Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-12-2022 14:43

General

  • Target

    1a74fa2a71de05605f1d77389d181fd6222c8f5040505183740450c23ff33140.exe

  • Size

    383KB

  • MD5

    cda12bd3ffaf1eee175eeb7e895b644c

  • SHA1

    1f230a3603601471ca4698a3a75b60f18b8b933b

  • SHA256

    1a74fa2a71de05605f1d77389d181fd6222c8f5040505183740450c23ff33140

  • SHA512

    190a75649a83bb3a3b315e60d9faebaa04f9fb95a8c389463c51880811c8338f0cc750acac86df045c4da703b3f8a513dd57e81f9d61bdb55d0260f4721f5010

  • SSDEEP

    6144:dfQtL8XSUkX85ZtyClapquB1xqY9xA1hh6K9W9B1gkyded89kTR:dfKgXSlMjtyoapqKDqo8IK9W9B1fzaw

Malware Config

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 21 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a74fa2a71de05605f1d77389d181fd6222c8f5040505183740450c23ff33140.exe
    "C:\Users\Admin\AppData\Local\Temp\1a74fa2a71de05605f1d77389d181fd6222c8f5040505183740450c23ff33140.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3064
  • C:\Users\Admin\AppData\Local\Temp\2E63.exe
    C:\Users\Admin\AppData\Local\Temp\2E63.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4640
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Atdwtfifphqhe.tmp",Eufweypaeeoooya
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:1184
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 18419
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4220
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4908
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k LocalService
      1⤵
        PID:4112

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      3
      T1082

      Query Registry

      2
      T1012

      Peripheral Device Discovery

      1
      T1120

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\2E63.exe
        Filesize

        1.1MB

        MD5

        d04e6d8eb7c75079407f20eee7ed68da

        SHA1

        dde20aea720c09db2afdf8a1d74fce0878d2a295

        SHA256

        a53229a94ed3ed24c4a1f9b9bbff8267076937b12a1698f1e6bf55b056977c88

        SHA512

        6a1c8b6d85bb454db1f57139c7fe70b7cf6583eab75ab685fef98087a76f67b930126a660e69fc5343f126816cc30cd330780c68881b45957786e1b074769658

      • C:\Users\Admin\AppData\Local\Temp\2E63.exe
        Filesize

        1.1MB

        MD5

        d04e6d8eb7c75079407f20eee7ed68da

        SHA1

        dde20aea720c09db2afdf8a1d74fce0878d2a295

        SHA256

        a53229a94ed3ed24c4a1f9b9bbff8267076937b12a1698f1e6bf55b056977c88

        SHA512

        6a1c8b6d85bb454db1f57139c7fe70b7cf6583eab75ab685fef98087a76f67b930126a660e69fc5343f126816cc30cd330780c68881b45957786e1b074769658

      • C:\Users\Admin\AppData\Local\Temp\Atdwtfifphqhe.tmp
        Filesize

        747KB

        MD5

        6b69fff25f9de8575891270476bc3cb8

        SHA1

        9f4dc9d50c8f8584f9bf19e465e4367885ad1233

        SHA256

        bcde33054c45d2f7e5c9d30bbf616ca980f543ae9715f98a888881ce2a9fe188

        SHA512

        3181061184691e1e442d28b93a1b569b0f77a600eb39254e9f7ab663ae89503627276aa417c2c8e3d2b9bdefbc81c68449a86f6d8d3b2ebec4fea340752c007b

      • \Users\Admin\AppData\Local\Temp\Atdwtfifphqhe.tmp
        Filesize

        747KB

        MD5

        6b69fff25f9de8575891270476bc3cb8

        SHA1

        9f4dc9d50c8f8584f9bf19e465e4367885ad1233

        SHA256

        bcde33054c45d2f7e5c9d30bbf616ca980f543ae9715f98a888881ce2a9fe188

        SHA512

        3181061184691e1e442d28b93a1b569b0f77a600eb39254e9f7ab663ae89503627276aa417c2c8e3d2b9bdefbc81c68449a86f6d8d3b2ebec4fea340752c007b

      • memory/1184-208-0x0000000000000000-mapping.dmp
      • memory/1184-310-0x0000000006E10000-0x0000000007535000-memory.dmp
        Filesize

        7.1MB

      • memory/1184-324-0x0000000006AA9000-0x0000000006AAB000-memory.dmp
        Filesize

        8KB

      • memory/1184-327-0x0000000006E10000-0x0000000007535000-memory.dmp
        Filesize

        7.1MB

      • memory/3064-144-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-151-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-130-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-131-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-132-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-133-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-134-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-135-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-136-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-137-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-138-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-139-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-140-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-141-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-142-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-143-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-127-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-146-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-147-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-148-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-149-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-129-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-150-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-152-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-153-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-154-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-155-0x0000000000470000-0x00000000005BA000-memory.dmp
        Filesize

        1.3MB

      • memory/3064-157-0x00000000001D0000-0x00000000001D9000-memory.dmp
        Filesize

        36KB

      • memory/3064-156-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-158-0x0000000000400000-0x0000000000466000-memory.dmp
        Filesize

        408KB

      • memory/3064-159-0x0000000000400000-0x0000000000466000-memory.dmp
        Filesize

        408KB

      • memory/3064-120-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-128-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-126-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-121-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-122-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-125-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-123-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/3064-124-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4220-319-0x00007FF721255FD0-mapping.dmp
      • memory/4220-325-0x0000000000880000-0x0000000000A99000-memory.dmp
        Filesize

        2.1MB

      • memory/4220-326-0x0000016A94CC0000-0x0000016A94EEA000-memory.dmp
        Filesize

        2.2MB

      • memory/4640-160-0x0000000000000000-mapping.dmp
      • memory/4640-167-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-173-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-175-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-174-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-176-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-177-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-178-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-180-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-181-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-182-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-183-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-185-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-186-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-187-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-184-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-179-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-189-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-190-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-192-0x0000000002220000-0x00000000022FC000-memory.dmp
        Filesize

        880KB

      • memory/4640-191-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-193-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-194-0x00000000023D0000-0x00000000024E8000-memory.dmp
        Filesize

        1.1MB

      • memory/4640-172-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-211-0x0000000000400000-0x000000000052A000-memory.dmp
        Filesize

        1.2MB

      • memory/4640-171-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-170-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-168-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-166-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-165-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-164-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-163-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB

      • memory/4640-162-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
        Filesize

        1.6MB