Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2022 21:43

General

  • Target

    d1ed125eb1775546c75daf8cbeb11f75d02f16f3ce7eaefa649529bce043ed3f.exe

  • Size

    215KB

  • MD5

    3614cd25b19543f02ba2e54cffcc733d

  • SHA1

    4f0eeab3966e7c733c164d801f24659b39051c7f

  • SHA256

    d1ed125eb1775546c75daf8cbeb11f75d02f16f3ce7eaefa649529bce043ed3f

  • SHA512

    d5c4ac0a74c5759c687059efb40f0ada7e7429f0fe6ae82d754b38a8d8063344f4bbfd190da806e6272e664dd401d6f7fdac562d232436ae92c33174c9e172f0

  • SSDEEP

    3072:9hxpqLrgLaRl8fv+sr8P+oG4Ta1B0jJI8bFKVaaNRAtOba+VPCsjcbImdzmuX:9PpqLrgcSojO1OsVN0OvjcbXF

Malware Config

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 21 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1ed125eb1775546c75daf8cbeb11f75d02f16f3ce7eaefa649529bce043ed3f.exe
    "C:\Users\Admin\AppData\Local\Temp\d1ed125eb1775546c75daf8cbeb11f75d02f16f3ce7eaefa649529bce043ed3f.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1572
  • C:\Users\Admin\AppData\Local\Temp\1194.exe
    C:\Users\Admin\AppData\Local\Temp\1194.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:728
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp",Sufeidweoe
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:3104
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 23999
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:3852
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 728 -s 536
      2⤵
      • Program crash
      PID:2932
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 728 -ip 728
    1⤵
      PID:2852
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1768

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\1194.exe
        Filesize

        1005KB

        MD5

        52a4ac130352fd65ad0f411799d74abe

        SHA1

        bb2d4993fc3cf1b110e81a68a26c606f71c10c3e

        SHA256

        1880b1a25e05835f30fb291b7871e594a85aec146c659ee32b8ab4f950635a4f

        SHA512

        2115c912a44b6e881558c6c593bf480882bdcddadb7401a1cea0841946f848865992287429eaf4d2950fb1f2753b903a5e58cafb9c5b7b06e909def98673bfbf

      • C:\Users\Admin\AppData\Local\Temp\1194.exe
        Filesize

        1005KB

        MD5

        52a4ac130352fd65ad0f411799d74abe

        SHA1

        bb2d4993fc3cf1b110e81a68a26c606f71c10c3e

        SHA256

        1880b1a25e05835f30fb291b7871e594a85aec146c659ee32b8ab4f950635a4f

        SHA512

        2115c912a44b6e881558c6c593bf480882bdcddadb7401a1cea0841946f848865992287429eaf4d2950fb1f2753b903a5e58cafb9c5b7b06e909def98673bfbf

      • C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp
        Filesize

        726KB

        MD5

        6ea8a6cc5fed6c664df1b3ef7c56b55d

        SHA1

        6b244d708706441095ae97294928967ddf28432b

        SHA256

        2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe

        SHA512

        4a328a66df407e4c9fa230287104771ea3b5dd8265d60314797426101a8be19d13bc57de2388f0f90b20ada82d950e156ef4267c029080a6254b80eefd8b8741

      • C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp
        Filesize

        726KB

        MD5

        6ea8a6cc5fed6c664df1b3ef7c56b55d

        SHA1

        6b244d708706441095ae97294928967ddf28432b

        SHA256

        2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe

        SHA512

        4a328a66df407e4c9fa230287104771ea3b5dd8265d60314797426101a8be19d13bc57de2388f0f90b20ada82d950e156ef4267c029080a6254b80eefd8b8741

      • memory/728-168-0x0000000000400000-0x0000000000523000-memory.dmp
        Filesize

        1.1MB

      • memory/728-167-0x00000000022D0000-0x00000000023E5000-memory.dmp
        Filesize

        1.1MB

      • memory/728-166-0x00000000021F2000-0x00000000022C8000-memory.dmp
        Filesize

        856KB

      • memory/728-157-0x0000000000000000-mapping.dmp
      • memory/1572-132-0x00000000004E8000-0x00000000004F9000-memory.dmp
        Filesize

        68KB

      • memory/1572-133-0x0000000002190000-0x0000000002199000-memory.dmp
        Filesize

        36KB

      • memory/1572-134-0x0000000000400000-0x000000000045D000-memory.dmp
        Filesize

        372KB

      • memory/1572-135-0x0000000000400000-0x000000000045D000-memory.dmp
        Filesize

        372KB

      • memory/2056-145-0x0000000002DF0000-0x0000000002E00000-memory.dmp
        Filesize

        64KB

      • memory/2056-136-0x0000000002DF0000-0x0000000002E00000-memory.dmp
        Filesize

        64KB

      • memory/2056-146-0x0000000002DF0000-0x0000000002E00000-memory.dmp
        Filesize

        64KB

      • memory/2056-147-0x0000000002DF0000-0x0000000002E00000-memory.dmp
        Filesize

        64KB

      • memory/2056-148-0x0000000002DF0000-0x0000000002E00000-memory.dmp
        Filesize

        64KB

      • memory/2056-149-0x0000000002DF0000-0x0000000002E00000-memory.dmp
        Filesize

        64KB

      • memory/2056-150-0x0000000002DF0000-0x0000000002E00000-memory.dmp
        Filesize

        64KB

      • memory/2056-151-0x0000000002DF0000-0x0000000002E00000-memory.dmp
        Filesize

        64KB

      • memory/2056-152-0x0000000002DF0000-0x0000000002E00000-memory.dmp
        Filesize

        64KB

      • memory/2056-153-0x0000000007BF0000-0x0000000007C00000-memory.dmp
        Filesize

        64KB

      • memory/2056-154-0x0000000007C20000-0x0000000007C30000-memory.dmp
        Filesize

        64KB

      • memory/2056-155-0x0000000007C20000-0x0000000007C30000-memory.dmp
        Filesize

        64KB

      • memory/2056-156-0x0000000007C20000-0x0000000007C30000-memory.dmp
        Filesize

        64KB

      • memory/2056-143-0x0000000002DF0000-0x0000000002E00000-memory.dmp
        Filesize

        64KB

      • memory/2056-142-0x0000000002DF0000-0x0000000002E00000-memory.dmp
        Filesize

        64KB

      • memory/2056-141-0x0000000002DF0000-0x0000000002E00000-memory.dmp
        Filesize

        64KB

      • memory/2056-160-0x0000000007C20000-0x0000000007C30000-memory.dmp
        Filesize

        64KB

      • memory/2056-162-0x0000000007C20000-0x0000000007C30000-memory.dmp
        Filesize

        64KB

      • memory/2056-161-0x0000000007C20000-0x0000000007C30000-memory.dmp
        Filesize

        64KB

      • memory/2056-144-0x0000000002DF0000-0x0000000002E00000-memory.dmp
        Filesize

        64KB

      • memory/2056-140-0x0000000002DF0000-0x0000000002E00000-memory.dmp
        Filesize

        64KB

      • memory/2056-139-0x0000000002DF0000-0x0000000002E00000-memory.dmp
        Filesize

        64KB

      • memory/2056-138-0x0000000002DF0000-0x0000000002E00000-memory.dmp
        Filesize

        64KB

      • memory/2056-137-0x0000000002DF0000-0x0000000002E00000-memory.dmp
        Filesize

        64KB

      • memory/3104-163-0x0000000000000000-mapping.dmp
      • memory/3104-175-0x0000000005070000-0x00000000051B0000-memory.dmp
        Filesize

        1.2MB

      • memory/3104-170-0x0000000004880000-0x0000000004FA5000-memory.dmp
        Filesize

        7.1MB

      • memory/3104-171-0x0000000005070000-0x00000000051B0000-memory.dmp
        Filesize

        1.2MB

      • memory/3104-172-0x0000000005070000-0x00000000051B0000-memory.dmp
        Filesize

        1.2MB

      • memory/3104-173-0x0000000005070000-0x00000000051B0000-memory.dmp
        Filesize

        1.2MB

      • memory/3104-174-0x0000000005070000-0x00000000051B0000-memory.dmp
        Filesize

        1.2MB

      • memory/3104-169-0x0000000004880000-0x0000000004FA5000-memory.dmp
        Filesize

        7.1MB

      • memory/3104-176-0x0000000005070000-0x00000000051B0000-memory.dmp
        Filesize

        1.2MB

      • memory/3104-183-0x0000000004880000-0x0000000004FA5000-memory.dmp
        Filesize

        7.1MB

      • memory/3104-180-0x00000000050E9000-0x00000000050EB000-memory.dmp
        Filesize

        8KB

      • memory/3852-179-0x00000146AF840000-0x00000146AF980000-memory.dmp
        Filesize

        1.2MB

      • memory/3852-178-0x00000146AF840000-0x00000146AF980000-memory.dmp
        Filesize

        1.2MB

      • memory/3852-181-0x0000000000AE0000-0x0000000000CF9000-memory.dmp
        Filesize

        2.1MB

      • memory/3852-182-0x00000146ADE70000-0x00000146AE09A000-memory.dmp
        Filesize

        2.2MB

      • memory/3852-177-0x00007FF6F10D6890-mapping.dmp