Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2022 05:47

General

  • Target

    b1d7ba149c8bd3946513f5bd15cfa1ac3c1aedf9d6b58e05a68485a9343f9073.exe

  • Size

    214KB

  • MD5

    68a7eecd08bda776b56e88838847855b

  • SHA1

    8181ea7ba0bc72583e9708ac51c55d2d11ea8579

  • SHA256

    b1d7ba149c8bd3946513f5bd15cfa1ac3c1aedf9d6b58e05a68485a9343f9073

  • SHA512

    b25b2a00e2fcbf6da4d30f6406357329a1e596319069ba7187ad061a4ce0e0d647a56def5a40f0f4e6f1edc464242a38d46e185c2348aea682ca899136afa9ae

  • SSDEEP

    3072:wfiX5QL8qNDhx5RsfeK6NyW85EdNRAtOba+BnBuRD4jcbImdzmuX:yiXiL86DhQeK6Edud0KBmsjcbXF

Malware Config

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 24 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 31 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1d7ba149c8bd3946513f5bd15cfa1ac3c1aedf9d6b58e05a68485a9343f9073.exe
    "C:\Users\Admin\AppData\Local\Temp\b1d7ba149c8bd3946513f5bd15cfa1ac3c1aedf9d6b58e05a68485a9343f9073.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4760
  • C:\Users\Admin\AppData\Local\Temp\F7B3.exe
    C:\Users\Admin\AppData\Local\Temp\F7B3.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3648
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp",Sufeidweoe
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 23979
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1752
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 528
      2⤵
      • Program crash
      PID:4428
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3648 -ip 3648
    1⤵
      PID:2224
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3180
      • C:\Users\Admin\AppData\Roaming\jtudgjd
        C:\Users\Admin\AppData\Roaming\jtudgjd
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:3040
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\SysWOW64\svchost.exe -k LocalService
        1⤵
          PID:4684
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windowspowershell\modules\pdf.dll",cDQ8ZQ==
            2⤵
              PID:3524

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\WindowsPowerShell\Modules\pdf.dll
            Filesize

            726KB

            MD5

            e8249cf150e96d1ea12bf58880025543

            SHA1

            27d24de3e4a3e4d9313d46124844ee8fc67d3a9e

            SHA256

            dd7f58208b5cce18f01d6f76f6561a64f25624eed81a70fdb21b893cb6636e9f

            SHA512

            3cd3aad1e2edfc3738d7fe44d58b877b1e9a29c7d4cb1d2d222e79c52ac4a8394683bd995dee283060f808c8dea5f24b017edd91cd6d367836ffd0b3c46decae

          • C:\Program Files (x86)\WindowsPowerShell\Modules\pdf.dll
            Filesize

            726KB

            MD5

            e8249cf150e96d1ea12bf58880025543

            SHA1

            27d24de3e4a3e4d9313d46124844ee8fc67d3a9e

            SHA256

            dd7f58208b5cce18f01d6f76f6561a64f25624eed81a70fdb21b893cb6636e9f

            SHA512

            3cd3aad1e2edfc3738d7fe44d58b877b1e9a29c7d4cb1d2d222e79c52ac4a8394683bd995dee283060f808c8dea5f24b017edd91cd6d367836ffd0b3c46decae

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\C2RManifest.Proof.Culture.msi.16.es-es.xml
            Filesize

            23KB

            MD5

            156b3ab70b2cce134d493104d047e6fa

            SHA1

            9907a741812bef8c5b55d0e73c9ac5c0d973c4be

            SHA256

            5fba15e64d0ff7075951a8e6bf758d81d4c14fa98e6b8604d5bbc43317da8c01

            SHA512

            f3b2157c6aaf1b9e450872057fd5ddaad36bd30be98a48c28c0617c7a638a378dc38cbdbfb9f4b66858b32dfa3e79d577f99fd488b73b6000d1d8887640e7cbd

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Microsoft.ECApp_10.0.19041.1023_neutral__8wekyb3d8bbwe.xml
            Filesize

            2KB

            MD5

            13eb9cfbca43ebcd240e1fcff5acab4d

            SHA1

            5a0da86ab3f30905433677284eb843742f05afe5

            SHA256

            616d6a37866683e848fac3a17cecdea05e51da55420adcf947e40d062f587bb8

            SHA512

            256879b3d2c86ed4c3e8fccc8ffa09d11ae6eb6a2c9da4afa834f36b399752d7c46ceb638497cb28c48d874db0ccde15b73a22f1aa894b376aafd00f20b23352

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\MicrosoftOffice2013Office365Win64.xml
            Filesize

            10KB

            MD5

            46353bb25b4eb2e9d26a25744c716563

            SHA1

            a9a9c2a1260542b5246fd642425dcc2a29a098c1

            SHA256

            3fae1d780e8a63d73847dc38412952c238d0e3ca01a97caee718489a3d424893

            SHA512

            09027ff22d03712258dbd10d6fe2cafbefd90e974210b09d20008d8eb6b569915064c65a7403187b0d78e79c96838cc0bba49b089acc7c7ab790866359719197

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\SettingsLocationTemplate.xsd
            Filesize

            9KB

            MD5

            f35965aa615dd128c2b95cfe925145c3

            SHA1

            57346050388048feb8034d5011b105018483b4a0

            SHA256

            ea9674d42081557b34958b2f7085f8d3865e71660d8f36258fa1c088d90d2398

            SHA512

            82767fdf269f813b5d39bb44c481f01678f9eab332ecc42f11d5a4f00a1970a6dd1875d30a98042113d37b04e501414b33e18abf2ab2a7995e5e773489f9cd82

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Shpetph.tmp
            Filesize

            2.3MB

            MD5

            fc436b8a9fcf63370b43ccc8749a141d

            SHA1

            657b61d07b6de646ae052e507846d93e559c54fc

            SHA256

            0b5664bb0f29255dace2eb648e7358b93ece46ae63084509e12487b252e72ece

            SHA512

            e808311198c0d5ebbfd239f8ad50a5e9527e2892881f99d41792e590b4c696ef7e988b2663644f1fd1bafd6cd0f823e7e22175a7d6468fc8ca39716d29f143f8

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\SystemIndex.1.gthr
            Filesize

            9KB

            MD5

            965a2a9ee2ded00e2e95a74587e92b01

            SHA1

            3cb498c851d41846c973cad384d5a00a8a4ace9f

            SHA256

            5ce6ff5166d4f60940f300391ce63f469bc9d81f9a75299f9d5e4af019d40437

            SHA512

            185e998ae35d4ae62a500d27f4a98e9154f446842e9898a79cc7c5ac6ec7d05469dc1b8b648ddad60210ece5ec87334c8c2e239de40c2e49a6dd8db3d329430b

          • C:\Users\Admin\AppData\Local\Temp\F7B3.exe
            Filesize

            1.1MB

            MD5

            52939ddac663150e902b58fdbb2d7b75

            SHA1

            a311ef6a1728ec247963a8b276da6f94d0d0a50c

            SHA256

            73c4486426a8ae3962e83259140d771c80532da079c3da94965039f9d9b8b11a

            SHA512

            6f6ee5ef9700fa2fbd332ad5b8a749614a465feb9c0c8d0eb7115296c414694f4401535da73d6a413eb62c7c8e9be7bf412b9ecf27c892f5dbc0b1fd62264789

          • C:\Users\Admin\AppData\Local\Temp\F7B3.exe
            Filesize

            1.1MB

            MD5

            52939ddac663150e902b58fdbb2d7b75

            SHA1

            a311ef6a1728ec247963a8b276da6f94d0d0a50c

            SHA256

            73c4486426a8ae3962e83259140d771c80532da079c3da94965039f9d9b8b11a

            SHA512

            6f6ee5ef9700fa2fbd332ad5b8a749614a465feb9c0c8d0eb7115296c414694f4401535da73d6a413eb62c7c8e9be7bf412b9ecf27c892f5dbc0b1fd62264789

          • C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp
            Filesize

            726KB

            MD5

            6ea8a6cc5fed6c664df1b3ef7c56b55d

            SHA1

            6b244d708706441095ae97294928967ddf28432b

            SHA256

            2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe

            SHA512

            4a328a66df407e4c9fa230287104771ea3b5dd8265d60314797426101a8be19d13bc57de2388f0f90b20ada82d950e156ef4267c029080a6254b80eefd8b8741

          • C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp
            Filesize

            726KB

            MD5

            6ea8a6cc5fed6c664df1b3ef7c56b55d

            SHA1

            6b244d708706441095ae97294928967ddf28432b

            SHA256

            2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe

            SHA512

            4a328a66df407e4c9fa230287104771ea3b5dd8265d60314797426101a8be19d13bc57de2388f0f90b20ada82d950e156ef4267c029080a6254b80eefd8b8741

          • C:\Users\Admin\AppData\Roaming\jtudgjd
            Filesize

            214KB

            MD5

            68a7eecd08bda776b56e88838847855b

            SHA1

            8181ea7ba0bc72583e9708ac51c55d2d11ea8579

            SHA256

            b1d7ba149c8bd3946513f5bd15cfa1ac3c1aedf9d6b58e05a68485a9343f9073

            SHA512

            b25b2a00e2fcbf6da4d30f6406357329a1e596319069ba7187ad061a4ce0e0d647a56def5a40f0f4e6f1edc464242a38d46e185c2348aea682ca899136afa9ae

          • C:\Users\Admin\AppData\Roaming\jtudgjd
            Filesize

            214KB

            MD5

            68a7eecd08bda776b56e88838847855b

            SHA1

            8181ea7ba0bc72583e9708ac51c55d2d11ea8579

            SHA256

            b1d7ba149c8bd3946513f5bd15cfa1ac3c1aedf9d6b58e05a68485a9343f9073

            SHA512

            b25b2a00e2fcbf6da4d30f6406357329a1e596319069ba7187ad061a4ce0e0d647a56def5a40f0f4e6f1edc464242a38d46e185c2348aea682ca899136afa9ae

          • \??\c:\program files (x86)\windowspowershell\modules\pdf.dll
            Filesize

            726KB

            MD5

            e8249cf150e96d1ea12bf58880025543

            SHA1

            27d24de3e4a3e4d9313d46124844ee8fc67d3a9e

            SHA256

            dd7f58208b5cce18f01d6f76f6561a64f25624eed81a70fdb21b893cb6636e9f

            SHA512

            3cd3aad1e2edfc3738d7fe44d58b877b1e9a29c7d4cb1d2d222e79c52ac4a8394683bd995dee283060f808c8dea5f24b017edd91cd6d367836ffd0b3c46decae

          • memory/1752-154-0x000001DE99DA0000-0x000001DE99EE0000-memory.dmp
            Filesize

            1.2MB

          • memory/1752-153-0x00007FF744736890-mapping.dmp
          • memory/1752-158-0x000001DE98560000-0x000001DE9878A000-memory.dmp
            Filesize

            2.2MB

          • memory/1752-157-0x0000000000020000-0x0000000000239000-memory.dmp
            Filesize

            2.1MB

          • memory/1752-155-0x000001DE99DA0000-0x000001DE99EE0000-memory.dmp
            Filesize

            1.2MB

          • memory/2308-151-0x00000000049C0000-0x0000000004B00000-memory.dmp
            Filesize

            1.2MB

          • memory/2308-152-0x00000000049C0000-0x0000000004B00000-memory.dmp
            Filesize

            1.2MB

          • memory/2308-139-0x0000000000000000-mapping.dmp
          • memory/2308-145-0x0000000005850000-0x0000000005F75000-memory.dmp
            Filesize

            7.1MB

          • memory/2308-156-0x0000000004A39000-0x0000000004A3B000-memory.dmp
            Filesize

            8KB

          • memory/2308-150-0x00000000049C0000-0x0000000004B00000-memory.dmp
            Filesize

            1.2MB

          • memory/2308-149-0x00000000049C0000-0x0000000004B00000-memory.dmp
            Filesize

            1.2MB

          • memory/2308-159-0x0000000005850000-0x0000000005F75000-memory.dmp
            Filesize

            7.1MB

          • memory/2308-147-0x00000000049C0000-0x0000000004B00000-memory.dmp
            Filesize

            1.2MB

          • memory/2308-146-0x0000000005850000-0x0000000005F75000-memory.dmp
            Filesize

            7.1MB

          • memory/2308-148-0x00000000049C0000-0x0000000004B00000-memory.dmp
            Filesize

            1.2MB

          • memory/3040-162-0x00000000005A8000-0x00000000005B8000-memory.dmp
            Filesize

            64KB

          • memory/3040-163-0x0000000000400000-0x000000000045F000-memory.dmp
            Filesize

            380KB

          • memory/3040-164-0x0000000000400000-0x000000000045F000-memory.dmp
            Filesize

            380KB

          • memory/3524-176-0x00000000047F0000-0x0000000004F15000-memory.dmp
            Filesize

            7.1MB

          • memory/3524-178-0x00000000047F0000-0x0000000004F15000-memory.dmp
            Filesize

            7.1MB

          • memory/3524-174-0x0000000000000000-mapping.dmp
          • memory/3648-144-0x0000000000400000-0x0000000000517000-memory.dmp
            Filesize

            1.1MB

          • memory/3648-143-0x0000000002250000-0x0000000002365000-memory.dmp
            Filesize

            1.1MB

          • memory/3648-142-0x0000000002073000-0x0000000002149000-memory.dmp
            Filesize

            856KB

          • memory/3648-136-0x0000000000000000-mapping.dmp
          • memory/4684-168-0x0000000002EC0000-0x00000000035E5000-memory.dmp
            Filesize

            7.1MB

          • memory/4684-177-0x0000000002EC0000-0x00000000035E5000-memory.dmp
            Filesize

            7.1MB

          • memory/4760-132-0x0000000000768000-0x0000000000779000-memory.dmp
            Filesize

            68KB

          • memory/4760-133-0x00000000006F0000-0x00000000006F9000-memory.dmp
            Filesize

            36KB

          • memory/4760-134-0x0000000000400000-0x000000000045F000-memory.dmp
            Filesize

            380KB

          • memory/4760-135-0x0000000000400000-0x000000000045F000-memory.dmp
            Filesize

            380KB