Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-12-2022 15:27

General

  • Target

    87d32d3297e61ec74139be66495d50ea31a60e44bad698e20fc4449dd56ed032.exe

  • Size

    383KB

  • MD5

    4589373538dde9065d80c540d267d1cb

  • SHA1

    72b31155293a305b0e89420f99cf3fab60c3a3c6

  • SHA256

    87d32d3297e61ec74139be66495d50ea31a60e44bad698e20fc4449dd56ed032

  • SHA512

    0c7fd0d1a9d79c07e9174b9b2e7597909409f19ac6f365b8f76e2a4dc9d655f2b328ed960d1be1021290651d3ee801eace6f04099fd9ada04ed2f60c6f1b1c89

  • SSDEEP

    6144:wh7L8svVrHBDZFil1BG91hh6K9W9AgdtIDXvded89kTR:wpQsvRhDqGIK9W9AgdtIDXgaw

Malware Config

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 26 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87d32d3297e61ec74139be66495d50ea31a60e44bad698e20fc4449dd56ed032.exe
    "C:\Users\Admin\AppData\Local\Temp\87d32d3297e61ec74139be66495d50ea31a60e44bad698e20fc4449dd56ed032.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2188
  • C:\Users\Admin\AppData\Local\Temp\21D0.exe
    C:\Users\Admin\AppData\Local\Temp\21D0.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4336
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Atdwtfifphqhe.tmp",Eufweypaeeoooya
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:1360
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 18419
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:2248
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4540

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    3
    T1012

    System Information Discovery

    3
    T1082

    Peripheral Device Discovery

    1
    T1120

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\21D0.exe
      Filesize

      1.1MB

      MD5

      d04e6d8eb7c75079407f20eee7ed68da

      SHA1

      dde20aea720c09db2afdf8a1d74fce0878d2a295

      SHA256

      a53229a94ed3ed24c4a1f9b9bbff8267076937b12a1698f1e6bf55b056977c88

      SHA512

      6a1c8b6d85bb454db1f57139c7fe70b7cf6583eab75ab685fef98087a76f67b930126a660e69fc5343f126816cc30cd330780c68881b45957786e1b074769658

    • C:\Users\Admin\AppData\Local\Temp\21D0.exe
      Filesize

      1.1MB

      MD5

      d04e6d8eb7c75079407f20eee7ed68da

      SHA1

      dde20aea720c09db2afdf8a1d74fce0878d2a295

      SHA256

      a53229a94ed3ed24c4a1f9b9bbff8267076937b12a1698f1e6bf55b056977c88

      SHA512

      6a1c8b6d85bb454db1f57139c7fe70b7cf6583eab75ab685fef98087a76f67b930126a660e69fc5343f126816cc30cd330780c68881b45957786e1b074769658

    • C:\Users\Admin\AppData\Local\Temp\Atdwtfifphqhe.tmp
      Filesize

      747KB

      MD5

      6b69fff25f9de8575891270476bc3cb8

      SHA1

      9f4dc9d50c8f8584f9bf19e465e4367885ad1233

      SHA256

      bcde33054c45d2f7e5c9d30bbf616ca980f543ae9715f98a888881ce2a9fe188

      SHA512

      3181061184691e1e442d28b93a1b569b0f77a600eb39254e9f7ab663ae89503627276aa417c2c8e3d2b9bdefbc81c68449a86f6d8d3b2ebec4fea340752c007b

    • \Users\Admin\AppData\Local\Temp\Atdwtfifphqhe.tmp
      Filesize

      747KB

      MD5

      6b69fff25f9de8575891270476bc3cb8

      SHA1

      9f4dc9d50c8f8584f9bf19e465e4367885ad1233

      SHA256

      bcde33054c45d2f7e5c9d30bbf616ca980f543ae9715f98a888881ce2a9fe188

      SHA512

      3181061184691e1e442d28b93a1b569b0f77a600eb39254e9f7ab663ae89503627276aa417c2c8e3d2b9bdefbc81c68449a86f6d8d3b2ebec4fea340752c007b

    • memory/1360-211-0x0000000000000000-mapping.dmp
    • memory/1360-330-0x0000000006CC0000-0x00000000073E5000-memory.dmp
      Filesize

      7.1MB

    • memory/1360-323-0x0000000007BA9000-0x0000000007BAB000-memory.dmp
      Filesize

      8KB

    • memory/1360-310-0x0000000006CC0000-0x00000000073E5000-memory.dmp
      Filesize

      7.1MB

    • memory/2188-157-0x0000000000400000-0x0000000000466000-memory.dmp
      Filesize

      408KB

    • memory/2188-142-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-125-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-126-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-127-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-128-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-129-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-130-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-131-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-132-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-133-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-134-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-135-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-136-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-138-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-137-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-139-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-141-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-140-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-148-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-143-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-144-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-145-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-146-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-147-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-120-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-149-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-150-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-152-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-151-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-153-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-154-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-155-0x000000000061C000-0x0000000000632000-memory.dmp
      Filesize

      88KB

    • memory/2188-156-0x00000000001E0000-0x00000000001E9000-memory.dmp
      Filesize

      36KB

    • memory/2188-123-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-158-0x000000000061C000-0x0000000000632000-memory.dmp
      Filesize

      88KB

    • memory/2188-159-0x0000000000400000-0x0000000000466000-memory.dmp
      Filesize

      408KB

    • memory/2188-121-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-124-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2188-122-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2248-329-0x0000022127E40000-0x000002212806A000-memory.dmp
      Filesize

      2.2MB

    • memory/2248-322-0x00007FF6B1485FD0-mapping.dmp
    • memory/2248-326-0x0000000000B20000-0x0000000000D39000-memory.dmp
      Filesize

      2.1MB

    • memory/4336-187-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-177-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-172-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-173-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-167-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-175-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-176-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-186-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-178-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-189-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-180-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-181-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-182-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-183-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-184-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-185-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-174-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-170-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-179-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-188-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-191-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-192-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-165-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-194-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-204-0x0000000002240000-0x0000000002319000-memory.dmp
      Filesize

      868KB

    • memory/4336-205-0x0000000002320000-0x0000000002438000-memory.dmp
      Filesize

      1.1MB

    • memory/4336-193-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-169-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-162-0x0000000000000000-mapping.dmp
    • memory/4336-168-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-164-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-166-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/4336-207-0x0000000000400000-0x000000000052A000-memory.dmp
      Filesize

      1.2MB

    • memory/4336-216-0x0000000000400000-0x000000000052A000-memory.dmp
      Filesize

      1.2MB