f3
-
C:\Users\Admin\AppData\Local\Temp\877B.exeFilesize
2.6MB
MD5e7d4b22745e2ac7b9057ddb0d8be5ab6
SHA1adf825132fe114caff00de8f4b91f2e2b8c0d577
SHA2561c2d3e3a602530705040873f42a3bf8b93e711b28d122087c48cd0a839a49bc3
SHA51262a3e04dedd7adb38678d956e19b37f5105b9bf29400f6bc42772ed6237136cd5b82a70abf89f8af28ee59ac9d150e7ddd320f7740a02ca59a9bf011cd8e98f3
-
C:\Users\Admin\AppData\Local\Temp\Didddpquafu.dllFilesize
2.4MB
MD5f51add44409384c37f9f6713a3da86b0
SHA1d07c4b571a27a5cd4b9134c916f960eaa67b112c
SHA256737219233901831c88d5ba9ca5571cf569fd22872c01086f95811a20e7a01679
SHA51276a849d942e6719e6c795fd82468eb10847df006f1baee4d717bee0c5436590d8dcf4a5d1a1c39a1919f8811037e61dbf4799c797be878b064ad8b9f3fdc9d85
-
C:\Users\Admin\AppData\Local\Temp\Didddpquafu.dllFilesize
2.4MB
MD5f51add44409384c37f9f6713a3da86b0
SHA1d07c4b571a27a5cd4b9134c916f960eaa67b112c
SHA256737219233901831c88d5ba9ca5571cf569fd22872c01086f95811a20e7a01679
SHA51276a849d942e6719e6c795fd82468eb10847df006f1baee4d717bee0c5436590d8dcf4a5d1a1c39a1919f8811037e61dbf4799c797be878b064ad8b9f3fdc9d85
-
C:\Users\Admin\AppData\Local\Temp\Didddpquafu.dllFilesize
2.4MB
MD5f51add44409384c37f9f6713a3da86b0
SHA1d07c4b571a27a5cd4b9134c916f960eaa67b112c
SHA256737219233901831c88d5ba9ca5571cf569fd22872c01086f95811a20e7a01679
SHA51276a849d942e6719e6c795fd82468eb10847df006f1baee4d717bee0c5436590d8dcf4a5d1a1c39a1919f8811037e61dbf4799c797be878b064ad8b9f3fdc9d85
-
C:\Users\Admin\AppData\Roaming\efgwsiiFilesize
382KB
MD5bfdab4f18772cdd4872c99deae3a429e
SHA137c4606445870ec22fa03751e7273bb388b2df45
SHA256a5b8a26e9a16c31c4e6cbec34860b681d59c86e18b69a35438b4b8e1eeed73bd
SHA512e9f054f2a220164269f488a47adfdc35e21302fe59452d732d6a7cb8e7ce6e30baa9696de06f77989e95ae5345fa790a3890e367065233b70fb2bc4445fd9afa
-
C:\Users\Admin\AppData\Roaming\efgwsiiFilesize
382KB
MD5bfdab4f18772cdd4872c99deae3a429e
SHA137c4606445870ec22fa03751e7273bb388b2df45
SHA256a5b8a26e9a16c31c4e6cbec34860b681d59c86e18b69a35438b4b8e1eeed73bd
SHA512e9f054f2a220164269f488a47adfdc35e21302fe59452d732d6a7cb8e7ce6e30baa9696de06f77989e95ae5345fa790a3890e367065233b70fb2bc4445fd9afa
-
memory/920-135-0x0000000000547000-0x000000000055D000-memory.dmpFilesize
88KB
-
memory/920-132-0x0000000000547000-0x000000000055D000-memory.dmpFilesize
88KB
-
memory/920-136-0x0000000000400000-0x0000000000466000-memory.dmpFilesize
408KB
-
memory/920-134-0x0000000000400000-0x0000000000466000-memory.dmpFilesize
408KB
-
memory/920-133-0x0000000000500000-0x0000000000509000-memory.dmpFilesize
36KB
-
memory/2428-140-0x0000000000400000-0x0000000000466000-memory.dmpFilesize
408KB
-
memory/2428-141-0x0000000000400000-0x0000000000466000-memory.dmpFilesize
408KB
-
memory/2428-139-0x00000000006B7000-0x00000000006CC000-memory.dmpFilesize
84KB
-
memory/4524-142-0x0000000000000000-mapping.dmp
-
memory/4524-148-0x0000000000400000-0x0000000000792000-memory.dmpFilesize
3.6MB
-
memory/4524-146-0x00000000026C0000-0x0000000002A45000-memory.dmpFilesize
3.5MB
-
memory/4524-145-0x0000000000BD2000-0x0000000000E1D000-memory.dmpFilesize
2.3MB
-
memory/4524-153-0x00000000026C0000-0x0000000002A45000-memory.dmpFilesize
3.5MB
-
memory/4524-154-0x0000000000400000-0x0000000000792000-memory.dmpFilesize
3.6MB
-
memory/5028-147-0x0000000000000000-mapping.dmp
-
memory/5028-152-0x00000000021C0000-0x0000000002431000-memory.dmpFilesize
2.4MB