Analysis
-
max time kernel
144s -
max time network
139s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
01-01-2021 19:59
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.ArtemisF23FB6308BD9.1056.exe
Resource
win7v20201028
General
-
Target
SecuriteInfo.com.ArtemisF23FB6308BD9.1056.exe
-
Size
631KB
-
MD5
f23fb6308bd9029af0abdc4c91833e77
-
SHA1
33acae819415cf7bddaf885cea8a307dc2d016fa
-
SHA256
9c8d27a664a59f47820584b9e49196cdbf34b285b567cb8b63ce0794f271e863
-
SHA512
d78874d6ff6e5656f23a6d848291bdc231a5b9ee76eda000743ab57b832eec035e6a1a65b23179281f73a00524f7c439de3d892ddcd5075b2462e836db7f974d
Malware Config
Extracted
danabot
1732
3
23.226.132.92:443
23.106.123.249:443
108.62.141.152:443
104.144.64.163:443
-
embedded_hash
49574F66CD0103BBD725C08A9805C2BE
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 5 IoCs
flow pid Process 34 4356 RUNDLL32.EXE 36 4524 WScript.exe 38 4524 WScript.exe 40 4524 WScript.exe 42 4524 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 2232 File332.exe 3828 4_ico.exe 644 6_ico.exe 1324 vpn_ico.exe 1864 SmartClock.exe 2148 sllghwdaimcf.exe -
resource yara_rule behavioral2/files/0x000200000001ab4c-37.dat upx behavioral2/files/0x000200000001ab4c-36.dat upx -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vpn_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vpn_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SmartClock.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4_ico.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine 4_ico.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine vpn_ico.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine SmartClock.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine 6_ico.exe -
Loads dropped DLL 5 IoCs
pid Process 2232 File332.exe 4312 rundll32.exe 4312 rundll32.exe 4356 RUNDLL32.EXE 4356 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 644 6_ico.exe 3828 4_ico.exe 1324 vpn_ico.exe 1864 SmartClock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SecuriteInfo.com.ArtemisF23FB6308BD9.1056.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SecuriteInfo.com.ArtemisF23FB6308BD9.1056.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vpn_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vpn_ico.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 2064 timeout.exe 4228 timeout.exe 4292 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings vpn_ico.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1864 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 644 6_ico.exe 644 6_ico.exe 3828 4_ico.exe 3828 4_ico.exe 1324 vpn_ico.exe 1324 vpn_ico.exe 1864 SmartClock.exe 1864 SmartClock.exe 4636 powershell.exe 4636 powershell.exe 4636 powershell.exe 4356 RUNDLL32.EXE 4356 RUNDLL32.EXE 4932 powershell.exe 4932 powershell.exe 4932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4312 rundll32.exe Token: SeDebugPrivilege 4356 RUNDLL32.EXE Token: SeDebugPrivilege 4636 powershell.exe Token: SeDebugPrivilege 4932 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3992 SecuriteInfo.com.ArtemisF23FB6308BD9.1056.exe 3992 SecuriteInfo.com.ArtemisF23FB6308BD9.1056.exe 4356 RUNDLL32.EXE -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3992 wrote to memory of 2232 3992 SecuriteInfo.com.ArtemisF23FB6308BD9.1056.exe 79 PID 3992 wrote to memory of 2232 3992 SecuriteInfo.com.ArtemisF23FB6308BD9.1056.exe 79 PID 3992 wrote to memory of 2232 3992 SecuriteInfo.com.ArtemisF23FB6308BD9.1056.exe 79 PID 3992 wrote to memory of 1096 3992 SecuriteInfo.com.ArtemisF23FB6308BD9.1056.exe 80 PID 3992 wrote to memory of 1096 3992 SecuriteInfo.com.ArtemisF23FB6308BD9.1056.exe 80 PID 3992 wrote to memory of 1096 3992 SecuriteInfo.com.ArtemisF23FB6308BD9.1056.exe 80 PID 1096 wrote to memory of 2064 1096 cmd.exe 82 PID 1096 wrote to memory of 2064 1096 cmd.exe 82 PID 1096 wrote to memory of 2064 1096 cmd.exe 82 PID 2232 wrote to memory of 3828 2232 File332.exe 83 PID 2232 wrote to memory of 3828 2232 File332.exe 83 PID 2232 wrote to memory of 3828 2232 File332.exe 83 PID 2232 wrote to memory of 644 2232 File332.exe 84 PID 2232 wrote to memory of 644 2232 File332.exe 84 PID 2232 wrote to memory of 644 2232 File332.exe 84 PID 2232 wrote to memory of 1324 2232 File332.exe 85 PID 2232 wrote to memory of 1324 2232 File332.exe 85 PID 2232 wrote to memory of 1324 2232 File332.exe 85 PID 3828 wrote to memory of 1864 3828 4_ico.exe 86 PID 3828 wrote to memory of 1864 3828 4_ico.exe 86 PID 3828 wrote to memory of 1864 3828 4_ico.exe 86 PID 1324 wrote to memory of 2148 1324 vpn_ico.exe 87 PID 1324 wrote to memory of 2148 1324 vpn_ico.exe 87 PID 1324 wrote to memory of 2148 1324 vpn_ico.exe 87 PID 1324 wrote to memory of 3856 1324 vpn_ico.exe 88 PID 1324 wrote to memory of 3856 1324 vpn_ico.exe 88 PID 1324 wrote to memory of 3856 1324 vpn_ico.exe 88 PID 644 wrote to memory of 4168 644 6_ico.exe 89 PID 644 wrote to memory of 4168 644 6_ico.exe 89 PID 644 wrote to memory of 4168 644 6_ico.exe 89 PID 4168 wrote to memory of 4228 4168 cmd.exe 91 PID 4168 wrote to memory of 4228 4168 cmd.exe 91 PID 4168 wrote to memory of 4228 4168 cmd.exe 91 PID 644 wrote to memory of 4248 644 6_ico.exe 92 PID 644 wrote to memory of 4248 644 6_ico.exe 92 PID 644 wrote to memory of 4248 644 6_ico.exe 92 PID 4248 wrote to memory of 4292 4248 cmd.exe 94 PID 4248 wrote to memory of 4292 4248 cmd.exe 94 PID 4248 wrote to memory of 4292 4248 cmd.exe 94 PID 2148 wrote to memory of 4312 2148 sllghwdaimcf.exe 95 PID 2148 wrote to memory of 4312 2148 sllghwdaimcf.exe 95 PID 2148 wrote to memory of 4312 2148 sllghwdaimcf.exe 95 PID 4312 wrote to memory of 4356 4312 rundll32.exe 96 PID 4312 wrote to memory of 4356 4312 rundll32.exe 96 PID 4312 wrote to memory of 4356 4312 rundll32.exe 96 PID 1324 wrote to memory of 4524 1324 vpn_ico.exe 98 PID 1324 wrote to memory of 4524 1324 vpn_ico.exe 98 PID 1324 wrote to memory of 4524 1324 vpn_ico.exe 98 PID 4356 wrote to memory of 4636 4356 RUNDLL32.EXE 99 PID 4356 wrote to memory of 4636 4356 RUNDLL32.EXE 99 PID 4356 wrote to memory of 4636 4356 RUNDLL32.EXE 99 PID 4356 wrote to memory of 4932 4356 RUNDLL32.EXE 102 PID 4356 wrote to memory of 4932 4356 RUNDLL32.EXE 102 PID 4356 wrote to memory of 4932 4356 RUNDLL32.EXE 102 PID 4932 wrote to memory of 5104 4932 powershell.exe 104 PID 4932 wrote to memory of 5104 4932 powershell.exe 104 PID 4932 wrote to memory of 5104 4932 powershell.exe 104 PID 4356 wrote to memory of 4152 4356 RUNDLL32.EXE 105 PID 4356 wrote to memory of 4152 4356 RUNDLL32.EXE 105 PID 4356 wrote to memory of 4152 4356 RUNDLL32.EXE 105 PID 4356 wrote to memory of 4212 4356 RUNDLL32.EXE 107 PID 4356 wrote to memory of 4212 4356 RUNDLL32.EXE 107 PID 4356 wrote to memory of 4212 4356 RUNDLL32.EXE 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.ArtemisF23FB6308BD9.1056.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.ArtemisF23FB6308BD9.1056.exe"1⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\File332.exe"C:\Users\Admin\AppData\Local\Temp\File332.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\New Feature\4_ico.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4_ico.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\gxlgxhkgfr & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:4228
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\gxlgxhkgfr & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:4292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn_ico.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn_ico.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\sllghwdaimcf.exe"C:\Users\Admin\AppData\Local\Temp\sllghwdaimcf.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\SLLGHW~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\SLLGHW~1.EXE5⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\SLLGHW~1.DLL,eBxcfI0=6⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp8C48.tmp.ps1"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpA08D.tmp.ps1"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost8⤵PID:5104
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask7⤵PID:4152
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask7⤵PID:4212
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\giyddnbgl.vbs"4⤵PID:3856
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\juwilmf.vbs"4⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:4524
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\0cGzxvVicuku & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.ArtemisF23FB6308BD9.1056.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:2064
-
-