Analysis
-
max time kernel
142s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-12-2020 17:21
Static task
static1
Behavioral task
behavioral1
Sample
2626e0990d2db399b35b6e357fd53ed1.exe
Resource
win7v20201028
General
-
Target
2626e0990d2db399b35b6e357fd53ed1.exe
-
Size
548KB
-
MD5
2626e0990d2db399b35b6e357fd53ed1
-
SHA1
28cc3944167b0da48c4e81333e08b5c80244c572
-
SHA256
ada1c5359c35e6b70c5a2d5533f9d725f86a1e155c8486bfd2941c9b40478ea2
-
SHA512
7b741f662f70e78f9a7094b0892e93fba461f992ac938f922379179e365b4ecdeaf8fc7996f6da9aa44e52d5f815ffacbe17d425545da605d89845183938f2f1
Malware Config
Extracted
danabot
1732
3
23.254.215.116:443
104.227.34.227:443
23.254.118.230:443
51.195.73.129:443
-
embedded_hash
4A3DA3F8025592B0C9FF1DB7E462C9FA
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 5 IoCs
flow pid Process 34 4540 RUNDLL32.EXE 36 4992 WScript.exe 38 4992 WScript.exe 40 4992 WScript.exe 42 4992 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 3116 File2.exe 812 lvloa.exe 2096 6owe.exe 2112 4aer.exe 1144 startnat.exe 2792 SmartClock.exe 2644 CL_Debug_Log.txt 4448 vxkjpwemafpu.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lvloa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4aer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion startnat.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lvloa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6owe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6owe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4aer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion startnat.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4aer.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine 4aer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine startnat.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine SmartClock.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine lvloa.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine 6owe.exe -
Loads dropped DLL 5 IoCs
pid Process 3116 File2.exe 4488 rundll32.exe 4488 rundll32.exe 4540 RUNDLL32.EXE 4540 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 812 lvloa.exe 2096 6owe.exe 2112 4aer.exe 1144 startnat.exe 2792 SmartClock.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\solfer\Microsoft.IdentityServer.Web.Resources.dll File2.exe File created C:\Program Files (x86)\solfer\4aer.exe File2.exe File created C:\Program Files (x86)\solfer\6owe.exe File2.exe File created C:\Program Files (x86)\solfer\startnat.exe File2.exe File created C:\Program Files (x86)\solfer\boleroh\msdasc.chm File2.exe File created C:\Program Files (x86)\solfer\boleroh\msorcl32.chm File2.exe File created C:\Program Files (x86)\solfer\boleroh\lvloa.exe File2.exe File created C:\Program Files (x86)\solfer\wiatrace.log File2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2626e0990d2db399b35b6e357fd53ed1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 lvloa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString lvloa.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2626e0990d2db399b35b6e357fd53ed1.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4208 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 1188 timeout.exe 3740 timeout.exe 4188 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings cmd.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2792 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 812 lvloa.exe 812 lvloa.exe 2096 6owe.exe 2096 6owe.exe 2112 4aer.exe 2112 4aer.exe 1144 startnat.exe 1144 startnat.exe 2792 SmartClock.exe 2792 SmartClock.exe 4712 powershell.exe 4712 powershell.exe 4712 powershell.exe 4540 RUNDLL32.EXE 4540 RUNDLL32.EXE 4140 powershell.exe 4140 powershell.exe 4140 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 2644 CL_Debug_Log.txt Token: 35 2644 CL_Debug_Log.txt Token: SeSecurityPrivilege 2644 CL_Debug_Log.txt Token: SeSecurityPrivilege 2644 CL_Debug_Log.txt Token: SeDebugPrivilege 4488 rundll32.exe Token: SeDebugPrivilege 4540 RUNDLL32.EXE Token: SeDebugPrivilege 4712 powershell.exe Token: SeDebugPrivilege 4140 powershell.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1028 2626e0990d2db399b35b6e357fd53ed1.exe 1028 2626e0990d2db399b35b6e357fd53ed1.exe 1144 startnat.exe 1144 startnat.exe 1144 startnat.exe 4540 RUNDLL32.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1144 startnat.exe 1144 startnat.exe 1144 startnat.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1028 wrote to memory of 3116 1028 2626e0990d2db399b35b6e357fd53ed1.exe 79 PID 1028 wrote to memory of 3116 1028 2626e0990d2db399b35b6e357fd53ed1.exe 79 PID 1028 wrote to memory of 3116 1028 2626e0990d2db399b35b6e357fd53ed1.exe 79 PID 1028 wrote to memory of 3888 1028 2626e0990d2db399b35b6e357fd53ed1.exe 80 PID 1028 wrote to memory of 3888 1028 2626e0990d2db399b35b6e357fd53ed1.exe 80 PID 1028 wrote to memory of 3888 1028 2626e0990d2db399b35b6e357fd53ed1.exe 80 PID 3888 wrote to memory of 1188 3888 cmd.exe 82 PID 3888 wrote to memory of 1188 3888 cmd.exe 82 PID 3888 wrote to memory of 1188 3888 cmd.exe 82 PID 3116 wrote to memory of 812 3116 File2.exe 83 PID 3116 wrote to memory of 812 3116 File2.exe 83 PID 3116 wrote to memory of 812 3116 File2.exe 83 PID 3116 wrote to memory of 2096 3116 File2.exe 84 PID 3116 wrote to memory of 2096 3116 File2.exe 84 PID 3116 wrote to memory of 2096 3116 File2.exe 84 PID 3116 wrote to memory of 2112 3116 File2.exe 85 PID 3116 wrote to memory of 2112 3116 File2.exe 85 PID 3116 wrote to memory of 2112 3116 File2.exe 85 PID 3116 wrote to memory of 1144 3116 File2.exe 86 PID 3116 wrote to memory of 1144 3116 File2.exe 86 PID 3116 wrote to memory of 1144 3116 File2.exe 86 PID 2112 wrote to memory of 2792 2112 4aer.exe 87 PID 2112 wrote to memory of 2792 2112 4aer.exe 87 PID 2112 wrote to memory of 2792 2112 4aer.exe 87 PID 1144 wrote to memory of 2644 1144 startnat.exe 88 PID 1144 wrote to memory of 2644 1144 startnat.exe 88 PID 1144 wrote to memory of 2644 1144 startnat.exe 88 PID 2096 wrote to memory of 3880 2096 6owe.exe 90 PID 2096 wrote to memory of 3880 2096 6owe.exe 90 PID 2096 wrote to memory of 3880 2096 6owe.exe 90 PID 3880 wrote to memory of 3740 3880 cmd.exe 92 PID 3880 wrote to memory of 3740 3880 cmd.exe 92 PID 3880 wrote to memory of 3740 3880 cmd.exe 92 PID 1144 wrote to memory of 4100 1144 startnat.exe 96 PID 1144 wrote to memory of 4100 1144 startnat.exe 96 PID 1144 wrote to memory of 4100 1144 startnat.exe 96 PID 2096 wrote to memory of 4112 2096 6owe.exe 95 PID 2096 wrote to memory of 4112 2096 6owe.exe 95 PID 2096 wrote to memory of 4112 2096 6owe.exe 95 PID 4112 wrote to memory of 4188 4112 cmd.exe 97 PID 4112 wrote to memory of 4188 4112 cmd.exe 97 PID 4112 wrote to memory of 4188 4112 cmd.exe 97 PID 4100 wrote to memory of 4208 4100 cmd.exe 98 PID 4100 wrote to memory of 4208 4100 cmd.exe 98 PID 4100 wrote to memory of 4208 4100 cmd.exe 98 PID 812 wrote to memory of 4404 812 lvloa.exe 100 PID 812 wrote to memory of 4404 812 lvloa.exe 100 PID 812 wrote to memory of 4404 812 lvloa.exe 100 PID 4404 wrote to memory of 4448 4404 cmd.exe 102 PID 4404 wrote to memory of 4448 4404 cmd.exe 102 PID 4404 wrote to memory of 4448 4404 cmd.exe 102 PID 4448 wrote to memory of 4488 4448 vxkjpwemafpu.exe 103 PID 4448 wrote to memory of 4488 4448 vxkjpwemafpu.exe 103 PID 4448 wrote to memory of 4488 4448 vxkjpwemafpu.exe 103 PID 4488 wrote to memory of 4540 4488 rundll32.exe 104 PID 4488 wrote to memory of 4540 4488 rundll32.exe 104 PID 4488 wrote to memory of 4540 4488 rundll32.exe 104 PID 4540 wrote to memory of 4712 4540 RUNDLL32.EXE 105 PID 4540 wrote to memory of 4712 4540 RUNDLL32.EXE 105 PID 4540 wrote to memory of 4712 4540 RUNDLL32.EXE 105 PID 812 wrote to memory of 4920 812 lvloa.exe 107 PID 812 wrote to memory of 4920 812 lvloa.exe 107 PID 812 wrote to memory of 4920 812 lvloa.exe 107 PID 4920 wrote to memory of 4992 4920 cmd.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2626e0990d2db399b35b6e357fd53ed1.exe"C:\Users\Admin\AppData\Local\Temp\2626e0990d2db399b35b6e357fd53ed1.exe"1⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\File2.exe"C:\Users\Admin\AppData\Local\Temp\File2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Program Files (x86)\solfer\boleroh\lvloa.exe"C:\Program Files (x86)\solfer\boleroh\lvloa.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\vxkjpwemafpu.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\vxkjpwemafpu.exe"C:\Users\Admin\AppData\Local\Temp\vxkjpwemafpu.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\VXKJPW~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\VXKJPW~1.EXE6⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\VXKJPW~1.DLL,pVRRLDYDBQ==7⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp1C82.tmp.ps1"8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp2F8F.tmp.ps1"8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4140 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost9⤵PID:4104
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask8⤵PID:1580
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask8⤵PID:2544
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\swuvjmhjiy.vbs"4⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\swuvjmhjiy.vbs"5⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:4992
-
-
-
-
C:\Program Files (x86)\solfer\6owe.exe"C:\Program Files (x86)\solfer\6owe.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\xjunxludo & timeout 2 & del /f /q "C:\Program Files (x86)\solfer\6owe.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:3740
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\xjunxludo & timeout 2 & del /f /q "C:\Program Files (x86)\solfer\6owe.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:4188
-
-
-
-
C:\Program Files (x86)\solfer\4aer.exe"C:\Program Files (x86)\solfer\4aer.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
-
C:\Program Files (x86)\solfer\startnat.exe"C:\Program Files (x86)\solfer\startnat.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"4⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"5⤵
- Creates scheduled task(s)
PID:4208
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\rKATlsug0 & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\2626e0990d2db399b35b6e357fd53ed1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:1188
-
-