Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-12-2022 09:27

General

  • Target

    889ceb40b0ce50e9364d722c0e92f3cdf6e93aa2d4b16e5e7bbd445df541b065.exe

  • Size

    228KB

  • MD5

    5cf89ba33d6c85ba6acd9cf7db505129

  • SHA1

    a69559e30dbf0f651007bffc85bbb281a8d08082

  • SHA256

    889ceb40b0ce50e9364d722c0e92f3cdf6e93aa2d4b16e5e7bbd445df541b065

  • SHA512

    122bb7892c2d841884b65a9b99f42604ada969c1c3e80eb6118d650e3c15bd7f80f0fff08dfb08359e7dd98c606d831fedd14f2998df706291b3fb7ed2ec6a15

  • SSDEEP

    6144:LK+LdU/YZilCSl9cSEyBTQAeKrw1Wzz/:LK+xgPlCSl37BEAe5Mz

Malware Config

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 22 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\889ceb40b0ce50e9364d722c0e92f3cdf6e93aa2d4b16e5e7bbd445df541b065.exe
    "C:\Users\Admin\AppData\Local\Temp\889ceb40b0ce50e9364d722c0e92f3cdf6e93aa2d4b16e5e7bbd445df541b065.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2748
  • C:\Users\Admin\AppData\Local\Temp\D9AB.exe
    C:\Users\Admin\AppData\Local\Temp\D9AB.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4744
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp",Wufaiiuuye
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:3476
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14132
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:3912
  • C:\Users\Admin\AppData\Local\Temp\2DA8.exe
    C:\Users\Admin\AppData\Local\Temp\2DA8.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\2DA8.exe" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:516
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 6
        3⤵
        • Delays execution with timeout.exe
        PID:2680
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4700

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    Query Registry

    3
    T1012

    System Information Discovery

    3
    T1082

    Peripheral Device Discovery

    1
    T1120

    Collection

    Data from Local System

    3
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2DA8.exe
      Filesize

      345KB

      MD5

      4bb4894b6642e0c45b78377021c13345

      SHA1

      5ccb0f727e41748fcdc624e9f9138d5bd6c2417a

      SHA256

      032f11472c3c4a71a697ed0a656f265ac31af952667da0d6b716c6a54ac66bae

      SHA512

      111da040c3690ebdc74bc86e14cbab7b0f23b26cacc863582874e95ea98aebcbaac776b850f03ad331fcdac7c5900cd7d6ab9222669bf478f047817f876b35ef

    • C:\Users\Admin\AppData\Local\Temp\2DA8.exe
      Filesize

      345KB

      MD5

      4bb4894b6642e0c45b78377021c13345

      SHA1

      5ccb0f727e41748fcdc624e9f9138d5bd6c2417a

      SHA256

      032f11472c3c4a71a697ed0a656f265ac31af952667da0d6b716c6a54ac66bae

      SHA512

      111da040c3690ebdc74bc86e14cbab7b0f23b26cacc863582874e95ea98aebcbaac776b850f03ad331fcdac7c5900cd7d6ab9222669bf478f047817f876b35ef

    • C:\Users\Admin\AppData\Local\Temp\D9AB.exe
      Filesize

      1.1MB

      MD5

      96e78dc64ec67e77e1738da9b733dc86

      SHA1

      b9dd381c4f1d359ecb73dacd187642db300ab90c

      SHA256

      ff48a20d7f33ff96546a5b6e060f6bb570b4e398d77991d720d60ddf4f30f167

      SHA512

      7533b4fa266e003905638176710aec4203d9f5808505ef4d619eddd4570b2d6b58b99933d976903b60d0b7d23b485778962782f8d84a387316e416dcd62fcaf7

    • C:\Users\Admin\AppData\Local\Temp\D9AB.exe
      Filesize

      1.1MB

      MD5

      96e78dc64ec67e77e1738da9b733dc86

      SHA1

      b9dd381c4f1d359ecb73dacd187642db300ab90c

      SHA256

      ff48a20d7f33ff96546a5b6e060f6bb570b4e398d77991d720d60ddf4f30f167

      SHA512

      7533b4fa266e003905638176710aec4203d9f5808505ef4d619eddd4570b2d6b58b99933d976903b60d0b7d23b485778962782f8d84a387316e416dcd62fcaf7

    • C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp
      Filesize

      797KB

      MD5

      24925b25552a7d8f1d3292071e545920

      SHA1

      f786e1d40df30f6fed0301d60c823b655f2d6eac

      SHA256

      9931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b

      SHA512

      242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26

    • \ProgramData\mozglue.dll
      Filesize

      133KB

      MD5

      8f73c08a9660691143661bf7332c3c27

      SHA1

      37fa65dd737c50fda710fdbde89e51374d0c204a

      SHA256

      3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

      SHA512

      0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

    • \ProgramData\nss3.dll
      Filesize

      1.2MB

      MD5

      bfac4e3c5908856ba17d41edcd455a51

      SHA1

      8eec7e888767aa9e4cca8ff246eb2aacb9170428

      SHA256

      e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

      SHA512

      2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

    • \Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp
      Filesize

      797KB

      MD5

      24925b25552a7d8f1d3292071e545920

      SHA1

      f786e1d40df30f6fed0301d60c823b655f2d6eac

      SHA256

      9931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b

      SHA512

      242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26

    • memory/516-450-0x0000000000000000-mapping.dmp
    • memory/2616-315-0x0000000000400000-0x000000000047F000-memory.dmp
      Filesize

      508KB

    • memory/2616-314-0x0000000000570000-0x00000000006BA000-memory.dmp
      Filesize

      1.3MB

    • memory/2616-313-0x00000000006E1000-0x000000000070F000-memory.dmp
      Filesize

      184KB

    • memory/2616-454-0x0000000000400000-0x000000000047F000-memory.dmp
      Filesize

      508KB

    • memory/2616-453-0x00000000006E1000-0x000000000070F000-memory.dmp
      Filesize

      184KB

    • memory/2616-283-0x0000000000000000-mapping.dmp
    • memory/2680-458-0x0000000000000000-mapping.dmp
    • memory/2748-126-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-150-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-129-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-130-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-131-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-132-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-133-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-134-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-135-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-136-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-137-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-138-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-139-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-142-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-140-0x00000000007D1000-0x00000000007E1000-memory.dmp
      Filesize

      64KB

    • memory/2748-144-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-145-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-146-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-147-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-148-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-149-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-128-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-143-0x0000000000400000-0x0000000000462000-memory.dmp
      Filesize

      392KB

    • memory/2748-141-0x00000000001D0000-0x00000000001D9000-memory.dmp
      Filesize

      36KB

    • memory/2748-151-0x0000000000400000-0x0000000000462000-memory.dmp
      Filesize

      392KB

    • memory/2748-115-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-116-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-127-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-125-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-124-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-123-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-122-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-121-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-120-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-117-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-118-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/2748-119-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/3476-332-0x00000000082D0000-0x00000000089F5000-memory.dmp
      Filesize

      7.1MB

    • memory/3476-391-0x00000000074B9000-0x00000000074BB000-memory.dmp
      Filesize

      8KB

    • memory/3476-481-0x00000000082D0000-0x00000000089F5000-memory.dmp
      Filesize

      7.1MB

    • memory/3476-200-0x0000000000000000-mapping.dmp
    • memory/3912-386-0x00007FF726765FD0-mapping.dmp
    • memory/3912-392-0x0000000000DD0000-0x0000000000FE9000-memory.dmp
      Filesize

      2.1MB

    • memory/3912-393-0x0000010B010D0000-0x0000010B012FA000-memory.dmp
      Filesize

      2.2MB

    • memory/4744-159-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-174-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-175-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-177-0x0000000000890000-0x000000000098B000-memory.dmp
      Filesize

      1004KB

    • memory/4744-178-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-176-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-180-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-182-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-181-0x0000000000400000-0x000000000053E000-memory.dmp
      Filesize

      1.2MB

    • memory/4744-179-0x0000000002330000-0x0000000002460000-memory.dmp
      Filesize

      1.2MB

    • memory/4744-183-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-184-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-185-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-186-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-187-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-188-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-173-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-172-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-171-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-170-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-169-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-168-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-167-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-166-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-165-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-164-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-163-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-160-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-158-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-155-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-157-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-156-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-154-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-152-0x0000000000000000-mapping.dmp
    • memory/4744-189-0x0000000077100000-0x000000007728E000-memory.dmp
      Filesize

      1.6MB

    • memory/4744-203-0x0000000000400000-0x000000000053E000-memory.dmp
      Filesize

      1.2MB