Analysis
-
max time kernel
128s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
02-01-2021 09:35
Static task
static1
Behavioral task
behavioral1
Sample
3350aae4c4ebb8a9d200f05d1fd7950b.exe
Resource
win7v20201028
General
-
Target
3350aae4c4ebb8a9d200f05d1fd7950b.exe
-
Size
4.4MB
-
MD5
3350aae4c4ebb8a9d200f05d1fd7950b
-
SHA1
19468c85dd6772e7d5566bd9f3c216c4e8bfcfae
-
SHA256
e3433215e57803029ce2a3e019d844b377aeb77ea11e0154289fbd4c24838d51
-
SHA512
0646016c83f4da20138a4a9c710b368de53152000e8bce6cebfedea787bb9a1c94068078b88ba557976c12fa009c6cb72305dcafacdb85a6d59587cac2aeef86
Malware Config
Extracted
danabot
1732
3
108.62.118.103:443
23.226.132.92:443
23.106.123.249:443
108.62.141.152:443
-
embedded_hash
49574F66CD0103BBD725C08A9805C2BE
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 8 3192 RUNDLL32.EXE -
Deletes itself 1 IoCs
pid Process 3248 rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 3248 rundll32.exe 3248 rundll32.exe 3192 RUNDLL32.EXE 3192 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3380 powershell.exe 3380 powershell.exe 3380 powershell.exe 3192 RUNDLL32.EXE 3192 RUNDLL32.EXE 3820 powershell.exe 3820 powershell.exe 3820 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3248 rundll32.exe Token: SeDebugPrivilege 3192 RUNDLL32.EXE Token: SeDebugPrivilege 3380 powershell.exe Token: SeDebugPrivilege 3820 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3192 RUNDLL32.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 576 wrote to memory of 3248 576 3350aae4c4ebb8a9d200f05d1fd7950b.exe 75 PID 576 wrote to memory of 3248 576 3350aae4c4ebb8a9d200f05d1fd7950b.exe 75 PID 576 wrote to memory of 3248 576 3350aae4c4ebb8a9d200f05d1fd7950b.exe 75 PID 3248 wrote to memory of 3192 3248 rundll32.exe 76 PID 3248 wrote to memory of 3192 3248 rundll32.exe 76 PID 3248 wrote to memory of 3192 3248 rundll32.exe 76 PID 3192 wrote to memory of 3380 3192 RUNDLL32.EXE 80 PID 3192 wrote to memory of 3380 3192 RUNDLL32.EXE 80 PID 3192 wrote to memory of 3380 3192 RUNDLL32.EXE 80 PID 3192 wrote to memory of 3820 3192 RUNDLL32.EXE 82 PID 3192 wrote to memory of 3820 3192 RUNDLL32.EXE 82 PID 3192 wrote to memory of 3820 3192 RUNDLL32.EXE 82 PID 3820 wrote to memory of 196 3820 powershell.exe 84 PID 3820 wrote to memory of 196 3820 powershell.exe 84 PID 3820 wrote to memory of 196 3820 powershell.exe 84 PID 3192 wrote to memory of 1224 3192 RUNDLL32.EXE 85 PID 3192 wrote to memory of 1224 3192 RUNDLL32.EXE 85 PID 3192 wrote to memory of 1224 3192 RUNDLL32.EXE 85 PID 3192 wrote to memory of 1004 3192 RUNDLL32.EXE 87 PID 3192 wrote to memory of 1004 3192 RUNDLL32.EXE 87 PID 3192 wrote to memory of 1004 3192 RUNDLL32.EXE 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3350aae4c4ebb8a9d200f05d1fd7950b.exe"C:\Users\Admin\AppData\Local\Temp\3350aae4c4ebb8a9d200f05d1fd7950b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\3350AA~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\3350AA~1.EXE2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\3350AA~1.DLL,ej48LDYSBQ==3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp8310.tmp.ps1"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpA446.tmp.ps1"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost5⤵PID:196
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask4⤵PID:1224
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask4⤵PID:1004
-
-
-