Analysis
-
max time kernel
123s -
max time network
121s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25-01-2021 14:36
Behavioral task
behavioral1
Sample
83a67ecd166b919255b264718993c284a3238971a24c939c45e0c525f3361a43.bin.dll
Resource
win7v20201028
General
-
Target
83a67ecd166b919255b264718993c284a3238971a24c939c45e0c525f3361a43.bin.dll
-
Size
5.2MB
-
MD5
3a4299537272d8671d85c99c17918e99
-
SHA1
93ff8577a13146091e40349fa523a6f54bd5fa2a
-
SHA256
83a67ecd166b919255b264718993c284a3238971a24c939c45e0c525f3361a43
-
SHA512
29011d41fdfc35cf3a4fe84fc08536bf1aa2afae2954227c58c53bbd922dcbfe256c43844e4153b56888f0e648dc57ad25d9bf15abe0dfb5796c2276b2ff1d28
Malware Config
Extracted
danabot
1732
21
149.129.212.179:443
47.254.247.133:443
159.89.114.62:443
138.197.139.56:443
-
embedded_hash
DE6DF8FA2198DD77CFD93D89D8ECC62D
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 13 2364 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3436 powershell.exe 3436 powershell.exe 3436 powershell.exe 2364 RUNDLL32.EXE 2364 RUNDLL32.EXE 3248 powershell.exe 3248 powershell.exe 3248 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1912 rundll32.exe Token: SeDebugPrivilege 2364 RUNDLL32.EXE Token: SeDebugPrivilege 3436 powershell.exe Token: SeDebugPrivilege 3248 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 RUNDLL32.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3564 wrote to memory of 1912 3564 rundll32.exe 74 PID 3564 wrote to memory of 1912 3564 rundll32.exe 74 PID 3564 wrote to memory of 1912 3564 rundll32.exe 74 PID 1912 wrote to memory of 2364 1912 rundll32.exe 75 PID 1912 wrote to memory of 2364 1912 rundll32.exe 75 PID 1912 wrote to memory of 2364 1912 rundll32.exe 75 PID 2364 wrote to memory of 3436 2364 RUNDLL32.EXE 80 PID 2364 wrote to memory of 3436 2364 RUNDLL32.EXE 80 PID 2364 wrote to memory of 3436 2364 RUNDLL32.EXE 80 PID 2364 wrote to memory of 3248 2364 RUNDLL32.EXE 83 PID 2364 wrote to memory of 3248 2364 RUNDLL32.EXE 83 PID 2364 wrote to memory of 3248 2364 RUNDLL32.EXE 83 PID 3248 wrote to memory of 2140 3248 powershell.exe 85 PID 3248 wrote to memory of 2140 3248 powershell.exe 85 PID 3248 wrote to memory of 2140 3248 powershell.exe 85 PID 2364 wrote to memory of 1720 2364 RUNDLL32.EXE 86 PID 2364 wrote to memory of 1720 2364 RUNDLL32.EXE 86 PID 2364 wrote to memory of 1720 2364 RUNDLL32.EXE 86 PID 2364 wrote to memory of 3780 2364 RUNDLL32.EXE 88 PID 2364 wrote to memory of 3780 2364 RUNDLL32.EXE 88 PID 2364 wrote to memory of 3780 2364 RUNDLL32.EXE 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\83a67ecd166b919255b264718993c284a3238971a24c939c45e0c525f3361a43.bin.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\83a67ecd166b919255b264718993c284a3238971a24c939c45e0c525f3361a43.bin.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\83a67ecd166b919255b264718993c284a3238971a24c939c45e0c525f3361a43.bin.dll,VQFUXKnUBA==3⤵
- Blocklisted process makes network request
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp5C5E.tmp.ps1"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3436
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp7036.tmp.ps1"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost5⤵PID:2140
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask4⤵PID:1720
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask4⤵PID:3780
-
-
-