Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2022 14:10

General

  • Target

    file.exe

  • Size

    310KB

  • MD5

    f14580f740879c9230c6279de9884f5f

  • SHA1

    34bbebb5cde36964e902c0aba70c971f207efa05

  • SHA256

    f99d35d14e88e96a1aeb242b4d7aae7f187a43e6b986e3ce55826e0c3c840d72

  • SHA512

    f73ce4acabdc3f761d54c6b77dd088b435ee0de35a6b6de2aab625c2aada603c358ee78a8c82144b5b975aec45cf4f68d93a9430568f12dc2a919a3a88a35dfc

  • SSDEEP

    6144:H5zL35k5l27GmrryI0p5lGa0H4rWlRjO1n:HBj5k5QqmKnrlGaXrW9u

Malware Config

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2276
  • C:\Users\Admin\AppData\Local\Temp\2F.exe
    C:\Users\Admin\AppData\Local\Temp\2F.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp",Sufeidweoe
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:4944
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 23979
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:676
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 536
      2⤵
      • Program crash
      PID:3632
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3588 -ip 3588
    1⤵
      PID:3880
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4320
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\SysWOW64\svchost.exe -k LocalService
        1⤵
          PID:3952

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\WindowsPowerShell\Modules\forms_super.dll
          Filesize

          726KB

          MD5

          a4f63ff7bf34d5807316aa1cbe5faf0e

          SHA1

          3d2a9f6115d7273b3487b5e6c33382bb69c87aaa

          SHA256

          4f68c8517cf958ed5d7282eac5b04c9d40f58f9f21c49d72a8fec665c83cac80

          SHA512

          38955d47686b41cc1a9336e26f2bf4a24f507b8616857f21e7e97a991d7a8279e63eb7eccdbb425c9c1f8e42a71c848356dd3e6a0ecae0bb5650a5f10584de9f

        • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Shpetph.tmp
          Filesize

          2.3MB

          MD5

          bc024f4baf175e3f20d59cf3d9892fd2

          SHA1

          524bddca82037fd1b019ea25822bb8511596fe88

          SHA256

          23219f985458ccacc41b0eb410e4b949791e286aefc5dde29bd3843dca6f6eff

          SHA512

          f78ed5bb1d48f06ccc140236665383fb2603650a0f5388764bfc3abe8643f3bead457b83a7d7fc22bc5d3c7321a04077119dc7bc95ddb1cca446ea94585ab75e

        • C:\Users\Admin\AppData\Local\Temp\2F.exe
          Filesize

          1.1MB

          MD5

          076f3ebdf25ab73e33b760c7171db59a

          SHA1

          76ec6960e35a5b4adb6886479355c9a93bddcc00

          SHA256

          57d4d742672d0b1a350de9a156f806404a137fe73c32363df3976a5205cade21

          SHA512

          8e40439ec3331b877b81ee3daf15bc647cdb00092e7d50bd5df47f322d200ea1e6e3e3d8cb3951c9d8d253ae8e56de0102f98f330a29d4ba950739feb7dddba5

        • C:\Users\Admin\AppData\Local\Temp\2F.exe
          Filesize

          1.1MB

          MD5

          076f3ebdf25ab73e33b760c7171db59a

          SHA1

          76ec6960e35a5b4adb6886479355c9a93bddcc00

          SHA256

          57d4d742672d0b1a350de9a156f806404a137fe73c32363df3976a5205cade21

          SHA512

          8e40439ec3331b877b81ee3daf15bc647cdb00092e7d50bd5df47f322d200ea1e6e3e3d8cb3951c9d8d253ae8e56de0102f98f330a29d4ba950739feb7dddba5

        • C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp
          Filesize

          726KB

          MD5

          6ea8a6cc5fed6c664df1b3ef7c56b55d

          SHA1

          6b244d708706441095ae97294928967ddf28432b

          SHA256

          2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe

          SHA512

          4a328a66df407e4c9fa230287104771ea3b5dd8265d60314797426101a8be19d13bc57de2388f0f90b20ada82d950e156ef4267c029080a6254b80eefd8b8741

        • C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp
          Filesize

          726KB

          MD5

          6ea8a6cc5fed6c664df1b3ef7c56b55d

          SHA1

          6b244d708706441095ae97294928967ddf28432b

          SHA256

          2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe

          SHA512

          4a328a66df407e4c9fa230287104771ea3b5dd8265d60314797426101a8be19d13bc57de2388f0f90b20ada82d950e156ef4267c029080a6254b80eefd8b8741

        • \??\c:\program files (x86)\windowspowershell\modules\forms_super.dll
          Filesize

          726KB

          MD5

          a4f63ff7bf34d5807316aa1cbe5faf0e

          SHA1

          3d2a9f6115d7273b3487b5e6c33382bb69c87aaa

          SHA256

          4f68c8517cf958ed5d7282eac5b04c9d40f58f9f21c49d72a8fec665c83cac80

          SHA512

          38955d47686b41cc1a9336e26f2bf4a24f507b8616857f21e7e97a991d7a8279e63eb7eccdbb425c9c1f8e42a71c848356dd3e6a0ecae0bb5650a5f10584de9f

        • memory/676-153-0x00007FF7A8A16890-mapping.dmp
        • memory/676-154-0x00000153E0DD0000-0x00000153E0F10000-memory.dmp
          Filesize

          1.2MB

        • memory/676-155-0x00000153E0DD0000-0x00000153E0F10000-memory.dmp
          Filesize

          1.2MB

        • memory/676-157-0x0000000000140000-0x0000000000359000-memory.dmp
          Filesize

          2.1MB

        • memory/676-158-0x00000153DF590000-0x00000153DF7BA000-memory.dmp
          Filesize

          2.2MB

        • memory/2276-133-0x00000000005E0000-0x00000000005E9000-memory.dmp
          Filesize

          36KB

        • memory/2276-134-0x0000000000400000-0x0000000000453000-memory.dmp
          Filesize

          332KB

        • memory/2276-135-0x0000000000400000-0x0000000000453000-memory.dmp
          Filesize

          332KB

        • memory/2276-132-0x0000000000799000-0x00000000007AF000-memory.dmp
          Filesize

          88KB

        • memory/3588-142-0x0000000000400000-0x0000000000517000-memory.dmp
          Filesize

          1.1MB

        • memory/3588-141-0x00000000022E0000-0x00000000023F5000-memory.dmp
          Filesize

          1.1MB

        • memory/3588-139-0x0000000002208000-0x00000000022DE000-memory.dmp
          Filesize

          856KB

        • memory/3588-136-0x0000000000000000-mapping.dmp
        • memory/3952-163-0x0000000003370000-0x0000000003A95000-memory.dmp
          Filesize

          7.1MB

        • memory/4944-148-0x00000000048A0000-0x00000000049E0000-memory.dmp
          Filesize

          1.2MB

        • memory/4944-152-0x00000000048A0000-0x00000000049E0000-memory.dmp
          Filesize

          1.2MB

        • memory/4944-151-0x00000000048A0000-0x00000000049E0000-memory.dmp
          Filesize

          1.2MB

        • memory/4944-156-0x0000000004919000-0x000000000491B000-memory.dmp
          Filesize

          8KB

        • memory/4944-150-0x00000000048A0000-0x00000000049E0000-memory.dmp
          Filesize

          1.2MB

        • memory/4944-149-0x00000000048A0000-0x00000000049E0000-memory.dmp
          Filesize

          1.2MB

        • memory/4944-159-0x00000000040B0000-0x00000000047D5000-memory.dmp
          Filesize

          7.1MB

        • memory/4944-147-0x00000000048A0000-0x00000000049E0000-memory.dmp
          Filesize

          1.2MB

        • memory/4944-146-0x00000000040B0000-0x00000000047D5000-memory.dmp
          Filesize

          7.1MB

        • memory/4944-145-0x00000000040B0000-0x00000000047D5000-memory.dmp
          Filesize

          7.1MB

        • memory/4944-140-0x0000000000000000-mapping.dmp