Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-01-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
5a17eb22c96dfbefb792493dac7618c0.exe
Resource
win7-20231215-en
General
-
Target
5a17eb22c96dfbefb792493dac7618c0.exe
-
Size
6.7MB
-
MD5
5a17eb22c96dfbefb792493dac7618c0
-
SHA1
178b7b1b0894ad100992f75b9529ae00d63a633c
-
SHA256
deb121bac1823d2de090b6816cbaffe8739600299b69789c109ac97a9477d5aa
-
SHA512
0c9d63c1f321df671e35463e9ad62b4ed1e6a6c2cb2cbc58cc652fde48bbde7f06a9325fc21f3c4c90c2aff62b402af75886962698781a885998932da164a297
-
SSDEEP
196608:Dt29v7XLTPmNbF6n1O4zGuY7gdDoqH9s7uHFsDKEz:yXwF6FSuMgFoy9s7uHFGR
Malware Config
Signatures
-
Babadeda Crypter 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016577-498.dat family_babadeda -
DarkVNC payload 7 IoCs
resource yara_rule behavioral1/memory/1272-503-0x0000000001B10000-0x0000000001BDA000-memory.dmp darkvnc behavioral1/memory/1272-508-0x0000000001B10000-0x0000000001BDA000-memory.dmp darkvnc behavioral1/memory/1272-509-0x0000000001B10000-0x0000000001BDA000-memory.dmp darkvnc behavioral1/memory/1272-510-0x0000000001B10000-0x0000000001BDA000-memory.dmp darkvnc behavioral1/memory/1272-511-0x0000000001B10000-0x0000000001BDA000-memory.dmp darkvnc behavioral1/memory/2260-512-0x0000000000140000-0x0000000000976000-memory.dmp darkvnc behavioral1/memory/1272-513-0x0000000001B10000-0x0000000001BDA000-memory.dmp darkvnc -
Executes dropped EXE 1 IoCs
pid Process 2260 smart-reports.exe -
Loads dropped DLL 2 IoCs
pid Process 3048 5a17eb22c96dfbefb792493dac7618c0.exe 2260 smart-reports.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2260 set thread context of 1272 2260 smart-reports.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2260 smart-reports.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2260 3048 5a17eb22c96dfbefb792493dac7618c0.exe 28 PID 3048 wrote to memory of 2260 3048 5a17eb22c96dfbefb792493dac7618c0.exe 28 PID 3048 wrote to memory of 2260 3048 5a17eb22c96dfbefb792493dac7618c0.exe 28 PID 3048 wrote to memory of 2260 3048 5a17eb22c96dfbefb792493dac7618c0.exe 28 PID 2260 wrote to memory of 1272 2260 smart-reports.exe 32 PID 2260 wrote to memory of 1272 2260 smart-reports.exe 32 PID 2260 wrote to memory of 1272 2260 smart-reports.exe 32 PID 2260 wrote to memory of 1272 2260 smart-reports.exe 32 PID 2260 wrote to memory of 1272 2260 smart-reports.exe 32 PID 2260 wrote to memory of 1272 2260 smart-reports.exe 32 PID 2260 wrote to memory of 1272 2260 smart-reports.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a17eb22c96dfbefb792493dac7618c0.exe"C:\Users\Admin\AppData\Local\Temp\5a17eb22c96dfbefb792493dac7618c0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\smart-reports.exe"C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\smart-reports.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe3⤵PID:1272
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD568750acdc6fa011af6da9095a56c477c
SHA143a0bea369153bb6e3433fef3833e2086f1086a8
SHA2569274c8f3bb7ec81bdd65a25e95959319fa7cf2b740908a3968281feff6452b84
SHA512f084ce886f3dbb8cabb63be665cef6558da485ecd5d8e896792cf964bd7bed3dca65c79c222601a47bebc4513fb88d9df944f9ca0ba40caedaa4131d53804f34
-
Filesize
79B
MD5ddd31f8fc20ab0835c1e135f80d6db51
SHA12d598c52c17bbf076ee4c3b9e58e4fff6144ab6d
SHA256fb749ac4812ba307bbb4c1e0b30175a88668fcb2eed702f780bd7da5987f9004
SHA512d514da7b2f68096cd6bd258d28ac5948a594c9cca4cd9ff79364b50c85641f2e11befaf81508e42841373459647cbe7e7e7f9daa675bcdf4c93ea85dea0c1a42
-
Filesize
894KB
MD5c6c62b319cc39617dcae1aac19ff806b
SHA120009616e9bde259e698415af19af1c94a4a7fe4
SHA25659356d54db35d3d35c011e2fe61c3f70cf037fe95cb2b82e7f584b9d193bb8af
SHA512163b796b9269bad810334edd997ef2fd2064963f8e46ea299c58ea84fef20a1fcdee5e9014eb37e31d25de6a8644fafc53050b9cf4f1a17f343b9728f41ed9ce
-
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\res\public\en\html\startpage_banner.html
Filesize490B
MD55d1f7da1c3d95020a0708118145364d0
SHA102f630e7ac8b8d400af219bd8811aa3a22f7186e
SHA256d2d828c2c459b72ee378db6c5ac295315b8a783b7049032f92ed4fcb2a89684a
SHA5126bbdaaef1478ffd9e9d3a95d300f35b9ac6f3ce6564e80734445a827ad8761233db36c679fac117f363bae27918983520f0e2f408205d3549b001fc4ae4c920c
-
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\res\public\en\html\startpage_connect_to_data_no_mru.html
Filesize1KB
MD520bbd307866f19a5af3ae9ebd5104018
SHA18e03c9b18b9d27e9292ee154b773553493df1157
SHA256e4fe51c170e02a01f30a4db8b458fb9b8dee13a7740f17765ba4873fac62c5f7
SHA512420a132ad4ba3a67f5b66a3e463c4fa495b7941d58d6d669a8c984380607a03f0afa1c92bcf1f8d1fc5d93838ea611f7f9cf439bb3ada0142431b119ddfad40d
-
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\res\public\en\html\startpage_connect_to_data_with_mru.html
Filesize1KB
MD5e6bc0d078616dd5d5f72d46ab2216e89
SHA1f70534bb999bcb8f1db0cf25a7279757e794499f
SHA256e8f50f17c994f394239350951a40c3454e9b52b0ca95cf342f2577828f390a54
SHA5126ccd6e19ec63f20c86a28ccaffa609a2d0de7991a8eb2d6ea016bcc5d0e9f2fc28c33a15c4af891f28a9e1e4131f38f84f8e1a8859e020d6f267977075f7c66a
-
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\res\public\en\html\startpage_landing.html
Filesize720B
MD50a5b47256c14570b80ef77ecfd2129b7
SHA169210a7429c991909c70b6b6b75fe4bc606048ae
SHA2561934657d800997dedba9f4753150f7d8f96dd5903a9c47ed6885aabf563bf73d
SHA5125ca22260d26ec5bb1d65c4af3e2f05356d7b144836790ac656bf8c1687dd5c7d67a8a46c7bde374ec9e59a1bedc0298a4609f229d997409a0cc5453ef102ecb2
-
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\res\public\en\html\startpage_topstrip_no_mru.html
Filesize659B
MD5eced86c9d5b8952ac5fb817c3ce2b8ba
SHA13ca24e69df7a4b81f799527a97282799fcd3f1e2
SHA2563988afa43d3c716ecbe4e261ff13c32fe67baaaf1718eac790040cff2aa4e44d
SHA512a21e88968c30f14363a73dfd7801cea34255acb968160fad59d813bb64352583c8c4f6cd9d45811676ca5ca90a4250601a53e80b6f41d6727465f3a57e7423a1
-
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\res\public\en\html\startpage_topstrip_with_mru.html
Filesize798B
MD5cc4d8a787ab1950c4e3aac5751c9fcde
SHA1d026a156723a52c34927b5a951a2bb7d23aa2c45
SHA25613683e06e737e83ca94505b1cd1cd70f4f8b2cc5e7560f121a6e02ed1a06e7ee
SHA512e0b01f5ee4da60e35a4eb94490bed815aea00382f3b9822b7c29294cf86a2fe480dba704f086a38f9d7aaf39e8160f49cf806b6b6c44651de56e290249dd9ebe
-
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\res\public\en\stylesheets\start_page.css
Filesize2KB
MD5f2ab3e5fb61293ae8656413dbb6e5dc3
SHA153b3c3c4b57c3d5e2d9a36272b27786cd60f0eb5
SHA25606db4d53adf4a1ecbc03ed9962af7f46fd3a54668d45907dc1737125e38ec192
SHA5122c31cad868e1e5149a4308a149104ac3d88907894699fb0413860c8f578de32f6814b08d518de7a7fe3782f0cea173cb1766da7c25f2bcdddaffae7bc0da927c
-
C:\Users\Admin\AppData\Roaming\SAP BusinessObjects\SBOP Crystal Reports\res\public\en\stylesheets\start_page_landing.css
Filesize282B
MD549617add7303a8fbd24e1ad16ba715d8
SHA131772218ccf51fe5955625346c12e00c0f2e539a
SHA256b3a99eea19c469dab3b727d1324ed87d10999133d3268ed0fadd5a5c8d182907
SHA5129d1198ca13a0c1f745b01aabc23b60b8e0df4f12d7fdf17e87e750f021fc3800ea808af6c875848b3850061070dfd54c2e34d92cea4e8a2bf4736fbcfd129d1e
-
Filesize
940KB
MD51aa41052219b38d7f4fb200b22d3b563
SHA1d11e55147401d9f82d8aeb47bd8cd2a7cc95b728
SHA2565c4b6373cc4b84b41bd01bc2a8e23cab98075cc9a5a120b0a9873a2c313b947c
SHA51251b6daa29893a251c9463f7c4d7de9bbddc4e31b9a03bbc5e04ae1f4e6fe8d39f809fd6c5aa8650f014308935b92938daebdaecc831e9f286c426d9597979024
-
Filesize
920KB
MD5c1c2a1c49e09e126f9df930c507e01fc
SHA1ec437fa73e7799abcb5a14dbc5f3b4941924ce29
SHA2569c4bc0faa71c14a8d0ed1aeebe7d40876302075bdfec601e57d1089c609a6a12
SHA512522b7f7dc9c64c658547514821185ebb17859b5d71c8776d1b74e0176fb952f58805bd421d784517957766d95fcc7845cc36774a001e958c9398f71ca864a196
-
Filesize
1.2MB
MD5c919f00320d4951c01e921c7664afe82
SHA1dc09711796b949433ff0b8e81d08ea528da47049
SHA25601883bde5c5c9c76a381c30b3188a7b6b67a0bced475008b37595a66b91f561a
SHA5128214960327317328df89e006cd2af059b8982bd2f49af3babadfcf7f060a5971dcea62c1feab8ecd0323f3baf7c6e8720e96c08cd9d075d315c1c5a3c13205f9
-
Filesize
1.3MB
MD54dce36ba494371a3120057757b9e3f11
SHA13725927d60997839c88749e60c4c960cf4afa15a
SHA256bae717ec9bcef7508ec6ab7402c1f5ab33476bedf015cc6199fbf0c8c736a819
SHA512ef5273d3131f4f22e71416fa1fb18f95f1873a672ee3cda1ea5d9ee8f6c5814e5156c7a57595bdc0c26969583aad5fed98d0588aefe55481120e1ffbabb4b37e