Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/12/2022, 04:23
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
214KB
-
MD5
2cc7f656421f855ffe3b83e5332ab9e0
-
SHA1
6053fde210c0c27bbaa64f3f39450634e3c257df
-
SHA256
477e8524f1e6fcb05dfbb0aa95174bfe3d82c4897ebb9167323bc4191f217afa
-
SHA512
78dcbeafc7312ecaf5e4e0fe140b487666c4975bbcad8b3bbb87de596993fe403df7f41f2877c9926b1d083257f1a26bcb24d8bb317dc62ac6cde39186c6c1f4
-
SSDEEP
6144:6Pm/TLAYZ//cgTBpR9bDzg3CsUTuvU0VB:6PmLcUxfvn8SQsO
Malware Config
Extracted
danabot
23.236.181.126:443
123.253.35.251:443
66.85.173.3:443
-
embedded_hash
8F56CD73F6B5CD5D7B17B0BA61E70A82
-
type
loader
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral2/memory/4332-133-0x00000000001F0000-0x00000000001F9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 3 IoCs
flow pid Process 89 3096 rundll32.exe 91 3096 rundll32.exe 102 3096 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3544 E246.exe -
Loads dropped DLL 1 IoCs
pid Process 3096 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3896 3544 WerFault.exe 86 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Checks processor information in registry 2 TTPs 17 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4332 file.exe 4332 file.exe 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found 2824 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4332 file.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 2824 Process not Found Token: SeCreatePagefilePrivilege 2824 Process not Found Token: SeShutdownPrivilege 2824 Process not Found Token: SeCreatePagefilePrivilege 2824 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2824 wrote to memory of 3544 2824 Process not Found 86 PID 2824 wrote to memory of 3544 2824 Process not Found 86 PID 2824 wrote to memory of 3544 2824 Process not Found 86 PID 3544 wrote to memory of 3096 3544 E246.exe 87 PID 3544 wrote to memory of 3096 3544 E246.exe 87 PID 3544 wrote to memory of 3096 3544 E246.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4332
-
C:\Users\Admin\AppData\Local\Temp\E246.exeC:\Users\Admin\AppData\Local\Temp\E246.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Iseiuaqptde.dll,start2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 5442⤵
- Program crash
PID:3896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3544 -ip 35441⤵PID:2808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD50bb2b15ca73128dbc816ea4ed583119c
SHA117d05964d9208ca1a27fd007ad5f41752cfa893e
SHA256295dfd4608b81ee276a04f1c58d806b7f906695e744cfe8234eca6360c555ca8
SHA512d58afa63c04cb95576e9a7b5ae026dc28526cee7a26c5e829c091356179f4d255503914398dd209c506743ab78f16cb84d862e2f8ae5f43282bfe2a3e7afe375
-
Filesize
2.4MB
MD50bb2b15ca73128dbc816ea4ed583119c
SHA117d05964d9208ca1a27fd007ad5f41752cfa893e
SHA256295dfd4608b81ee276a04f1c58d806b7f906695e744cfe8234eca6360c555ca8
SHA512d58afa63c04cb95576e9a7b5ae026dc28526cee7a26c5e829c091356179f4d255503914398dd209c506743ab78f16cb84d862e2f8ae5f43282bfe2a3e7afe375
-
Filesize
2.4MB
MD53f5f5ae165009e3ff62bd36852a4579a
SHA15b6044bd41d6864f2f27e8c34234fb17d17f8a37
SHA2561a10585dcc06e9cfca5651aae0d074ef443ab22966c5868d8cfa4fbbc5a49960
SHA51271b21f9cf1a34337c2c79ac35d67c03eff32b097719b0d56f1f1dcf7d82fd19fcd9e768e06af543307c76eab6ffce61b56c4664df397280f039231a0d69ad2c1
-
Filesize
2.4MB
MD53f5f5ae165009e3ff62bd36852a4579a
SHA15b6044bd41d6864f2f27e8c34234fb17d17f8a37
SHA2561a10585dcc06e9cfca5651aae0d074ef443ab22966c5868d8cfa4fbbc5a49960
SHA51271b21f9cf1a34337c2c79ac35d67c03eff32b097719b0d56f1f1dcf7d82fd19fcd9e768e06af543307c76eab6ffce61b56c4664df397280f039231a0d69ad2c1