Analysis

  • max time kernel
    150s
  • max time network
    134s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20-12-2022 13:57

General

  • Target

    b747dda36be7c0d51dd011728418e184b0dd163c51a53d3fb22e92e596147979.exe

  • Size

    214KB

  • MD5

    e4de9546e6536c619d39dfd8861bfc0a

  • SHA1

    a7bad7df8d7865638640ba93dd44a08069c28bc6

  • SHA256

    b747dda36be7c0d51dd011728418e184b0dd163c51a53d3fb22e92e596147979

  • SHA512

    3776fb02a698990d16e2f4bc149c86cb5646ea21ba114329c19f68905fb02458bc1d1a7e6f7e6490e316f15576857e361cbd3827d0f2b022b77016eee529b5fe

  • SSDEEP

    3072:nQL8A7R9tnNOrEO8Uzvek/QwKw3vq57b/dCE57VPmsNHCDml:QL8qzgEOfzj/RKgQFJV9Ca

Malware Config

Extracted

Family

systembc

C2

109.205.214.18:443

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b747dda36be7c0d51dd011728418e184b0dd163c51a53d3fb22e92e596147979.exe
    "C:\Users\Admin\AppData\Local\Temp\b747dda36be7c0d51dd011728418e184b0dd163c51a53d3fb22e92e596147979.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2496
  • C:\Users\Admin\AppData\Local\Temp\3B82.exe
    C:\Users\Admin\AppData\Local\Temp\3B82.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4628
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp",Wufaiiuuye
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:4308
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14153
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4396
  • C:\Users\Admin\AppData\Local\Temp\6003.exe
    C:\Users\Admin\AppData\Local\Temp\6003.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:4532
  • C:\ProgramData\qxwnds\bpdq.exe
    C:\ProgramData\qxwnds\bpdq.exe start
    1⤵
    • Executes dropped EXE
    PID:4768
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:200
    • C:\Users\Admin\AppData\Roaming\dccehrc
      C:\Users\Admin\AppData\Roaming\dccehrc
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1112

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    3
    T1082

    Query Registry

    2
    T1012

    Peripheral Device Discovery

    1
    T1120

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\qxwnds\bpdq.exe
      Filesize

      218KB

      MD5

      cdc67700f25eaed1417264c4bdec03d3

      SHA1

      56639e9414e6ee8394d940d62778475ddf071290

      SHA256

      fdd4cca0516be799c954e96be26b2d04e42ea0bac1edb00604412914bae2f100

      SHA512

      a2b38a1d4d0cb57532f3feb2efa1fb345c03df9114dfb2dcc93286e19b96eb5e182bd79d070a0e4fccf1980f47effc9b511dbb0074bba69bee80098317e08038

    • C:\ProgramData\qxwnds\bpdq.exe
      Filesize

      218KB

      MD5

      cdc67700f25eaed1417264c4bdec03d3

      SHA1

      56639e9414e6ee8394d940d62778475ddf071290

      SHA256

      fdd4cca0516be799c954e96be26b2d04e42ea0bac1edb00604412914bae2f100

      SHA512

      a2b38a1d4d0cb57532f3feb2efa1fb345c03df9114dfb2dcc93286e19b96eb5e182bd79d070a0e4fccf1980f47effc9b511dbb0074bba69bee80098317e08038

    • C:\Users\Admin\AppData\Local\Temp\3B82.exe
      Filesize

      1.1MB

      MD5

      0bcfd64236a383b6eb74c14e7852c06b

      SHA1

      e30bf2b3338a759c1af139e681beb08b9d20db82

      SHA256

      39e9581effab24da8eb08d77968c002d4d742dd836ec2a0c8ab6b9879b4892a7

      SHA512

      bb75de366f834acf8f725ea7dcde4f8a38324166ea13ee6f1aee8b0599d53a194c2140894418ad9c6b169ad91e63188e0db799172daf13bc95d9cb9d3d2a759e

    • C:\Users\Admin\AppData\Local\Temp\3B82.exe
      Filesize

      1.1MB

      MD5

      0bcfd64236a383b6eb74c14e7852c06b

      SHA1

      e30bf2b3338a759c1af139e681beb08b9d20db82

      SHA256

      39e9581effab24da8eb08d77968c002d4d742dd836ec2a0c8ab6b9879b4892a7

      SHA512

      bb75de366f834acf8f725ea7dcde4f8a38324166ea13ee6f1aee8b0599d53a194c2140894418ad9c6b169ad91e63188e0db799172daf13bc95d9cb9d3d2a759e

    • C:\Users\Admin\AppData\Local\Temp\6003.exe
      Filesize

      218KB

      MD5

      cdc67700f25eaed1417264c4bdec03d3

      SHA1

      56639e9414e6ee8394d940d62778475ddf071290

      SHA256

      fdd4cca0516be799c954e96be26b2d04e42ea0bac1edb00604412914bae2f100

      SHA512

      a2b38a1d4d0cb57532f3feb2efa1fb345c03df9114dfb2dcc93286e19b96eb5e182bd79d070a0e4fccf1980f47effc9b511dbb0074bba69bee80098317e08038

    • C:\Users\Admin\AppData\Local\Temp\6003.exe
      Filesize

      218KB

      MD5

      cdc67700f25eaed1417264c4bdec03d3

      SHA1

      56639e9414e6ee8394d940d62778475ddf071290

      SHA256

      fdd4cca0516be799c954e96be26b2d04e42ea0bac1edb00604412914bae2f100

      SHA512

      a2b38a1d4d0cb57532f3feb2efa1fb345c03df9114dfb2dcc93286e19b96eb5e182bd79d070a0e4fccf1980f47effc9b511dbb0074bba69bee80098317e08038

    • C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp
      Filesize

      797KB

      MD5

      24925b25552a7d8f1d3292071e545920

      SHA1

      f786e1d40df30f6fed0301d60c823b655f2d6eac

      SHA256

      9931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b

      SHA512

      242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26

    • C:\Users\Admin\AppData\Roaming\dccehrc
      Filesize

      214KB

      MD5

      e4de9546e6536c619d39dfd8861bfc0a

      SHA1

      a7bad7df8d7865638640ba93dd44a08069c28bc6

      SHA256

      b747dda36be7c0d51dd011728418e184b0dd163c51a53d3fb22e92e596147979

      SHA512

      3776fb02a698990d16e2f4bc149c86cb5646ea21ba114329c19f68905fb02458bc1d1a7e6f7e6490e316f15576857e361cbd3827d0f2b022b77016eee529b5fe

    • C:\Users\Admin\AppData\Roaming\dccehrc
      Filesize

      214KB

      MD5

      e4de9546e6536c619d39dfd8861bfc0a

      SHA1

      a7bad7df8d7865638640ba93dd44a08069c28bc6

      SHA256

      b747dda36be7c0d51dd011728418e184b0dd163c51a53d3fb22e92e596147979

      SHA512

      3776fb02a698990d16e2f4bc149c86cb5646ea21ba114329c19f68905fb02458bc1d1a7e6f7e6490e316f15576857e361cbd3827d0f2b022b77016eee529b5fe

    • \Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp
      Filesize

      797KB

      MD5

      24925b25552a7d8f1d3292071e545920

      SHA1

      f786e1d40df30f6fed0301d60c823b655f2d6eac

      SHA256

      9931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b

      SHA512

      242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26

    • memory/1112-475-0x0000000000550000-0x000000000069A000-memory.dmp
      Filesize

      1.3MB

    • memory/1112-476-0x0000000000550000-0x000000000069A000-memory.dmp
      Filesize

      1.3MB

    • memory/1112-477-0x0000000000400000-0x000000000045E000-memory.dmp
      Filesize

      376KB

    • memory/1112-478-0x0000000000400000-0x000000000045E000-memory.dmp
      Filesize

      376KB

    • memory/2496-139-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-151-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-133-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-134-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-135-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-136-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-137-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-138-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-140-0x00000000006D6000-0x00000000006E7000-memory.dmp
      Filesize

      68KB

    • memory/2496-142-0x0000000000550000-0x0000000000559000-memory.dmp
      Filesize

      36KB

    • memory/2496-143-0x0000000000400000-0x000000000045E000-memory.dmp
      Filesize

      376KB

    • memory/2496-141-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-117-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-144-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-145-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-146-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-148-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-147-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-149-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-150-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-152-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-129-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-153-0x00000000006D6000-0x00000000006E7000-memory.dmp
      Filesize

      68KB

    • memory/2496-154-0x0000000000400000-0x000000000045E000-memory.dmp
      Filesize

      376KB

    • memory/2496-118-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-131-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-119-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-120-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-121-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-122-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-123-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-128-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-127-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-130-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-132-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-126-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-124-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-125-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4308-376-0x0000000007210000-0x0000000007935000-memory.dmp
      Filesize

      7.1MB

    • memory/4308-434-0x0000000007210000-0x0000000007935000-memory.dmp
      Filesize

      7.1MB

    • memory/4308-203-0x0000000000000000-mapping.dmp
    • memory/4396-412-0x00007FF6E8325FD0-mapping.dmp
    • memory/4396-431-0x0000000000EB0000-0x00000000010C9000-memory.dmp
      Filesize

      2.1MB

    • memory/4396-432-0x000002549B310000-0x000002549B53A000-memory.dmp
      Filesize

      2.2MB

    • memory/4532-265-0x0000000000000000-mapping.dmp
    • memory/4532-316-0x00000000007E6000-0x00000000007F7000-memory.dmp
      Filesize

      68KB

    • memory/4532-438-0x00000000007E6000-0x00000000007F7000-memory.dmp
      Filesize

      68KB

    • memory/4532-346-0x0000000000460000-0x00000000005AA000-memory.dmp
      Filesize

      1.3MB

    • memory/4532-345-0x00000000007E6000-0x00000000007F7000-memory.dmp
      Filesize

      68KB

    • memory/4532-344-0x0000000000400000-0x000000000045F000-memory.dmp
      Filesize

      380KB

    • memory/4532-318-0x0000000000460000-0x00000000005AA000-memory.dmp
      Filesize

      1.3MB

    • memory/4628-170-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-179-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-186-0x00000000022C0000-0x00000000023F0000-memory.dmp
      Filesize

      1.2MB

    • memory/4628-187-0x0000000000400000-0x000000000053D000-memory.dmp
      Filesize

      1.2MB

    • memory/4628-185-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-189-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-190-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-191-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-192-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-188-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-176-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-210-0x0000000000400000-0x000000000053D000-memory.dmp
      Filesize

      1.2MB

    • memory/4628-175-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-174-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-172-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-171-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-177-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-184-0x0000000002160000-0x0000000002256000-memory.dmp
      Filesize

      984KB

    • memory/4628-182-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-181-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-180-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-183-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-169-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-168-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-167-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-155-0x0000000000000000-mapping.dmp
    • memory/4628-157-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-166-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-165-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-163-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-158-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-162-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-159-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-160-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-178-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4628-161-0x0000000077580000-0x000000007770E000-memory.dmp
      Filesize

      1.6MB

    • memory/4768-436-0x0000000000CF0000-0x0000000000CF9000-memory.dmp
      Filesize

      36KB

    • memory/4768-435-0x0000000000540000-0x000000000068A000-memory.dmp
      Filesize

      1.3MB

    • memory/4768-433-0x0000000000400000-0x000000000045F000-memory.dmp
      Filesize

      380KB

    • memory/4768-398-0x0000000000CF0000-0x0000000000CF9000-memory.dmp
      Filesize

      36KB

    • memory/4768-396-0x0000000000540000-0x000000000068A000-memory.dmp
      Filesize

      1.3MB