Analysis

  • max time kernel
    146s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    03-12-2020 17:21

General

  • Target

    2626e0990d2db399b35b6e357fd53ed1.exe

  • Size

    548KB

  • MD5

    2626e0990d2db399b35b6e357fd53ed1

  • SHA1

    28cc3944167b0da48c4e81333e08b5c80244c572

  • SHA256

    ada1c5359c35e6b70c5a2d5533f9d725f86a1e155c8486bfd2941c9b40478ea2

  • SHA512

    7b741f662f70e78f9a7094b0892e93fba461f992ac938f922379179e365b4ecdeaf8fc7996f6da9aa44e52d5f815ffacbe17d425545da605d89845183938f2f1

Malware Config

Extracted

Family

danabot

Version

1732

Botnet

3

C2

23.254.215.116:443

104.227.34.227:443

23.254.118.230:443

51.195.73.129:443

Attributes
  • embedded_hash

    4A3DA3F8025592B0C9FF1DB7E462C9FA

rsa_pubkey.plain
rsa_pubkey.plain

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Blocklisted process makes network request 6 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 13 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 53 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • autoit_exe 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 3 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2626e0990d2db399b35b6e357fd53ed1.exe
    "C:\Users\Admin\AppData\Local\Temp\2626e0990d2db399b35b6e357fd53ed1.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Users\Admin\AppData\Local\Temp\File2.exe
      "C:\Users\Admin\AppData\Local\Temp\File2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1848
      • C:\Program Files (x86)\solfer\boleroh\lvloa.exe
        "C:\Program Files (x86)\solfer\boleroh\lvloa.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:1256
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\wrgeqcmnju.exe"
          4⤵
          • Loads dropped DLL
          PID:2616
          • C:\Users\Admin\AppData\Local\Temp\wrgeqcmnju.exe
            "C:\Users\Admin\AppData\Local\Temp\wrgeqcmnju.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2644
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\WRGEQC~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\WRGEQC~1.EXE
              6⤵
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:2696
              • C:\Windows\SysWOW64\RUNDLL32.EXE
                C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\WRGEQC~1.DLL,VAhMTBI=
                7⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                • Drops desktop.ini file(s)
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                PID:2740
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpA026.tmp.ps1"
                  8⤵
                  • Drops file in Program Files directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:616
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpCEE5.tmp.ps1"
                  8⤵
                  • Drops file in Program Files directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2312
                  • C:\Windows\SysWOW64\nslookup.exe
                    "C:\Windows\system32\nslookup.exe" -type=any localhost
                    9⤵
                      PID:2752
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                    8⤵
                      PID:1472
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                      8⤵
                        PID:1892
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\jovurlj.vbs"
                4⤵
                  PID:2836
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\jovurlj.vbs"
                    5⤵
                    • Blocklisted process makes network request
                    • Modifies system certificate store
                    PID:2892
              • C:\Program Files (x86)\solfer\6owe.exe
                "C:\Program Files (x86)\solfer\6owe.exe"
                3⤵
                • Executes dropped EXE
                • Checks BIOS information in registry
                • Identifies Wine through registry keys
                • Loads dropped DLL
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:1060
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\nlrkhvudqavgn & timeout 2 & del /f /q "C:\Program Files (x86)\solfer\6owe.exe"
                  4⤵
                    PID:2312
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout 2
                      5⤵
                      • Delays execution with timeout.exe
                      PID:2364
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\nlrkhvudqavgn & timeout 2 & del /f /q "C:\Program Files (x86)\solfer\6owe.exe"
                    4⤵
                      PID:2416
                      • C:\Windows\SysWOW64\timeout.exe
                        timeout 2
                        5⤵
                        • Delays execution with timeout.exe
                        PID:2484
                  • C:\Program Files (x86)\solfer\4aer.exe
                    "C:\Program Files (x86)\solfer\4aer.exe"
                    3⤵
                    • Executes dropped EXE
                    • Checks BIOS information in registry
                    • Drops startup file
                    • Identifies Wine through registry keys
                    • Loads dropped DLL
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:936
                    • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
                      "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
                      4⤵
                      • Executes dropped EXE
                      • Checks BIOS information in registry
                      • Identifies Wine through registry keys
                      • Loads dropped DLL
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: AddClipboardFormatListener
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1556
                  • C:\Program Files (x86)\solfer\startnat.exe
                    "C:\Program Files (x86)\solfer\startnat.exe"
                    3⤵
                    • Executes dropped EXE
                    • Checks BIOS information in registry
                    • Identifies Wine through registry keys
                    • Loads dropped DLL
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of WriteProcessMemory
                    PID:1392
                    • C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt
                      C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2296
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"
                      4⤵
                        PID:2500
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"
                          5⤵
                          • Creates scheduled task(s)
                          PID:2552
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\y1nsc6FROj & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\2626e0990d2db399b35b6e357fd53ed1.exe"
                    2⤵
                    • Deletes itself
                    • Suspicious use of WriteProcessMemory
                    PID:776
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout 2
                      3⤵
                      • Delays execution with timeout.exe
                      PID:1660
                • C:\Windows\system32\taskeng.exe
                  taskeng.exe {E4B98E2F-06BC-4764-8647-FED9A1DBFE62} S-1-5-21-293278959-2699126792-324916226-1000:TUICJFPF\Admin:Interactive:[1]
                  1⤵
                    PID:2376
                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
                      2⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:2036
                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                        7z e -p"DxSqsNKKOxqPrM4Y3xeK" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor.tmp" -o"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1440
                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe" -f TorConfig
                        3⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2396
                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
                      2⤵
                      • Executes dropped EXE
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:1996
                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
                      2⤵
                      • Executes dropped EXE
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:1156
                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
                      2⤵
                        PID:616

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • memory/616-146-0x0000000006280000-0x0000000006281000-memory.dmp

                      Filesize

                      4KB

                    • memory/616-160-0x0000000006700000-0x0000000006701000-memory.dmp

                      Filesize

                      4KB

                    • memory/616-159-0x0000000006470000-0x0000000006471000-memory.dmp

                      Filesize

                      4KB

                    • memory/616-148-0x0000000006350000-0x0000000006351000-memory.dmp

                      Filesize

                      4KB

                    • memory/616-141-0x0000000005840000-0x0000000005841000-memory.dmp

                      Filesize

                      4KB

                    • memory/616-132-0x0000000072BF0000-0x00000000732DE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/616-133-0x0000000000E30000-0x0000000000E31000-memory.dmp

                      Filesize

                      4KB

                    • memory/616-134-0x00000000049D0000-0x00000000049D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/616-135-0x0000000001220000-0x0000000001221000-memory.dmp

                      Filesize

                      4KB

                    • memory/616-136-0x0000000002870000-0x0000000002871000-memory.dmp

                      Filesize

                      4KB

                    • memory/936-47-0x0000000004D90000-0x0000000004DA1000-memory.dmp

                      Filesize

                      68KB

                    • memory/936-48-0x00000000051A0000-0x00000000051B1000-memory.dmp

                      Filesize

                      68KB

                    • memory/1060-49-0x0000000004D30000-0x0000000004D41000-memory.dmp

                      Filesize

                      68KB

                    • memory/1060-46-0x0000000004920000-0x0000000004931000-memory.dmp

                      Filesize

                      68KB

                    • memory/1256-37-0x0000000004D10000-0x0000000004D21000-memory.dmp

                      Filesize

                      68KB

                    • memory/1256-32-0x0000000004900000-0x0000000004911000-memory.dmp

                      Filesize

                      68KB

                    • memory/1392-68-0x000000000AF60000-0x000000000AF71000-memory.dmp

                      Filesize

                      68KB

                    • memory/1392-67-0x000000000AB50000-0x000000000AB61000-memory.dmp

                      Filesize

                      68KB

                    • memory/1440-161-0x0000000000080000-0x0000000000140000-memory.dmp

                      Filesize

                      768KB

                    • memory/1440-164-0x0000000000080000-0x0000000000140000-memory.dmp

                      Filesize

                      768KB

                    • memory/1556-70-0x0000000005030000-0x0000000005041000-memory.dmp

                      Filesize

                      68KB

                    • memory/1556-69-0x0000000004C20000-0x0000000004C31000-memory.dmp

                      Filesize

                      68KB

                    • memory/1768-5-0x000007FEF7FE0000-0x000007FEF825A000-memory.dmp

                      Filesize

                      2.5MB

                    • memory/1824-4-0x00000000024D0000-0x00000000024D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1824-2-0x0000000000A0D000-0x0000000000A0E000-memory.dmp

                      Filesize

                      4KB

                    • memory/1824-3-0x00000000023F0000-0x0000000002401000-memory.dmp

                      Filesize

                      68KB

                    • memory/2312-177-0x0000000002730000-0x0000000002731000-memory.dmp

                      Filesize

                      4KB

                    • memory/2312-226-0x00000000062B0000-0x00000000062B1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2312-173-0x0000000004940000-0x0000000004941000-memory.dmp

                      Filesize

                      4KB

                    • memory/2312-172-0x00000000024D0000-0x00000000024D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2312-171-0x0000000072AD0000-0x00000000731BE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2312-194-0x0000000005420000-0x0000000005421000-memory.dmp

                      Filesize

                      4KB

                    • memory/2396-196-0x0000000002FB0000-0x0000000002FC1000-memory.dmp

                      Filesize

                      68KB

                    • memory/2396-402-0x0000000003430000-0x0000000003441000-memory.dmp

                      Filesize

                      68KB

                    • memory/2396-227-0x0000000002BA0000-0x0000000002BB1000-memory.dmp

                      Filesize

                      68KB

                    • memory/2396-229-0x0000000002BA0000-0x0000000002BB1000-memory.dmp

                      Filesize

                      68KB

                    • memory/2396-193-0x0000000064B40000-0x0000000064BBE000-memory.dmp

                      Filesize

                      504KB

                    • memory/2396-228-0x0000000002FB0000-0x0000000002FC1000-memory.dmp

                      Filesize

                      68KB

                    • memory/2396-195-0x0000000002BA0000-0x0000000002BB1000-memory.dmp

                      Filesize

                      68KB

                    • memory/2396-400-0x0000000003430000-0x0000000003441000-memory.dmp

                      Filesize

                      68KB

                    • memory/2396-197-0x0000000002BA0000-0x0000000002BB1000-memory.dmp

                      Filesize

                      68KB

                    • memory/2396-401-0x0000000003840000-0x0000000003851000-memory.dmp

                      Filesize

                      68KB

                    • memory/2644-99-0x0000000002660000-0x0000000002671000-memory.dmp

                      Filesize

                      68KB

                    • memory/2644-98-0x0000000002290000-0x000000000265A000-memory.dmp

                      Filesize

                      3.8MB

                    • memory/2696-106-0x00000000742B0000-0x0000000074453000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2696-107-0x0000000002810000-0x0000000002E70000-memory.dmp

                      Filesize

                      6.4MB

                    • memory/2740-113-0x0000000073DA0000-0x0000000073F43000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2740-114-0x0000000002550000-0x0000000002BB0000-memory.dmp

                      Filesize

                      6.4MB

                    • memory/2740-125-0x0000000003570000-0x0000000003571000-memory.dmp

                      Filesize

                      4KB

                    • memory/2740-126-0x0000000003570000-0x0000000003571000-memory.dmp

                      Filesize

                      4KB

                    • memory/2740-127-0x0000000003570000-0x0000000003571000-memory.dmp

                      Filesize

                      4KB

                    • memory/2740-128-0x0000000003570000-0x0000000003571000-memory.dmp

                      Filesize

                      4KB

                    • memory/2740-129-0x0000000003570000-0x0000000003571000-memory.dmp

                      Filesize

                      4KB

                    • memory/2740-130-0x0000000003570000-0x0000000003571000-memory.dmp

                      Filesize

                      4KB

                    • memory/2892-120-0x0000000002690000-0x0000000002694000-memory.dmp

                      Filesize

                      16KB