Analysis
-
max time kernel
122s -
max time network
62s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
01/01/2021, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
35f86945ca3277c1531ebd23a10d7c16.exe
Resource
win7v20201028
General
-
Target
35f86945ca3277c1531ebd23a10d7c16.exe
-
Size
631KB
-
MD5
35f86945ca3277c1531ebd23a10d7c16
-
SHA1
3e732eeb0e437732b8886be81ed817b2e8091778
-
SHA256
4d00c84ecb0f03b44c878e617a5343ca2c8d06bfb588b1501d6f2f0c0c8e79fe
-
SHA512
c319393cbd8eed3efc6eaf6ed802a0e3cda4a68870bfe3f8fe698fed64ebda6f204cac2498f4415fdd6386c04444e3f1d716689284159de34a8f44cce10cb562
Malware Config
Extracted
danabot
1732
3
23.226.132.92:443
23.106.123.249:443
108.62.141.152:443
104.144.64.163:443
-
embedded_hash
49574F66CD0103BBD725C08A9805C2BE
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 6 IoCs
flow pid Process 24 2656 RUNDLL32.EXE 27 2760 WScript.exe 29 2760 WScript.exe 31 2760 WScript.exe 33 2760 WScript.exe 35 2760 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 556 File332.exe 744 4_ico.exe 836 6_ico.exe 388 vpn_ico.exe 2172 SmartClock.exe 2372 irvixdewox.exe -
resource yara_rule behavioral1/files/0x0006000000013158-58.dat upx behavioral1/files/0x0006000000013158-61.dat upx behavioral1/files/0x0006000000013158-59.dat upx behavioral1/files/0x0006000000013158-62.dat upx behavioral1/files/0x0006000000013158-64.dat upx behavioral1/files/0x0006000000013158-63.dat upx -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vpn_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vpn_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4_ico.exe -
Deletes itself 1 IoCs
pid Process 812 cmd.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4_ico.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Wine 6_ico.exe Key opened \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Wine vpn_ico.exe Key opened \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Wine SmartClock.exe Key opened \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Wine 4_ico.exe -
Loads dropped DLL 34 IoCs
pid Process 1640 35f86945ca3277c1531ebd23a10d7c16.exe 556 File332.exe 556 File332.exe 556 File332.exe 556 File332.exe 556 File332.exe 556 File332.exe 744 4_ico.exe 744 4_ico.exe 744 4_ico.exe 556 File332.exe 836 6_ico.exe 836 6_ico.exe 556 File332.exe 388 vpn_ico.exe 388 vpn_ico.exe 744 4_ico.exe 744 4_ico.exe 744 4_ico.exe 2172 SmartClock.exe 2172 SmartClock.exe 2172 SmartClock.exe 388 vpn_ico.exe 388 vpn_ico.exe 2372 irvixdewox.exe 2372 irvixdewox.exe 2612 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe 2656 RUNDLL32.EXE 2656 RUNDLL32.EXE 2656 RUNDLL32.EXE 2656 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M1AZJ0WQ\desktop.ini RUNDLL32.EXE File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini RUNDLL32.EXE File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D08RECS3\desktop.ini RUNDLL32.EXE -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 744 4_ico.exe 836 6_ico.exe 388 vpn_ico.exe 2172 SmartClock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vpn_ico.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 35f86945ca3277c1531ebd23a10d7c16.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 35f86945ca3277c1531ebd23a10d7c16.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vpn_ico.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 2580 timeout.exe 1824 timeout.exe 2504 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 vpn_ico.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 vpn_ico.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2172 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 744 4_ico.exe 836 6_ico.exe 388 vpn_ico.exe 2172 SmartClock.exe 2952 powershell.exe 2952 powershell.exe 2656 RUNDLL32.EXE 2656 RUNDLL32.EXE 1916 powershell.exe 1916 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2612 rundll32.exe Token: SeDebugPrivilege 2656 RUNDLL32.EXE Token: SeDebugPrivilege 2952 powershell.exe Token: SeDebugPrivilege 1916 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1640 35f86945ca3277c1531ebd23a10d7c16.exe 1640 35f86945ca3277c1531ebd23a10d7c16.exe 2656 RUNDLL32.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 556 1640 35f86945ca3277c1531ebd23a10d7c16.exe 31 PID 1640 wrote to memory of 556 1640 35f86945ca3277c1531ebd23a10d7c16.exe 31 PID 1640 wrote to memory of 556 1640 35f86945ca3277c1531ebd23a10d7c16.exe 31 PID 1640 wrote to memory of 556 1640 35f86945ca3277c1531ebd23a10d7c16.exe 31 PID 1640 wrote to memory of 556 1640 35f86945ca3277c1531ebd23a10d7c16.exe 31 PID 1640 wrote to memory of 556 1640 35f86945ca3277c1531ebd23a10d7c16.exe 31 PID 1640 wrote to memory of 556 1640 35f86945ca3277c1531ebd23a10d7c16.exe 31 PID 1640 wrote to memory of 812 1640 35f86945ca3277c1531ebd23a10d7c16.exe 32 PID 1640 wrote to memory of 812 1640 35f86945ca3277c1531ebd23a10d7c16.exe 32 PID 1640 wrote to memory of 812 1640 35f86945ca3277c1531ebd23a10d7c16.exe 32 PID 1640 wrote to memory of 812 1640 35f86945ca3277c1531ebd23a10d7c16.exe 32 PID 556 wrote to memory of 744 556 File332.exe 35 PID 556 wrote to memory of 744 556 File332.exe 35 PID 556 wrote to memory of 744 556 File332.exe 35 PID 556 wrote to memory of 744 556 File332.exe 35 PID 556 wrote to memory of 744 556 File332.exe 35 PID 556 wrote to memory of 744 556 File332.exe 35 PID 556 wrote to memory of 744 556 File332.exe 35 PID 812 wrote to memory of 1824 812 cmd.exe 34 PID 812 wrote to memory of 1824 812 cmd.exe 34 PID 812 wrote to memory of 1824 812 cmd.exe 34 PID 812 wrote to memory of 1824 812 cmd.exe 34 PID 556 wrote to memory of 836 556 File332.exe 36 PID 556 wrote to memory of 836 556 File332.exe 36 PID 556 wrote to memory of 836 556 File332.exe 36 PID 556 wrote to memory of 836 556 File332.exe 36 PID 556 wrote to memory of 836 556 File332.exe 36 PID 556 wrote to memory of 836 556 File332.exe 36 PID 556 wrote to memory of 836 556 File332.exe 36 PID 556 wrote to memory of 388 556 File332.exe 37 PID 556 wrote to memory of 388 556 File332.exe 37 PID 556 wrote to memory of 388 556 File332.exe 37 PID 556 wrote to memory of 388 556 File332.exe 37 PID 556 wrote to memory of 388 556 File332.exe 37 PID 556 wrote to memory of 388 556 File332.exe 37 PID 556 wrote to memory of 388 556 File332.exe 37 PID 744 wrote to memory of 2172 744 4_ico.exe 38 PID 744 wrote to memory of 2172 744 4_ico.exe 38 PID 744 wrote to memory of 2172 744 4_ico.exe 38 PID 744 wrote to memory of 2172 744 4_ico.exe 38 PID 744 wrote to memory of 2172 744 4_ico.exe 38 PID 744 wrote to memory of 2172 744 4_ico.exe 38 PID 744 wrote to memory of 2172 744 4_ico.exe 38 PID 388 wrote to memory of 2372 388 vpn_ico.exe 39 PID 388 wrote to memory of 2372 388 vpn_ico.exe 39 PID 388 wrote to memory of 2372 388 vpn_ico.exe 39 PID 388 wrote to memory of 2372 388 vpn_ico.exe 39 PID 388 wrote to memory of 2372 388 vpn_ico.exe 39 PID 388 wrote to memory of 2372 388 vpn_ico.exe 39 PID 388 wrote to memory of 2372 388 vpn_ico.exe 39 PID 836 wrote to memory of 2448 836 6_ico.exe 41 PID 836 wrote to memory of 2448 836 6_ico.exe 41 PID 836 wrote to memory of 2448 836 6_ico.exe 41 PID 836 wrote to memory of 2448 836 6_ico.exe 41 PID 836 wrote to memory of 2448 836 6_ico.exe 41 PID 836 wrote to memory of 2448 836 6_ico.exe 41 PID 836 wrote to memory of 2448 836 6_ico.exe 41 PID 388 wrote to memory of 2440 388 vpn_ico.exe 43 PID 388 wrote to memory of 2440 388 vpn_ico.exe 43 PID 388 wrote to memory of 2440 388 vpn_ico.exe 43 PID 388 wrote to memory of 2440 388 vpn_ico.exe 43 PID 388 wrote to memory of 2440 388 vpn_ico.exe 43 PID 388 wrote to memory of 2440 388 vpn_ico.exe 43 PID 388 wrote to memory of 2440 388 vpn_ico.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\35f86945ca3277c1531ebd23a10d7c16.exe"C:\Users\Admin\AppData\Local\Temp\35f86945ca3277c1531ebd23a10d7c16.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\File332.exe"C:\Users\Admin\AppData\Local\Temp\File332.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\New Feature\4_ico.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4_ico.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\oobkrhrmq & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"4⤵PID:2448
-
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:2504
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\oobkrhrmq & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"4⤵PID:2524
-
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:2580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn_ico.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn_ico.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\irvixdewox.exe"C:\Users\Admin\AppData\Local\Temp\irvixdewox.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2372 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\IRVIXD~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\IRVIXD~1.EXE5⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2612 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\IRVIXD~1.DLL,STwNLDYDAw==6⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpEF10.tmp.ps1"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp772.tmp.ps1"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost8⤵PID:1572
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask7⤵PID:528
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask7⤵PID:1316
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vhxxucjap.vbs"4⤵PID:2440
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fltuxgw.vbs"4⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:2760
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\z5WHcn4 & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\35f86945ca3277c1531ebd23a10d7c16.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:1824
-
-