Analysis
-
max time kernel
154s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2022 19:11
Static task
static1
Behavioral task
behavioral1
Sample
a2bc5c94f2d768187205178c2d089bf21542c72ca3910d43d5fb796cf0aa08a2.exe
Resource
win10v2004-20221111-en
General
-
Target
a2bc5c94f2d768187205178c2d089bf21542c72ca3910d43d5fb796cf0aa08a2.exe
-
Size
214KB
-
MD5
c05d11bf62a4af347ba8caca87eb6b7f
-
SHA1
7c568736f6b62941305b436e803db675e5af1a96
-
SHA256
a2bc5c94f2d768187205178c2d089bf21542c72ca3910d43d5fb796cf0aa08a2
-
SHA512
d8ac0cb6c49a1292c65e9dc2da9e3b7d29d81409b6e4a105cfe650d4b504af244b7ef01432a9aba8c5cd1de0ea983122302b37d7e639727e72ebc589a31ee021
-
SSDEEP
3072:HXUZPFLLQDB7vRwwVPvUTM6Ef81sV2Zx5fxSsa5RwuNRAtOba+4LtlPnZjcbImdl:3U5FLLkB2gFXgfxY5R30TPnZjcbXF
Malware Config
Extracted
danabot
23.236.181.126:443
123.253.35.251:443
66.85.173.3:443
-
embedded_hash
A74585CDE58066055FE7DCD4BF3B5A4C
-
type
loader
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/4088-133-0x00000000005E0000-0x00000000005E9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 45 1584 rundll32.exe 49 1584 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 888 E767.exe -
Loads dropped DLL 1 IoCs
pid Process 1584 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1584 set thread context of 3884 1584 rundll32.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1296 888 WerFault.exe 88 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a2bc5c94f2d768187205178c2d089bf21542c72ca3910d43d5fb796cf0aa08a2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a2bc5c94f2d768187205178c2d089bf21542c72ca3910d43d5fb796cf0aa08a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a2bc5c94f2d768187205178c2d089bf21542c72ca3910d43d5fb796cf0aa08a2.exe -
Checks processor information in registry 2 TTPs 26 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Toolbar Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Process not Found -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 820074001c0043465346160031000000000000000000100041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004100700070004400610074006100000042000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e0031000000000092558da1100054656d7000003a0009000400efbe6b558a6c925594a12e0000000000000000000000000000000000000000000000000095d89200540065006d007000000014000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff Process not Found -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 668 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4088 a2bc5c94f2d768187205178c2d089bf21542c72ca3910d43d5fb796cf0aa08a2.exe 4088 a2bc5c94f2d768187205178c2d089bf21542c72ca3910d43d5fb796cf0aa08a2.exe 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 668 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4088 a2bc5c94f2d768187205178c2d089bf21542c72ca3910d43d5fb796cf0aa08a2.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 668 Process not Found Token: SeCreatePagefilePrivilege 668 Process not Found Token: SeShutdownPrivilege 668 Process not Found Token: SeCreatePagefilePrivilege 668 Process not Found Token: SeShutdownPrivilege 668 Process not Found Token: SeCreatePagefilePrivilege 668 Process not Found Token: SeShutdownPrivilege 668 Process not Found Token: SeCreatePagefilePrivilege 668 Process not Found Token: SeShutdownPrivilege 668 Process not Found Token: SeCreatePagefilePrivilege 668 Process not Found Token: SeShutdownPrivilege 668 Process not Found Token: SeCreatePagefilePrivilege 668 Process not Found Token: SeShutdownPrivilege 668 Process not Found Token: SeCreatePagefilePrivilege 668 Process not Found Token: SeShutdownPrivilege 668 Process not Found Token: SeCreatePagefilePrivilege 668 Process not Found Token: SeShutdownPrivilege 668 Process not Found Token: SeCreatePagefilePrivilege 668 Process not Found Token: SeShutdownPrivilege 668 Process not Found Token: SeCreatePagefilePrivilege 668 Process not Found Token: SeShutdownPrivilege 668 Process not Found Token: SeCreatePagefilePrivilege 668 Process not Found Token: SeShutdownPrivilege 668 Process not Found Token: SeCreatePagefilePrivilege 668 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3884 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 668 Process not Found 668 Process not Found -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 668 wrote to memory of 888 668 Process not Found 88 PID 668 wrote to memory of 888 668 Process not Found 88 PID 668 wrote to memory of 888 668 Process not Found 88 PID 888 wrote to memory of 1584 888 E767.exe 89 PID 888 wrote to memory of 1584 888 E767.exe 89 PID 888 wrote to memory of 1584 888 E767.exe 89 PID 1584 wrote to memory of 3884 1584 rundll32.exe 92 PID 1584 wrote to memory of 3884 1584 rundll32.exe 92 PID 1584 wrote to memory of 3884 1584 rundll32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2bc5c94f2d768187205178c2d089bf21542c72ca3910d43d5fb796cf0aa08a2.exe"C:\Users\Admin\AppData\Local\Temp\a2bc5c94f2d768187205178c2d089bf21542c72ca3910d43d5fb796cf0aa08a2.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4088
-
C:\Users\Admin\AppData\Local\Temp\E767.exeC:\Users\Admin\AppData\Local\Temp\E767.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Iseiuaqptde.dll,start2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 202033⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3884
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 888 -s 5082⤵
- Program crash
PID:1296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 888 -ip 8881⤵PID:4688
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2336
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5a0db2d56d4a7fc534ebeb6ef7e28e55f
SHA1075c302586e8a722279b991e416cf55b454429e6
SHA256055d30d41fd0a64a382323de3e938a4cb36db2889a444167563c7b8af3745a15
SHA51264877f1290e159175f1ce0aa4c831318dbdefbf5a73dce1973f27bc04aa6ed7f97427b60883c1430bbcf9cb8bba13b20a2875001536bf7d16534611953b76860
-
Filesize
2.4MB
MD5a0db2d56d4a7fc534ebeb6ef7e28e55f
SHA1075c302586e8a722279b991e416cf55b454429e6
SHA256055d30d41fd0a64a382323de3e938a4cb36db2889a444167563c7b8af3745a15
SHA51264877f1290e159175f1ce0aa4c831318dbdefbf5a73dce1973f27bc04aa6ed7f97427b60883c1430bbcf9cb8bba13b20a2875001536bf7d16534611953b76860
-
Filesize
2.4MB
MD5a9810cf4aa2f4ec34061791b9a293777
SHA16533e7dd22a911ae1769f3dbbaa93ae730faefa3
SHA2569f28e3691640498fb92e00574bb35bcda89ed45badf5a2ff9b38fe8a88a5f2c5
SHA512a7b5ed6028db230f33b81aa352beaeb384e43d833e3a033900f928532f0de996a5f299b17f9ff0d0b489214359d9319fc48040050aa8fe0b49ee1a90e9723558
-
Filesize
2.4MB
MD5a9810cf4aa2f4ec34061791b9a293777
SHA16533e7dd22a911ae1769f3dbbaa93ae730faefa3
SHA2569f28e3691640498fb92e00574bb35bcda89ed45badf5a2ff9b38fe8a88a5f2c5
SHA512a7b5ed6028db230f33b81aa352beaeb384e43d833e3a033900f928532f0de996a5f299b17f9ff0d0b489214359d9319fc48040050aa8fe0b49ee1a90e9723558