Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2022 23:40

General

  • Target

    file.exe

  • Size

    216KB

  • MD5

    eebcd01fc997437a9e8d0d5d3251aa3d

  • SHA1

    aee6094f3b7ebdd47ba91caac386f152db2355a1

  • SHA256

    09ed41266242f1d86d54ea3902344cdc9b5852a57a918f0d01e178fcd92a66fa

  • SHA512

    a7d45ba85cec8b6a1af81d772705ba0f8069b4e5d1f7ba6f831cfe4a145a8d1652685bd48dcc5817fe9de13fae686ba6af190da302d8e78c99fcb2cd6074a2b9

  • SSDEEP

    3072:c/iJL5k8V5HrxXLxEwfWu1G1cWppLJg9Hu7b/t9jvCPNHCDml:ySL5ksFzG1nLsml9WFCa

Malware Config

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 25 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1192
  • C:\Users\Admin\AppData\Local\Temp\E5F0.exe
    C:\Users\Admin\AppData\Local\Temp\E5F0.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3888
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp",Wufaiiuuye
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:3564
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14144
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:944
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 528
      2⤵
      • Program crash
      PID:4880
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3888 -ip 3888
    1⤵
      PID:3540
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4944
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\SysWOW64\svchost.exe -k LocalService
        1⤵
          PID:2940

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        Query Registry

        3
        T1012

        System Information Discovery

        3
        T1082

        Peripheral Device Discovery

        1
        T1120

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\WindowsPowerShell\Modules\selection-actions.dll
          Filesize

          797KB

          MD5

          603aaa84200d2c463de15324bd225037

          SHA1

          4fa9f0055fe6751bd5fbd1fa01d2cd79a84129dd

          SHA256

          b24d5cc8f732324c71675009cf73b15d0c7042375f76d73c5b3b77b48a83e3fb

          SHA512

          a38f439ad3956c70a2d5c25b079475f68c61a32d68089177d9a033491356df1c51584d2f7a83f2b0d70811e3421a82923065a8cdd288f712c46af783fb938e37

        • C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\Fwroes.tmp
          Filesize

          1.3MB

          MD5

          4f73fb4e09c28f91a4847282bb7db2ac

          SHA1

          f9c0313dae5d2dab6c7e954c09b8ee49a2d0f0b1

          SHA256

          622f013f7ad8544d41a6682c801419445ad8b52893c878b61638efd636acbe91

          SHA512

          af0842b61021763a4b9f6b7506a7a8f3f5291b1b81628591c87ea4b05795e56234591b6ac12466d033634ac3b2fbb89a6c301ac2ea9913f3f798eb6c2fe35a39

        • C:\Users\Admin\AppData\Local\Temp\E5F0.exe
          Filesize

          1.1MB

          MD5

          cefdeeedeae94644485f2f7b17479059

          SHA1

          98875840acd3da6fd699b3b8b96aa3cfa1796580

          SHA256

          57462a03024056258e2b9979d50efb16e30ecdab9e9cda9bc7e7e62fd6a694bb

          SHA512

          f52f8484a03dcf4d57e6f43ce46effa301ae5ab580000cd03a6d6587678c1c3a6b6ed9e289d915e342e506aa9ea46e66eec039a0db2f82d53d020bf33bb8f6c4

        • C:\Users\Admin\AppData\Local\Temp\E5F0.exe
          Filesize

          1.1MB

          MD5

          cefdeeedeae94644485f2f7b17479059

          SHA1

          98875840acd3da6fd699b3b8b96aa3cfa1796580

          SHA256

          57462a03024056258e2b9979d50efb16e30ecdab9e9cda9bc7e7e62fd6a694bb

          SHA512

          f52f8484a03dcf4d57e6f43ce46effa301ae5ab580000cd03a6d6587678c1c3a6b6ed9e289d915e342e506aa9ea46e66eec039a0db2f82d53d020bf33bb8f6c4

        • C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp
          Filesize

          797KB

          MD5

          24925b25552a7d8f1d3292071e545920

          SHA1

          f786e1d40df30f6fed0301d60c823b655f2d6eac

          SHA256

          9931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b

          SHA512

          242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26

        • C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp
          Filesize

          797KB

          MD5

          24925b25552a7d8f1d3292071e545920

          SHA1

          f786e1d40df30f6fed0301d60c823b655f2d6eac

          SHA256

          9931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b

          SHA512

          242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26

        • \??\c:\program files (x86)\windowspowershell\modules\selection-actions.dll
          Filesize

          797KB

          MD5

          603aaa84200d2c463de15324bd225037

          SHA1

          4fa9f0055fe6751bd5fbd1fa01d2cd79a84129dd

          SHA256

          b24d5cc8f732324c71675009cf73b15d0c7042375f76d73c5b3b77b48a83e3fb

          SHA512

          a38f439ad3956c70a2d5c25b079475f68c61a32d68089177d9a033491356df1c51584d2f7a83f2b0d70811e3421a82923065a8cdd288f712c46af783fb938e37

        • memory/944-153-0x00007FF6F5576890-mapping.dmp
        • memory/944-158-0x00000288210C0000-0x00000288212EA000-memory.dmp
          Filesize

          2.2MB

        • memory/944-157-0x0000000000D10000-0x0000000000F29000-memory.dmp
          Filesize

          2.1MB

        • memory/944-155-0x0000028822A90000-0x0000028822BD0000-memory.dmp
          Filesize

          1.2MB

        • memory/944-154-0x0000028822A90000-0x0000028822BD0000-memory.dmp
          Filesize

          1.2MB

        • memory/1192-135-0x0000000000400000-0x0000000000460000-memory.dmp
          Filesize

          384KB

        • memory/1192-134-0x0000000000400000-0x0000000000460000-memory.dmp
          Filesize

          384KB

        • memory/1192-132-0x00000000007C3000-0x00000000007D4000-memory.dmp
          Filesize

          68KB

        • memory/1192-133-0x00000000001F0000-0x00000000001F9000-memory.dmp
          Filesize

          36KB

        • memory/3564-139-0x0000000000000000-mapping.dmp
        • memory/3564-146-0x00000000053F0000-0x0000000005B15000-memory.dmp
          Filesize

          7.1MB

        • memory/3564-150-0x0000000005CF0000-0x0000000005E30000-memory.dmp
          Filesize

          1.2MB

        • memory/3564-151-0x0000000005CF0000-0x0000000005E30000-memory.dmp
          Filesize

          1.2MB

        • memory/3564-152-0x0000000005CF0000-0x0000000005E30000-memory.dmp
          Filesize

          1.2MB

        • memory/3564-148-0x0000000005CF0000-0x0000000005E30000-memory.dmp
          Filesize

          1.2MB

        • memory/3564-147-0x0000000005CF0000-0x0000000005E30000-memory.dmp
          Filesize

          1.2MB

        • memory/3564-149-0x0000000005CF0000-0x0000000005E30000-memory.dmp
          Filesize

          1.2MB

        • memory/3564-156-0x0000000005D69000-0x0000000005D6B000-memory.dmp
          Filesize

          8KB

        • memory/3564-145-0x00000000053F0000-0x0000000005B15000-memory.dmp
          Filesize

          7.1MB

        • memory/3564-159-0x00000000053F0000-0x0000000005B15000-memory.dmp
          Filesize

          7.1MB

        • memory/3888-144-0x0000000000400000-0x000000000053E000-memory.dmp
          Filesize

          1.2MB

        • memory/3888-143-0x0000000002290000-0x00000000023C0000-memory.dmp
          Filesize

          1.2MB

        • memory/3888-142-0x0000000000638000-0x0000000000727000-memory.dmp
          Filesize

          956KB

        • memory/3888-136-0x0000000000000000-mapping.dmp