Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2022 20:38
Static task
static1
Behavioral task
behavioral1
Sample
3cefa3c1edd161d27545ffef750c266575bf4df100b5b3652f962f082da9b93b.exe
Resource
win10v2004-20221111-en
General
-
Target
3cefa3c1edd161d27545ffef750c266575bf4df100b5b3652f962f082da9b93b.exe
-
Size
213KB
-
MD5
3e23f49eff3b4d6053df76fc0376b927
-
SHA1
ed5990226d937c0700b8ada712e5d2b2896f04d9
-
SHA256
3cefa3c1edd161d27545ffef750c266575bf4df100b5b3652f962f082da9b93b
-
SHA512
9fd7fc065f55ff8538eae5886008e0fc53daf3abfe75fd30b6c97c48e939677d9a39d150953c5bf4727c0929d0d13bdb773ad9b071cb404b7186b1aa7dab9755
-
SSDEEP
3072:n7u3rHzLeqoGWgR3/0OSEX6JJa3lIIVNRAtOba+De2tVjcbImdzmuX:7u3vLeFG7jX6Da190GTjcbXF
Malware Config
Extracted
danabot
23.236.181.126:443
123.253.35.251:443
66.85.173.3:443
-
embedded_hash
8F56CD73F6B5CD5D7B17B0BA61E70A82
-
type
loader
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4992-133-0x00000000005F0000-0x00000000005F9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
1C71.exefvivrifpid process 428 1C71.exe 3332 fvivrif -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 760 rundll32.exe 760 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1472 428 WerFault.exe 1C71.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
fvivrif3cefa3c1edd161d27545ffef750c266575bf4df100b5b3652f962f082da9b93b.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fvivrif Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fvivrif Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fvivrif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3cefa3c1edd161d27545ffef750c266575bf4df100b5b3652f962f082da9b93b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3cefa3c1edd161d27545ffef750c266575bf4df100b5b3652f962f082da9b93b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3cefa3c1edd161d27545ffef750c266575bf4df100b5b3652f962f082da9b93b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3cefa3c1edd161d27545ffef750c266575bf4df100b5b3652f962f082da9b93b.exepid process 4992 3cefa3c1edd161d27545ffef750c266575bf4df100b5b3652f962f082da9b93b.exe 4992 3cefa3c1edd161d27545ffef750c266575bf4df100b5b3652f962f082da9b93b.exe 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 2620 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2620 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
3cefa3c1edd161d27545ffef750c266575bf4df100b5b3652f962f082da9b93b.exefvivrifpid process 4992 3cefa3c1edd161d27545ffef750c266575bf4df100b5b3652f962f082da9b93b.exe 3332 fvivrif -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2620 Token: SeCreatePagefilePrivilege 2620 Token: SeShutdownPrivilege 2620 Token: SeCreatePagefilePrivilege 2620 -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
1C71.exedescription pid process target process PID 2620 wrote to memory of 428 2620 1C71.exe PID 2620 wrote to memory of 428 2620 1C71.exe PID 2620 wrote to memory of 428 2620 1C71.exe PID 428 wrote to memory of 760 428 1C71.exe rundll32.exe PID 428 wrote to memory of 760 428 1C71.exe rundll32.exe PID 428 wrote to memory of 760 428 1C71.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cefa3c1edd161d27545ffef750c266575bf4df100b5b3652f962f082da9b93b.exe"C:\Users\Admin\AppData\Local\Temp\3cefa3c1edd161d27545ffef750c266575bf4df100b5b3652f962f082da9b93b.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4992
-
C:\Users\Admin\AppData\Local\Temp\1C71.exeC:\Users\Admin\AppData\Local\Temp\1C71.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Iseiuaqptde.dll,start2⤵
- Loads dropped DLL
PID:760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 4882⤵
- Program crash
PID:1472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 428 -ip 4281⤵PID:4616
-
C:\Users\Admin\AppData\Roaming\fvivrifC:\Users\Admin\AppData\Roaming\fvivrif1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3332
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1C71.exeFilesize
2.4MB
MD590e31bba0579eef6c26cbc88e32c65e6
SHA1ecd1c9638264a0bcd9e55488a11b934fbbe58f4b
SHA256159285b33651bd7a9ae9fa6b7c6975e4df5d980b0c8ae94ee42185824e5e854c
SHA512a03953d64508dc760b3e6bab2260011e80ebfe42f9bb9138416b54017d328fe8d659f82a9dd5561c6cca74bccaf5ee100123b4cb52d30203252a0e537dd7da1d
-
C:\Users\Admin\AppData\Local\Temp\1C71.exeFilesize
2.4MB
MD590e31bba0579eef6c26cbc88e32c65e6
SHA1ecd1c9638264a0bcd9e55488a11b934fbbe58f4b
SHA256159285b33651bd7a9ae9fa6b7c6975e4df5d980b0c8ae94ee42185824e5e854c
SHA512a03953d64508dc760b3e6bab2260011e80ebfe42f9bb9138416b54017d328fe8d659f82a9dd5561c6cca74bccaf5ee100123b4cb52d30203252a0e537dd7da1d
-
C:\Users\Admin\AppData\Local\Temp\Iseiuaqptde.dllFilesize
2.4MB
MD54d7ad32936d3b12dd06b85d79169e0d3
SHA1af08899b1d3deb6d15f608859de677232d74b203
SHA25626aaa7a62b2f91a69c02cadff3c69e1b484fe3658be2183456d9bf4c8a476d1d
SHA512b4d3e2a22143ec9bab93891b8606ef00d08b7a6746d690e638328ce1fdd9416d285f28fce4a558c29f2404968cb9203038630cc290574150308e2a960e9f418f
-
C:\Users\Admin\AppData\Local\Temp\Iseiuaqptde.dllFilesize
2.4MB
MD54d7ad32936d3b12dd06b85d79169e0d3
SHA1af08899b1d3deb6d15f608859de677232d74b203
SHA25626aaa7a62b2f91a69c02cadff3c69e1b484fe3658be2183456d9bf4c8a476d1d
SHA512b4d3e2a22143ec9bab93891b8606ef00d08b7a6746d690e638328ce1fdd9416d285f28fce4a558c29f2404968cb9203038630cc290574150308e2a960e9f418f
-
C:\Users\Admin\AppData\Local\Temp\Iseiuaqptde.dllFilesize
2.4MB
MD54d7ad32936d3b12dd06b85d79169e0d3
SHA1af08899b1d3deb6d15f608859de677232d74b203
SHA25626aaa7a62b2f91a69c02cadff3c69e1b484fe3658be2183456d9bf4c8a476d1d
SHA512b4d3e2a22143ec9bab93891b8606ef00d08b7a6746d690e638328ce1fdd9416d285f28fce4a558c29f2404968cb9203038630cc290574150308e2a960e9f418f
-
C:\Users\Admin\AppData\Roaming\fvivrifFilesize
213KB
MD53e23f49eff3b4d6053df76fc0376b927
SHA1ed5990226d937c0700b8ada712e5d2b2896f04d9
SHA2563cefa3c1edd161d27545ffef750c266575bf4df100b5b3652f962f082da9b93b
SHA5129fd7fc065f55ff8538eae5886008e0fc53daf3abfe75fd30b6c97c48e939677d9a39d150953c5bf4727c0929d0d13bdb773ad9b071cb404b7186b1aa7dab9755
-
C:\Users\Admin\AppData\Roaming\fvivrifFilesize
213KB
MD53e23f49eff3b4d6053df76fc0376b927
SHA1ed5990226d937c0700b8ada712e5d2b2896f04d9
SHA2563cefa3c1edd161d27545ffef750c266575bf4df100b5b3652f962f082da9b93b
SHA5129fd7fc065f55ff8538eae5886008e0fc53daf3abfe75fd30b6c97c48e939677d9a39d150953c5bf4727c0929d0d13bdb773ad9b071cb404b7186b1aa7dab9755
-
memory/428-145-0x0000000002770000-0x0000000002AF5000-memory.dmpFilesize
3.5MB
-
memory/428-144-0x0000000002516000-0x0000000002761000-memory.dmpFilesize
2.3MB
-
memory/428-146-0x0000000000400000-0x0000000000791000-memory.dmpFilesize
3.6MB
-
memory/428-136-0x0000000000000000-mapping.dmp
-
memory/760-139-0x0000000000000000-mapping.dmp
-
memory/760-143-0x0000000002250000-0x00000000024C1000-memory.dmpFilesize
2.4MB
-
memory/760-147-0x0000000002250000-0x00000000024C1000-memory.dmpFilesize
2.4MB
-
memory/760-148-0x0000000002250000-0x00000000024C1000-memory.dmpFilesize
2.4MB
-
memory/3332-151-0x0000000000708000-0x0000000000718000-memory.dmpFilesize
64KB
-
memory/3332-152-0x0000000000400000-0x000000000045F000-memory.dmpFilesize
380KB
-
memory/3332-153-0x0000000000400000-0x000000000045F000-memory.dmpFilesize
380KB
-
memory/4992-133-0x00000000005F0000-0x00000000005F9000-memory.dmpFilesize
36KB
-
memory/4992-132-0x0000000000678000-0x0000000000689000-memory.dmpFilesize
68KB
-
memory/4992-134-0x0000000000400000-0x000000000045F000-memory.dmpFilesize
380KB
-
memory/4992-135-0x0000000000400000-0x000000000045F000-memory.dmpFilesize
380KB