Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-01-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
5a17eb22c96dfbefb792493dac7618c0.exe
Resource
win7-20231215-en
General
-
Target
5a17eb22c96dfbefb792493dac7618c0.exe
-
Size
6.7MB
-
MD5
5a17eb22c96dfbefb792493dac7618c0
-
SHA1
178b7b1b0894ad100992f75b9529ae00d63a633c
-
SHA256
deb121bac1823d2de090b6816cbaffe8739600299b69789c109ac97a9477d5aa
-
SHA512
0c9d63c1f321df671e35463e9ad62b4ed1e6a6c2cb2cbc58cc652fde48bbde7f06a9325fc21f3c4c90c2aff62b402af75886962698781a885998932da164a297
-
SSDEEP
196608:Dt29v7XLTPmNbF6n1O4zGuY7gdDoqH9s7uHFsDKEz:yXwF6FSuMgFoy9s7uHFGR
Malware Config
Signatures
-
Babadeda Crypter 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\base.xml family_babadeda -
DarkVNC payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1272-503-0x0000000001B10000-0x0000000001BDA000-memory.dmp darkvnc behavioral1/memory/1272-508-0x0000000001B10000-0x0000000001BDA000-memory.dmp darkvnc behavioral1/memory/1272-509-0x0000000001B10000-0x0000000001BDA000-memory.dmp darkvnc behavioral1/memory/1272-510-0x0000000001B10000-0x0000000001BDA000-memory.dmp darkvnc behavioral1/memory/1272-511-0x0000000001B10000-0x0000000001BDA000-memory.dmp darkvnc behavioral1/memory/2260-512-0x0000000000140000-0x0000000000976000-memory.dmp darkvnc behavioral1/memory/1272-513-0x0000000001B10000-0x0000000001BDA000-memory.dmp darkvnc -
Executes dropped EXE 1 IoCs
Processes:
smart-reports.exepid process 2260 smart-reports.exe -
Loads dropped DLL 2 IoCs
Processes:
5a17eb22c96dfbefb792493dac7618c0.exesmart-reports.exepid process 3048 5a17eb22c96dfbefb792493dac7618c0.exe 2260 smart-reports.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
smart-reports.exedescription pid process target process PID 2260 set thread context of 1272 2260 smart-reports.exe WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
smart-reports.exepid process 2260 smart-reports.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
5a17eb22c96dfbefb792493dac7618c0.exesmart-reports.exedescription pid process target process PID 3048 wrote to memory of 2260 3048 5a17eb22c96dfbefb792493dac7618c0.exe smart-reports.exe PID 3048 wrote to memory of 2260 3048 5a17eb22c96dfbefb792493dac7618c0.exe smart-reports.exe PID 3048 wrote to memory of 2260 3048 5a17eb22c96dfbefb792493dac7618c0.exe smart-reports.exe PID 3048 wrote to memory of 2260 3048 5a17eb22c96dfbefb792493dac7618c0.exe smart-reports.exe PID 2260 wrote to memory of 1272 2260 smart-reports.exe WerFault.exe PID 2260 wrote to memory of 1272 2260 smart-reports.exe WerFault.exe PID 2260 wrote to memory of 1272 2260 smart-reports.exe WerFault.exe PID 2260 wrote to memory of 1272 2260 smart-reports.exe WerFault.exe PID 2260 wrote to memory of 1272 2260 smart-reports.exe WerFault.exe PID 2260 wrote to memory of 1272 2260 smart-reports.exe WerFault.exe PID 2260 wrote to memory of 1272 2260 smart-reports.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a17eb22c96dfbefb792493dac7618c0.exe"C:\Users\Admin\AppData\Local\Temp\5a17eb22c96dfbefb792493dac7618c0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\smart-reports.exe"C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\smart-reports.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe3⤵PID:1272
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD568750acdc6fa011af6da9095a56c477c
SHA143a0bea369153bb6e3433fef3833e2086f1086a8
SHA2569274c8f3bb7ec81bdd65a25e95959319fa7cf2b740908a3968281feff6452b84
SHA512f084ce886f3dbb8cabb63be665cef6558da485ecd5d8e896792cf964bd7bed3dca65c79c222601a47bebc4513fb88d9df944f9ca0ba40caedaa4131d53804f34
-
Filesize
79B
MD5ddd31f8fc20ab0835c1e135f80d6db51
SHA12d598c52c17bbf076ee4c3b9e58e4fff6144ab6d
SHA256fb749ac4812ba307bbb4c1e0b30175a88668fcb2eed702f780bd7da5987f9004
SHA512d514da7b2f68096cd6bd258d28ac5948a594c9cca4cd9ff79364b50c85641f2e11befaf81508e42841373459647cbe7e7e7f9daa675bcdf4c93ea85dea0c1a42
-
Filesize
894KB
MD5c6c62b319cc39617dcae1aac19ff806b
SHA120009616e9bde259e698415af19af1c94a4a7fe4
SHA25659356d54db35d3d35c011e2fe61c3f70cf037fe95cb2b82e7f584b9d193bb8af
SHA512163b796b9269bad810334edd997ef2fd2064963f8e46ea299c58ea84fef20a1fcdee5e9014eb37e31d25de6a8644fafc53050b9cf4f1a17f343b9728f41ed9ce
-
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\res\public\en\html\startpage_banner.html
Filesize490B
MD55d1f7da1c3d95020a0708118145364d0
SHA102f630e7ac8b8d400af219bd8811aa3a22f7186e
SHA256d2d828c2c459b72ee378db6c5ac295315b8a783b7049032f92ed4fcb2a89684a
SHA5126bbdaaef1478ffd9e9d3a95d300f35b9ac6f3ce6564e80734445a827ad8761233db36c679fac117f363bae27918983520f0e2f408205d3549b001fc4ae4c920c
-
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\res\public\en\html\startpage_connect_to_data_no_mru.html
Filesize1KB
MD520bbd307866f19a5af3ae9ebd5104018
SHA18e03c9b18b9d27e9292ee154b773553493df1157
SHA256e4fe51c170e02a01f30a4db8b458fb9b8dee13a7740f17765ba4873fac62c5f7
SHA512420a132ad4ba3a67f5b66a3e463c4fa495b7941d58d6d669a8c984380607a03f0afa1c92bcf1f8d1fc5d93838ea611f7f9cf439bb3ada0142431b119ddfad40d
-
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\res\public\en\html\startpage_connect_to_data_with_mru.html
Filesize1KB
MD5e6bc0d078616dd5d5f72d46ab2216e89
SHA1f70534bb999bcb8f1db0cf25a7279757e794499f
SHA256e8f50f17c994f394239350951a40c3454e9b52b0ca95cf342f2577828f390a54
SHA5126ccd6e19ec63f20c86a28ccaffa609a2d0de7991a8eb2d6ea016bcc5d0e9f2fc28c33a15c4af891f28a9e1e4131f38f84f8e1a8859e020d6f267977075f7c66a
-
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\res\public\en\html\startpage_landing.html
Filesize720B
MD50a5b47256c14570b80ef77ecfd2129b7
SHA169210a7429c991909c70b6b6b75fe4bc606048ae
SHA2561934657d800997dedba9f4753150f7d8f96dd5903a9c47ed6885aabf563bf73d
SHA5125ca22260d26ec5bb1d65c4af3e2f05356d7b144836790ac656bf8c1687dd5c7d67a8a46c7bde374ec9e59a1bedc0298a4609f229d997409a0cc5453ef102ecb2
-
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\res\public\en\html\startpage_topstrip_no_mru.html
Filesize659B
MD5eced86c9d5b8952ac5fb817c3ce2b8ba
SHA13ca24e69df7a4b81f799527a97282799fcd3f1e2
SHA2563988afa43d3c716ecbe4e261ff13c32fe67baaaf1718eac790040cff2aa4e44d
SHA512a21e88968c30f14363a73dfd7801cea34255acb968160fad59d813bb64352583c8c4f6cd9d45811676ca5ca90a4250601a53e80b6f41d6727465f3a57e7423a1
-
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\res\public\en\html\startpage_topstrip_with_mru.html
Filesize798B
MD5cc4d8a787ab1950c4e3aac5751c9fcde
SHA1d026a156723a52c34927b5a951a2bb7d23aa2c45
SHA25613683e06e737e83ca94505b1cd1cd70f4f8b2cc5e7560f121a6e02ed1a06e7ee
SHA512e0b01f5ee4da60e35a4eb94490bed815aea00382f3b9822b7c29294cf86a2fe480dba704f086a38f9d7aaf39e8160f49cf806b6b6c44651de56e290249dd9ebe
-
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\res\public\en\stylesheets\start_page.css
Filesize2KB
MD5f2ab3e5fb61293ae8656413dbb6e5dc3
SHA153b3c3c4b57c3d5e2d9a36272b27786cd60f0eb5
SHA25606db4d53adf4a1ecbc03ed9962af7f46fd3a54668d45907dc1737125e38ec192
SHA5122c31cad868e1e5149a4308a149104ac3d88907894699fb0413860c8f578de32f6814b08d518de7a7fe3782f0cea173cb1766da7c25f2bcdddaffae7bc0da927c
-
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\res\public\en\stylesheets\start_page_landing.css
Filesize282B
MD549617add7303a8fbd24e1ad16ba715d8
SHA131772218ccf51fe5955625346c12e00c0f2e539a
SHA256b3a99eea19c469dab3b727d1324ed87d10999133d3268ed0fadd5a5c8d182907
SHA5129d1198ca13a0c1f745b01aabc23b60b8e0df4f12d7fdf17e87e750f021fc3800ea808af6c875848b3850061070dfd54c2e34d92cea4e8a2bf4736fbcfd129d1e
-
Filesize
940KB
MD51aa41052219b38d7f4fb200b22d3b563
SHA1d11e55147401d9f82d8aeb47bd8cd2a7cc95b728
SHA2565c4b6373cc4b84b41bd01bc2a8e23cab98075cc9a5a120b0a9873a2c313b947c
SHA51251b6daa29893a251c9463f7c4d7de9bbddc4e31b9a03bbc5e04ae1f4e6fe8d39f809fd6c5aa8650f014308935b92938daebdaecc831e9f286c426d9597979024
-
Filesize
920KB
MD5c1c2a1c49e09e126f9df930c507e01fc
SHA1ec437fa73e7799abcb5a14dbc5f3b4941924ce29
SHA2569c4bc0faa71c14a8d0ed1aeebe7d40876302075bdfec601e57d1089c609a6a12
SHA512522b7f7dc9c64c658547514821185ebb17859b5d71c8776d1b74e0176fb952f58805bd421d784517957766d95fcc7845cc36774a001e958c9398f71ca864a196
-
Filesize
1.2MB
MD5c919f00320d4951c01e921c7664afe82
SHA1dc09711796b949433ff0b8e81d08ea528da47049
SHA25601883bde5c5c9c76a381c30b3188a7b6b67a0bced475008b37595a66b91f561a
SHA5128214960327317328df89e006cd2af059b8982bd2f49af3babadfcf7f060a5971dcea62c1feab8ecd0323f3baf7c6e8720e96c08cd9d075d315c1c5a3c13205f9
-
Filesize
1.3MB
MD54dce36ba494371a3120057757b9e3f11
SHA13725927d60997839c88749e60c4c960cf4afa15a
SHA256bae717ec9bcef7508ec6ab7402c1f5ab33476bedf015cc6199fbf0c8c736a819
SHA512ef5273d3131f4f22e71416fa1fb18f95f1873a672ee3cda1ea5d9ee8f6c5814e5156c7a57595bdc0c26969583aad5fed98d0588aefe55481120e1ffbabb4b37e