Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    03-05-2021 18:12

General

  • Target

    ae672455_by_Libranalysis.exe

  • Size

    1.0MB

  • MD5

    ae672455612bde0a10259c441ffc97b3

  • SHA1

    378527fc598c402982fc0816282fef5e97318a76

  • SHA256

    83c713b4f6938fb03c8ddbbfd0830b90aa9dc33cc8309f8866396860e4b59243

  • SHA512

    f366df4117ff648b3d205dd0c5713054a6733bc86e70018065514d0075c87c50b188a95a159dd6ccda72bce22f3baf5797e3cfc470ac150bf47e6c74851fbe81

Malware Config

Extracted

Family

danabot

Version

1827

Botnet

3

C2

23.106.123.185:443

192.210.198.12:443

192.236.147.83:443

37.220.31.94:443

Attributes
  • embedded_hash

    AEF96B4D339B580ABB737F203C2D0F52

rsa_pubkey.plain
rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 8 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae672455_by_Libranalysis.exe
    "C:\Users\Admin\AppData\Local\Temp\ae672455_by_Libranalysis.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:708
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\System32\svchost.exe"
      2⤵
        PID:868
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cmd < Avvenne.pst
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:864
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:188
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^OrbGtAtgShJATMzcwdgeFqmrVYufAJzwsUiIUTHcvjNANrHaHsmcZKvOExKyxOOpTIoYFKAiISGzjZdSsN$" Crudelta.pst
            4⤵
              PID:2752
            • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Ama.exe.com
              Ama.exe.com p
              4⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:732
              • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Ama.exe.com
                C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Ama.exe.com p
                5⤵
                • Executes dropped EXE
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2128
                • C:\Users\Admin\AppData\Local\Temp\dshqkpq.exe
                  "C:\Users\Admin\AppData\Local\Temp\dshqkpq.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:700
                  • C:\Windows\SysWOW64\rundll32.exe
                    C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\DSHQKP~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\dshqkpq.exe
                    7⤵
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:800
                    • C:\Windows\SysWOW64\RUNDLL32.EXE
                      C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\DSHQKP~1.DLL,aDcx
                      8⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1760
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\myooblpr.vbs"
                  6⤵
                    PID:2820
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dvfyikagacl.vbs"
                    6⤵
                    • Blocklisted process makes network request
                    • Modifies system certificate store
                    PID:1428
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1 -n 30
                4⤵
                • Runs ping.exe
                PID:1180

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Install Root Certificate

        1
        T1130

        Modify Registry

        1
        T1112

        Credential Access

        Credentials in Files

        1
        T1081

        Discovery

        Query Registry

        2
        T1012

        System Information Discovery

        2
        T1082

        Remote System Discovery

        1
        T1018

        Collection

        Data from Local System

        1
        T1005

        Command and Control

        Web Service

        1
        T1102

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DSHQKP~1.DLL
          MD5

          ce2816dd27b6f679acfbfbad58c5ac6e

          SHA1

          2a1b1d7fa0b4f61ff178b197766943bb338bbe8c

          SHA256

          90f0e6c8e7905975130412bf839e824f72f90d708fcc431f53e5ad9f35666f27

          SHA512

          1f96be6c8259c5baec52cd568f4ab549af0b057f750126cafc5e04c4d1b2b66cfec7a65e2dd541f9f4d59dba9e09197d1f589a563c0f5816cc40dc5fa45ce44e

        • C:\Users\Admin\AppData\Local\Temp\dshqkpq.exe
          MD5

          eb8602732e7c8f8d2c055249c3784561

          SHA1

          8301959b248222c39521074cd1a55a98f1540a79

          SHA256

          7b2fd2b8a39683717b5a5208dd5272aae5aad3d23fc87aae862633d7e6c8150e

          SHA512

          5f6a63239dca93c9ba8cfbe0117477708bfb48da10173404dab16c69e302c2164220fc8ed48d133e0bcca9ec8183bb2e284e187e1aca617715628e2a276e652b

        • C:\Users\Admin\AppData\Local\Temp\dshqkpq.exe
          MD5

          eb8602732e7c8f8d2c055249c3784561

          SHA1

          8301959b248222c39521074cd1a55a98f1540a79

          SHA256

          7b2fd2b8a39683717b5a5208dd5272aae5aad3d23fc87aae862633d7e6c8150e

          SHA512

          5f6a63239dca93c9ba8cfbe0117477708bfb48da10173404dab16c69e302c2164220fc8ed48d133e0bcca9ec8183bb2e284e187e1aca617715628e2a276e652b

        • C:\Users\Admin\AppData\Local\Temp\dvfyikagacl.vbs
          MD5

          8b2181ccfe04faab9532c16a613eb8d8

          SHA1

          8430af4b9258a52a3a63970d7ca4cf3a60d5a302

          SHA256

          2849a1c43bc753c9489770da6c869db042c54c7d2d46493b26cb484c19b60c50

          SHA512

          f8de3bb4ebf88f066ae99677bb9b8d73d45fb3d36c3d28fa2abb988c05da5d83a4be7a4c8b5d18339407c48583524ddb1e60e01cb33624b338d2c6e8e4929d94

        • C:\Users\Admin\AppData\Local\Temp\myooblpr.vbs
          MD5

          819d8369903b08b6098027928bda9553

          SHA1

          79cd944c5ec5c541a1016cf1589cfa68ae0e646f

          SHA256

          b77ebdd00fe2fe4ac406ca5069397291293d70064271f28cec6189a5bb5b0b82

          SHA512

          57745a04bd4bd710f05d2326338cc08ac04fe4d55c3162e7db3925817af0c4712e1bf4449351b351f15f7c713dd56ccc0a975b103050ad3fa7f1e12995d8cb81

        • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Ama.exe.com
          MD5

          78ba0653a340bac5ff152b21a83626cc

          SHA1

          b12da9cb5d024555405040e65ad89d16ae749502

          SHA256

          05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

          SHA512

          efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

        • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Ama.exe.com
          MD5

          78ba0653a340bac5ff152b21a83626cc

          SHA1

          b12da9cb5d024555405040e65ad89d16ae749502

          SHA256

          05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

          SHA512

          efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

        • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Ama.exe.com
          MD5

          78ba0653a340bac5ff152b21a83626cc

          SHA1

          b12da9cb5d024555405040e65ad89d16ae749502

          SHA256

          05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

          SHA512

          efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

        • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Arcate.pst
          MD5

          cb84d48d8a79791bee0d1e52740ccb92

          SHA1

          902e3d817e09274d47c1d00fc10e0e831a0a4964

          SHA256

          f253dece3b82426eecbd65c4f34d9a5dcb02a8710c83fc4a48d9edc8f6b89f65

          SHA512

          20d0dccc6e80dc44c2beba3c0dceaf23e886e68b3b36de6675a8357f27a60da8dde0e7df4450a8491ae1dee1e8c4c8d6f1cf37231326cdd86793bf2088f01a68

        • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Avvenne.pst
          MD5

          3a9d03cccbf783554b8350fff9bbc8df

          SHA1

          636b49abfcadb9c4242772c65b1a4d6485df1cea

          SHA256

          e1f3771ea85d11ed1ce2f3686c087f5e53b94b6165d4105a8dc76f03ef8cbd1b

          SHA512

          c3c620e1e34fcfcbdfa7d84ab015c070a40265b67f40d9a7d857a4f695d6a05ab660dac767f1e9d6f9e667b5c040b9e807c610ade9cfa6f7931e3cd1c476fb8b

        • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Crudelta.pst
          MD5

          0d540d5ad9aae4b04416a647d36e6b8f

          SHA1

          1dc0f743995d6706927c2b01d5fa6860fb4ac118

          SHA256

          31c317f12b408beed5e0da60734a083797d0d0a599710875352cccab59970049

          SHA512

          d723b84e6fa7752a4bc2afa74aee80f88a3d0d6fb9c62462866738a37c7f77dfa7f8c590670afadd26dcdbdd9415d51de7df424a9c0eaf3b7af9458a3646ebbd

        • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Ora.pst
          MD5

          3ca4dc18e084c073dbd4976dc9dfb602

          SHA1

          6a2f962587ab39e0ad7322d71ad590612052d466

          SHA256

          115b36d44dd6636f4fe7659c898d2440194ae6a6d9073e28475269c65fd53c17

          SHA512

          6d5a8285a010f250a2b8117b6f1b4cdab5d625f56feb3fe4aaff3036436db22d207ce823232881e93dcbae0cb5625f05c4227f4d3a7726334765c391b78b5fb4

        • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\p
          MD5

          cb84d48d8a79791bee0d1e52740ccb92

          SHA1

          902e3d817e09274d47c1d00fc10e0e831a0a4964

          SHA256

          f253dece3b82426eecbd65c4f34d9a5dcb02a8710c83fc4a48d9edc8f6b89f65

          SHA512

          20d0dccc6e80dc44c2beba3c0dceaf23e886e68b3b36de6675a8357f27a60da8dde0e7df4450a8491ae1dee1e8c4c8d6f1cf37231326cdd86793bf2088f01a68

        • \Users\Admin\AppData\Local\Temp\DSHQKP~1.DLL
          MD5

          ce2816dd27b6f679acfbfbad58c5ac6e

          SHA1

          2a1b1d7fa0b4f61ff178b197766943bb338bbe8c

          SHA256

          90f0e6c8e7905975130412bf839e824f72f90d708fcc431f53e5ad9f35666f27

          SHA512

          1f96be6c8259c5baec52cd568f4ab549af0b057f750126cafc5e04c4d1b2b66cfec7a65e2dd541f9f4d59dba9e09197d1f589a563c0f5816cc40dc5fa45ce44e

        • \Users\Admin\AppData\Local\Temp\DSHQKP~1.DLL
          MD5

          ce2816dd27b6f679acfbfbad58c5ac6e

          SHA1

          2a1b1d7fa0b4f61ff178b197766943bb338bbe8c

          SHA256

          90f0e6c8e7905975130412bf839e824f72f90d708fcc431f53e5ad9f35666f27

          SHA512

          1f96be6c8259c5baec52cd568f4ab549af0b057f750126cafc5e04c4d1b2b66cfec7a65e2dd541f9f4d59dba9e09197d1f589a563c0f5816cc40dc5fa45ce44e

        • \Users\Admin\AppData\Local\Temp\DSHQKP~1.DLL
          MD5

          ce2816dd27b6f679acfbfbad58c5ac6e

          SHA1

          2a1b1d7fa0b4f61ff178b197766943bb338bbe8c

          SHA256

          90f0e6c8e7905975130412bf839e824f72f90d708fcc431f53e5ad9f35666f27

          SHA512

          1f96be6c8259c5baec52cd568f4ab549af0b057f750126cafc5e04c4d1b2b66cfec7a65e2dd541f9f4d59dba9e09197d1f589a563c0f5816cc40dc5fa45ce44e

        • memory/188-117-0x0000000000000000-mapping.dmp
        • memory/700-137-0x0000000002A10000-0x0000000002A11000-memory.dmp
          Filesize

          4KB

        • memory/700-130-0x0000000000000000-mapping.dmp
        • memory/700-136-0x0000000000400000-0x0000000000DF2000-memory.dmp
          Filesize

          9.9MB

        • memory/700-135-0x00000000031E0000-0x00000000038D5000-memory.dmp
          Filesize

          7.0MB

        • memory/732-121-0x0000000000000000-mapping.dmp
        • memory/800-149-0x00000000004E0000-0x00000000004E1000-memory.dmp
          Filesize

          4KB

        • memory/800-143-0x0000000004800000-0x0000000004801000-memory.dmp
          Filesize

          4KB

        • memory/800-138-0x0000000000000000-mapping.dmp
        • memory/800-148-0x0000000004D31000-0x000000000538F000-memory.dmp
          Filesize

          6.4MB

        • memory/800-142-0x0000000004080000-0x000000000463A000-memory.dmp
          Filesize

          5.7MB

        • memory/864-115-0x0000000000000000-mapping.dmp
        • memory/868-114-0x0000000000000000-mapping.dmp
        • memory/1180-123-0x0000000000000000-mapping.dmp
        • memory/1428-151-0x0000000000000000-mapping.dmp
        • memory/1760-144-0x0000000000000000-mapping.dmp
        • memory/1760-150-0x0000000005021000-0x000000000567F000-memory.dmp
          Filesize

          6.4MB

        • memory/2128-128-0x0000000000AF0000-0x0000000000AF1000-memory.dmp
          Filesize

          4KB

        • memory/2128-125-0x0000000000000000-mapping.dmp
        • memory/2752-118-0x0000000000000000-mapping.dmp
        • memory/2820-133-0x0000000000000000-mapping.dmp