Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2022 05:44

General

  • Target

    ac3cbbc36a7a5c9f551aca322dc0e19578d12a9bca3346cc5ff298e811f1b0f3.exe

  • Size

    214KB

  • MD5

    dbac1e546c31e01df2df4b2ebee2f2b5

  • SHA1

    f7837f0e02f5c0e7f3dd5ad86ee9946e1a6c81d1

  • SHA256

    ac3cbbc36a7a5c9f551aca322dc0e19578d12a9bca3346cc5ff298e811f1b0f3

  • SHA512

    59772e87a7b596dda7afb9895fa00c5eaaacc423c8260f6c9bbca1b5218cc48424e12fb6c2d810252fbad8a8217b9d642c99dcb1d43c15d3a5228cd3cf9054e7

  • SSDEEP

    3072:WwUBO36L+Zj21WClRB4cRO0BZyGiyctNRAtOba+3QnBtjcbImdzmuX:nUBNL+x21j9xRO0BZ/ct03BtjcbXF

Malware Config

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 25 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac3cbbc36a7a5c9f551aca322dc0e19578d12a9bca3346cc5ff298e811f1b0f3.exe
    "C:\Users\Admin\AppData\Local\Temp\ac3cbbc36a7a5c9f551aca322dc0e19578d12a9bca3346cc5ff298e811f1b0f3.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4576
  • C:\Users\Admin\AppData\Local\Temp\DBDE.exe
    C:\Users\Admin\AppData\Local\Temp\DBDE.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3624
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp",Sufeidweoe
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:4304
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 23979
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:3636
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 544
      2⤵
      • Program crash
      PID:3740
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3624 -ip 3624
    1⤵
      PID:2636
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4484
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\SysWOW64\svchost.exe -k LocalService
        1⤵
          PID:1008

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\WindowsPowerShell\Modules\FillSign..dll
          Filesize

          512KB

          MD5

          229f8bcbd962ad2bd2a336442122f8a5

          SHA1

          62b3332e3ef2e4b98784ffb6cd18eb86afda3cc8

          SHA256

          c9238f6e46fb9560baa8660a74397f5d134725cab878413ba24b1b07c290f226

          SHA512

          e8f9c55b015f0235d27ca8d7fb2ef58f67cd995498b218b6e0d67096f0b4a7eb68d8c049ca4d14927d3265f98145d8e4e1e9f96acd8527a74e52fb82a8715553

        • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Shpetph.tmp
          Filesize

          2.3MB

          MD5

          45a24621cd8631f1dec8e4dd98be38c9

          SHA1

          d59ebd3e2117813d35ac130a2f8c92b7bd714f21

          SHA256

          a80c7a8a1eb4e9149a92a6f41b3ee96468cc60470322eabe92ccc837f0cabc69

          SHA512

          1ed03bae6167f1245b16dabaef1fb52fc390ead2f7e0810756bb57b06ee020d9a284480080940d77ee07f456a455d920c9f969236701c1a9f98fdda0819f32a1

        • C:\Users\Admin\AppData\Local\Temp\DBDE.exe
          Filesize

          1.1MB

          MD5

          52939ddac663150e902b58fdbb2d7b75

          SHA1

          a311ef6a1728ec247963a8b276da6f94d0d0a50c

          SHA256

          73c4486426a8ae3962e83259140d771c80532da079c3da94965039f9d9b8b11a

          SHA512

          6f6ee5ef9700fa2fbd332ad5b8a749614a465feb9c0c8d0eb7115296c414694f4401535da73d6a413eb62c7c8e9be7bf412b9ecf27c892f5dbc0b1fd62264789

        • C:\Users\Admin\AppData\Local\Temp\DBDE.exe
          Filesize

          1.1MB

          MD5

          52939ddac663150e902b58fdbb2d7b75

          SHA1

          a311ef6a1728ec247963a8b276da6f94d0d0a50c

          SHA256

          73c4486426a8ae3962e83259140d771c80532da079c3da94965039f9d9b8b11a

          SHA512

          6f6ee5ef9700fa2fbd332ad5b8a749614a465feb9c0c8d0eb7115296c414694f4401535da73d6a413eb62c7c8e9be7bf412b9ecf27c892f5dbc0b1fd62264789

        • C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp
          Filesize

          726KB

          MD5

          6ea8a6cc5fed6c664df1b3ef7c56b55d

          SHA1

          6b244d708706441095ae97294928967ddf28432b

          SHA256

          2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe

          SHA512

          4a328a66df407e4c9fa230287104771ea3b5dd8265d60314797426101a8be19d13bc57de2388f0f90b20ada82d950e156ef4267c029080a6254b80eefd8b8741

        • C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp
          Filesize

          726KB

          MD5

          6ea8a6cc5fed6c664df1b3ef7c56b55d

          SHA1

          6b244d708706441095ae97294928967ddf28432b

          SHA256

          2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe

          SHA512

          4a328a66df407e4c9fa230287104771ea3b5dd8265d60314797426101a8be19d13bc57de2388f0f90b20ada82d950e156ef4267c029080a6254b80eefd8b8741

        • \??\c:\program files (x86)\windowspowershell\modules\fillsign..dll
          Filesize

          726KB

          MD5

          171e3fd101b5b07bbc2dc9d5783f380b

          SHA1

          dbdcd900ef9ec1deac05c4cd01689e9151d34df5

          SHA256

          156755ae609d3578ded5aa92ba41cc710af10f7f4f19cd686abcd56892f243ac

          SHA512

          ddc1d62b965e4e395b553822428a3a8a875d47b7c4079878405e2919f679ce8284c53edd9c1625d7ffce34f856d8500612502661aca886b56bfcd34e6fcc10e8

        • memory/2644-146-0x00000000030D0000-0x00000000030E0000-memory.dmp
          Filesize

          64KB

        • memory/2644-156-0x0000000003420000-0x0000000003430000-memory.dmp
          Filesize

          64KB

        • memory/2644-141-0x00000000030D0000-0x00000000030E0000-memory.dmp
          Filesize

          64KB

        • memory/2644-142-0x00000000030D0000-0x00000000030E0000-memory.dmp
          Filesize

          64KB

        • memory/2644-143-0x00000000030D0000-0x00000000030E0000-memory.dmp
          Filesize

          64KB

        • memory/2644-144-0x00000000030D0000-0x00000000030E0000-memory.dmp
          Filesize

          64KB

        • memory/2644-145-0x00000000030D0000-0x00000000030E0000-memory.dmp
          Filesize

          64KB

        • memory/2644-169-0x0000000003420000-0x0000000003430000-memory.dmp
          Filesize

          64KB

        • memory/2644-147-0x00000000030D0000-0x00000000030E0000-memory.dmp
          Filesize

          64KB

        • memory/2644-148-0x00000000030D0000-0x00000000030E0000-memory.dmp
          Filesize

          64KB

        • memory/2644-149-0x00000000030D0000-0x00000000030E0000-memory.dmp
          Filesize

          64KB

        • memory/2644-150-0x00000000030D0000-0x00000000030E0000-memory.dmp
          Filesize

          64KB

        • memory/2644-151-0x00000000030D0000-0x00000000030E0000-memory.dmp
          Filesize

          64KB

        • memory/2644-152-0x00000000030D0000-0x00000000030E0000-memory.dmp
          Filesize

          64KB

        • memory/2644-153-0x00000000030D0000-0x00000000030E0000-memory.dmp
          Filesize

          64KB

        • memory/2644-154-0x00000000030E0000-0x00000000030F0000-memory.dmp
          Filesize

          64KB

        • memory/2644-155-0x0000000003420000-0x0000000003430000-memory.dmp
          Filesize

          64KB

        • memory/2644-168-0x0000000003420000-0x0000000003430000-memory.dmp
          Filesize

          64KB

        • memory/2644-157-0x0000000003420000-0x0000000003430000-memory.dmp
          Filesize

          64KB

        • memory/2644-167-0x0000000003420000-0x0000000003430000-memory.dmp
          Filesize

          64KB

        • memory/2644-139-0x00000000030D0000-0x00000000030E0000-memory.dmp
          Filesize

          64KB

        • memory/2644-138-0x00000000030D0000-0x00000000030E0000-memory.dmp
          Filesize

          64KB

        • memory/2644-137-0x00000000030D0000-0x00000000030E0000-memory.dmp
          Filesize

          64KB

        • memory/2644-140-0x00000000030D0000-0x00000000030E0000-memory.dmp
          Filesize

          64KB

        • memory/3624-163-0x0000000000400000-0x0000000000517000-memory.dmp
          Filesize

          1.1MB

        • memory/3624-162-0x0000000002260000-0x0000000002375000-memory.dmp
          Filesize

          1.1MB

        • memory/3624-161-0x0000000002019000-0x00000000020EF000-memory.dmp
          Filesize

          856KB

        • memory/3624-158-0x0000000000000000-mapping.dmp
        • memory/3624-170-0x0000000000400000-0x0000000000517000-memory.dmp
          Filesize

          1.1MB

        • memory/3636-182-0x0000028ACCDB0000-0x0000028ACCEF0000-memory.dmp
          Filesize

          1.2MB

        • memory/3636-179-0x00007FF619046890-mapping.dmp
        • memory/3636-184-0x0000028ACB570000-0x0000028ACB79A000-memory.dmp
          Filesize

          2.2MB

        • memory/3636-183-0x0000000000120000-0x0000000000339000-memory.dmp
          Filesize

          2.1MB

        • memory/3636-180-0x0000028ACCDB0000-0x0000028ACCEF0000-memory.dmp
          Filesize

          1.2MB

        • memory/4304-164-0x0000000000000000-mapping.dmp
        • memory/4304-181-0x0000000005029000-0x000000000502B000-memory.dmp
          Filesize

          8KB

        • memory/4304-175-0x0000000004FB0000-0x00000000050F0000-memory.dmp
          Filesize

          1.2MB

        • memory/4304-176-0x0000000004FB0000-0x00000000050F0000-memory.dmp
          Filesize

          1.2MB

        • memory/4304-177-0x0000000004FB0000-0x00000000050F0000-memory.dmp
          Filesize

          1.2MB

        • memory/4304-178-0x0000000004FB0000-0x00000000050F0000-memory.dmp
          Filesize

          1.2MB

        • memory/4304-174-0x0000000004FB0000-0x00000000050F0000-memory.dmp
          Filesize

          1.2MB

        • memory/4304-173-0x0000000004FB0000-0x00000000050F0000-memory.dmp
          Filesize

          1.2MB

        • memory/4304-172-0x0000000004730000-0x0000000004E55000-memory.dmp
          Filesize

          7.1MB

        • memory/4304-171-0x0000000004730000-0x0000000004E55000-memory.dmp
          Filesize

          7.1MB

        • memory/4304-185-0x0000000004730000-0x0000000004E55000-memory.dmp
          Filesize

          7.1MB

        • memory/4576-132-0x00000000006C8000-0x00000000006D9000-memory.dmp
          Filesize

          68KB

        • memory/4576-136-0x0000000000400000-0x000000000045F000-memory.dmp
          Filesize

          380KB

        • memory/4576-135-0x00000000006C8000-0x00000000006D9000-memory.dmp
          Filesize

          68KB

        • memory/4576-134-0x0000000000400000-0x000000000045F000-memory.dmp
          Filesize

          380KB

        • memory/4576-133-0x0000000002190000-0x0000000002199000-memory.dmp
          Filesize

          36KB