Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
01-01-2021 19:03
Static task
static1
Behavioral task
behavioral1
Sample
35f86945ca3277c1531ebd23a10d7c16.exe
Resource
win7v20201028
General
-
Target
35f86945ca3277c1531ebd23a10d7c16.exe
-
Size
631KB
-
MD5
35f86945ca3277c1531ebd23a10d7c16
-
SHA1
3e732eeb0e437732b8886be81ed817b2e8091778
-
SHA256
4d00c84ecb0f03b44c878e617a5343ca2c8d06bfb588b1501d6f2f0c0c8e79fe
-
SHA512
c319393cbd8eed3efc6eaf6ed802a0e3cda4a68870bfe3f8fe698fed64ebda6f204cac2498f4415fdd6386c04444e3f1d716689284159de34a8f44cce10cb562
Malware Config
Extracted
danabot
1732
3
23.226.132.92:443
23.106.123.249:443
108.62.141.152:443
104.144.64.163:443
-
embedded_hash
49574F66CD0103BBD725C08A9805C2BE
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 5 IoCs
flow pid Process 32 4176 RUNDLL32.EXE 35 4352 WScript.exe 37 4352 WScript.exe 39 4352 WScript.exe 41 4352 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 2704 File332.exe 936 4_ico.exe 3940 6_ico.exe 2052 vpn_ico.exe 3876 SmartClock.exe 3884 isenubblreql.exe -
resource yara_rule behavioral2/files/0x000200000001ab90-39.dat upx behavioral2/files/0x000200000001ab90-38.dat upx -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vpn_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vpn_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4_ico.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4_ico.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine 6_ico.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine vpn_ico.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine SmartClock.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine 4_ico.exe -
Loads dropped DLL 3 IoCs
pid Process 2704 File332.exe 4140 rundll32.exe 4176 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2052 vpn_ico.exe 3940 6_ico.exe 936 4_ico.exe 3876 SmartClock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 35f86945ca3277c1531ebd23a10d7c16.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 35f86945ca3277c1531ebd23a10d7c16.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vpn_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vpn_ico.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE -
Delays execution with timeout.exe 3 IoCs
pid Process 1056 timeout.exe 996 timeout.exe 4120 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings vpn_ico.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e WScript.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3876 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 936 4_ico.exe 936 4_ico.exe 2052 vpn_ico.exe 2052 vpn_ico.exe 3940 6_ico.exe 3940 6_ico.exe 3876 SmartClock.exe 3876 SmartClock.exe 4456 powershell.exe 4456 powershell.exe 4456 powershell.exe 4176 RUNDLL32.EXE 4176 RUNDLL32.EXE 4752 powershell.exe 4752 powershell.exe 4752 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4140 rundll32.exe Token: SeDebugPrivilege 4176 RUNDLL32.EXE Token: SeDebugPrivilege 4456 powershell.exe Token: SeDebugPrivilege 4752 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1124 35f86945ca3277c1531ebd23a10d7c16.exe 1124 35f86945ca3277c1531ebd23a10d7c16.exe 4176 RUNDLL32.EXE -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1124 wrote to memory of 2704 1124 35f86945ca3277c1531ebd23a10d7c16.exe 78 PID 1124 wrote to memory of 2704 1124 35f86945ca3277c1531ebd23a10d7c16.exe 78 PID 1124 wrote to memory of 2704 1124 35f86945ca3277c1531ebd23a10d7c16.exe 78 PID 1124 wrote to memory of 2040 1124 35f86945ca3277c1531ebd23a10d7c16.exe 79 PID 1124 wrote to memory of 2040 1124 35f86945ca3277c1531ebd23a10d7c16.exe 79 PID 1124 wrote to memory of 2040 1124 35f86945ca3277c1531ebd23a10d7c16.exe 79 PID 2040 wrote to memory of 1056 2040 cmd.exe 81 PID 2040 wrote to memory of 1056 2040 cmd.exe 81 PID 2040 wrote to memory of 1056 2040 cmd.exe 81 PID 2704 wrote to memory of 936 2704 File332.exe 82 PID 2704 wrote to memory of 936 2704 File332.exe 82 PID 2704 wrote to memory of 936 2704 File332.exe 82 PID 2704 wrote to memory of 3940 2704 File332.exe 83 PID 2704 wrote to memory of 3940 2704 File332.exe 83 PID 2704 wrote to memory of 3940 2704 File332.exe 83 PID 2704 wrote to memory of 2052 2704 File332.exe 84 PID 2704 wrote to memory of 2052 2704 File332.exe 84 PID 2704 wrote to memory of 2052 2704 File332.exe 84 PID 936 wrote to memory of 3876 936 4_ico.exe 85 PID 936 wrote to memory of 3876 936 4_ico.exe 85 PID 936 wrote to memory of 3876 936 4_ico.exe 85 PID 2052 wrote to memory of 3884 2052 vpn_ico.exe 86 PID 2052 wrote to memory of 3884 2052 vpn_ico.exe 86 PID 2052 wrote to memory of 3884 2052 vpn_ico.exe 86 PID 2052 wrote to memory of 1096 2052 vpn_ico.exe 87 PID 2052 wrote to memory of 1096 2052 vpn_ico.exe 87 PID 2052 wrote to memory of 1096 2052 vpn_ico.exe 87 PID 3940 wrote to memory of 4076 3940 6_ico.exe 88 PID 3940 wrote to memory of 4076 3940 6_ico.exe 88 PID 3940 wrote to memory of 4076 3940 6_ico.exe 88 PID 4076 wrote to memory of 996 4076 cmd.exe 90 PID 4076 wrote to memory of 996 4076 cmd.exe 90 PID 4076 wrote to memory of 996 4076 cmd.exe 90 PID 3940 wrote to memory of 1064 3940 6_ico.exe 91 PID 3940 wrote to memory of 1064 3940 6_ico.exe 91 PID 3940 wrote to memory of 1064 3940 6_ico.exe 91 PID 1064 wrote to memory of 4120 1064 cmd.exe 93 PID 1064 wrote to memory of 4120 1064 cmd.exe 93 PID 1064 wrote to memory of 4120 1064 cmd.exe 93 PID 3884 wrote to memory of 4140 3884 isenubblreql.exe 94 PID 3884 wrote to memory of 4140 3884 isenubblreql.exe 94 PID 3884 wrote to memory of 4140 3884 isenubblreql.exe 94 PID 4140 wrote to memory of 4176 4140 rundll32.exe 95 PID 4140 wrote to memory of 4176 4140 rundll32.exe 95 PID 4140 wrote to memory of 4176 4140 rundll32.exe 95 PID 2052 wrote to memory of 4352 2052 vpn_ico.exe 97 PID 2052 wrote to memory of 4352 2052 vpn_ico.exe 97 PID 2052 wrote to memory of 4352 2052 vpn_ico.exe 97 PID 4176 wrote to memory of 4456 4176 RUNDLL32.EXE 98 PID 4176 wrote to memory of 4456 4176 RUNDLL32.EXE 98 PID 4176 wrote to memory of 4456 4176 RUNDLL32.EXE 98 PID 4176 wrote to memory of 4752 4176 RUNDLL32.EXE 101 PID 4176 wrote to memory of 4752 4176 RUNDLL32.EXE 101 PID 4176 wrote to memory of 4752 4176 RUNDLL32.EXE 101 PID 4752 wrote to memory of 4924 4752 powershell.exe 103 PID 4752 wrote to memory of 4924 4752 powershell.exe 103 PID 4752 wrote to memory of 4924 4752 powershell.exe 103 PID 4176 wrote to memory of 4960 4176 RUNDLL32.EXE 104 PID 4176 wrote to memory of 4960 4176 RUNDLL32.EXE 104 PID 4176 wrote to memory of 4960 4176 RUNDLL32.EXE 104 PID 4176 wrote to memory of 5008 4176 RUNDLL32.EXE 106 PID 4176 wrote to memory of 5008 4176 RUNDLL32.EXE 106 PID 4176 wrote to memory of 5008 4176 RUNDLL32.EXE 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\35f86945ca3277c1531ebd23a10d7c16.exe"C:\Users\Admin\AppData\Local\Temp\35f86945ca3277c1531ebd23a10d7c16.exe"1⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\File332.exe"C:\Users\Admin\AppData\Local\Temp\File332.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\New Feature\4_ico.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4_ico.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\aqsploqydye & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:996
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\aqsploqydye & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:4120
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn_ico.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn_ico.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\isenubblreql.exe"C:\Users\Admin\AppData\Local\Temp\isenubblreql.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\ISENUB~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\ISENUB~1.EXE5⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\ISENUB~1.DLL,dVceLDZnBaz96⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpE6FA.tmp.ps1"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpFB40.tmp.ps1"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost8⤵PID:4924
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask7⤵PID:4960
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask7⤵PID:5008
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\yppumwlckp.vbs"4⤵PID:1096
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ktqwrrog.vbs"4⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:4352
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\mMesjwWnlc & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\35f86945ca3277c1531ebd23a10d7c16.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:1056
-
-