Resubmissions

14-09-2021 09:06

210914-k2x6jaadeq 10

14-09-2021 08:57

210914-kw2a1afde8 10

Analysis

  • max time kernel
    108s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    14-09-2021 08:57

General

  • Target

    lv.exe

  • Size

    4.2MB

  • MD5

    1919bd531e95d9195dc53ee6af79ffc8

  • SHA1

    65c2dfb3ad6ff0b3f1b33db143ec9a65ea64e2b0

  • SHA256

    eb50c5447c789b7cab2a404cfbbd049c55fa70bc58783f2bb27df7d169474d27

  • SHA512

    b00029cdfeac8266653f2fefe07e40815c14c811dce68fc95b821a408f8cf60489366a461a1def3d423747a2f5559ce6c1acaee16a795d893036d2a8226ae9c6

Malware Config

Extracted

Family

danabot

C2

23.229.29.48:443

5.9.224.204:443

192.255.166.212:443

Attributes
  • embedded_hash

    0E1A7A1479C37094441FA911262B322A

rsa_pubkey.plain
rsa_privkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot Loader Component 4 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lv.exe
    "C:\Users\Admin\AppData\Local\Temp\lv.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Users\Admin\AppData\Local\Temp\picoid\wakingvp.exe
      "C:\Users\Admin\AppData\Local\Temp\picoid\wakingvp.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\SysWOW64\cmd.exe
        "cmd" /c cmd < Giu.vst
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3452
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:516
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^xUlNXJkiuCtOHCFKpjDKUUxBRFKQlgBZHHJmaqfsJHlshynlliqvvnNmAJWsYcXSwtiqTyaoWjqjKehMumFehtDoUpZItXagJafpYnsyOSmlnAPbcpkmPVEXBYyJy$" Ape.vst
            5⤵
              PID:2624
            • C:\Users\Admin\AppData\Roaming\Estremita.exe.com
              Estremita.exe.com o
              5⤵
              • Executes dropped EXE
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:3248
              • C:\Users\Admin\AppData\Roaming\Estremita.exe.com
                C:\Users\Admin\AppData\Roaming\Estremita.exe.com o
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:3896
                • C:\Users\Admin\AppData\Roaming\ipconfig.exe
                  C:\Users\Admin\AppData\Roaming\ipconfig.exe 
                  7⤵
                  • Executes dropped EXE
                  • Checks processor information in registry
                  • Gathers network information
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:3940
                  • C:\Users\Admin\AppData\Local\Temp\kxonpvosm.exe
                    "C:\Users\Admin\AppData\Local\Temp\kxonpvosm.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:356
                    • C:\Windows\SysWOW64\rundll32.exe
                      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\KXONPV~1.DLL,s C:\Users\Admin\AppData\Local\Temp\KXONPV~1.EXE
                      9⤵
                      • Loads dropped DLL
                      PID:2284
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ovubknwjb.vbs"
                    8⤵
                      PID:972
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lfnehrmkk.vbs"
                      8⤵
                      • Blocklisted process makes network request
                      • Modifies system certificate store
                      PID:2168
              • C:\Windows\SysWOW64\PING.EXE
                ping GSNTPAWQ
                5⤵
                • Runs ping.exe
                PID:3988
        • C:\Users\Admin\AppData\Local\Temp\picoid\fulzie.exe
          "C:\Users\Admin\AppData\Local\Temp\picoid\fulzie.exe"
          2⤵
          • Executes dropped EXE
          • Checks BIOS information in registry
          • Drops startup file
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of WriteProcessMemory
          PID:3984
          • C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
            "C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"
            3⤵
            • Executes dropped EXE
            • Checks BIOS information in registry
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: AddClipboardFormatListener
            PID:652

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Command-Line Interface

      1
      T1059

      Defense Evasion

      Virtualization/Sandbox Evasion

      1
      T1497

      Install Root Certificate

      1
      T1130

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      3
      T1012

      Virtualization/Sandbox Evasion

      1
      T1497

      System Information Discovery

      5
      T1082

      Remote System Discovery

      1
      T1018

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\KXONPV~1.DLL
        MD5

        89040b045779533e76aedd7bf9bd74e9

        SHA1

        54a8f9f8f37d7762311fc4909087df5678cead38

        SHA256

        5e8548f31ce6af153949e12f2ed1461d9c92486d4c0919ced88d61a89dde0480

        SHA512

        6d16cab64d487a60c11d6e55b1a6e020e1fcabdd07052e0749e4616e96420d647fa22eda92eb4df6c78e54bbef3a93a2a29aca94e911504cd274d0d044b71b4a

      • C:\Users\Admin\AppData\Local\Temp\kxonpvosm.exe
        MD5

        b7a35ebacfed2c27abbb217cca8dca06

        SHA1

        e4d9ec5209e7bf6037de2f199e2f215c64751a92

        SHA256

        61bb57d4ddc1f9de56ffe1f1104af48a1a9dfdf72d084b8338730632fcfb54fc

        SHA512

        d39213c25d0cecb800fdad7212f1ad7f74429ae82986e5856e58012e949edb67c844ac7686cadc2a59bacc7325d499121eb98f1bc4e8e36b722cea5b9a9b7ebd

      • C:\Users\Admin\AppData\Local\Temp\kxonpvosm.exe
        MD5

        b7a35ebacfed2c27abbb217cca8dca06

        SHA1

        e4d9ec5209e7bf6037de2f199e2f215c64751a92

        SHA256

        61bb57d4ddc1f9de56ffe1f1104af48a1a9dfdf72d084b8338730632fcfb54fc

        SHA512

        d39213c25d0cecb800fdad7212f1ad7f74429ae82986e5856e58012e949edb67c844ac7686cadc2a59bacc7325d499121eb98f1bc4e8e36b722cea5b9a9b7ebd

      • C:\Users\Admin\AppData\Local\Temp\lfnehrmkk.vbs
        MD5

        94f72b56a4de168f5a44bbb58f3586fa

        SHA1

        75533971fad9a91758f21ffcc5c59fd058acbde8

        SHA256

        6297642dddf04d1939f70d46602930e547f086fa96efbadad1475316f5b2d6e0

        SHA512

        f463a42a3cb37bec45748ad2dfc196f27e819325f493c6edb6937949ce9327a9676aec8f705285e4c6d07dc92dfc499c677746860ded15bf1ea00b2cefb35273

      • C:\Users\Admin\AppData\Local\Temp\ovubknwjb.vbs
        MD5

        5fb8be8ec4e082746583aba1626073ae

        SHA1

        725e7c71f53aeb89c7c8c23e38a498b978b75e5b

        SHA256

        5df7215c829f3820843756e4a8f10194820e6a90c4fcb087b7fe9c3d40fb2e2a

        SHA512

        ad001617952ab58028114b6bcfd63086b25a253100c8faa3594c7554a8e3fe2a07b466f1d140919fd2b8337e6beb3feffa647dea02917bd738958b2843b72a44

      • C:\Users\Admin\AppData\Local\Temp\picoid\fulzie.exe
        MD5

        03a2391c69f3fb0c90500a7713b83b0c

        SHA1

        72d5a9b0547a061ed86a060c699bfb89fe045e55

        SHA256

        9080c0afa31a3a559dcfc88d2377fe46a36e82d53f35d98fa44041a2ae081c37

        SHA512

        de94437b46f1163e4e06817b6c2f17944703c3e88a2ae57563d304d854f69fa4f61793b75f292e371e5d47ebed63055f27fad0df85e57c6f9b2707054495088d

      • C:\Users\Admin\AppData\Local\Temp\picoid\fulzie.exe
        MD5

        03a2391c69f3fb0c90500a7713b83b0c

        SHA1

        72d5a9b0547a061ed86a060c699bfb89fe045e55

        SHA256

        9080c0afa31a3a559dcfc88d2377fe46a36e82d53f35d98fa44041a2ae081c37

        SHA512

        de94437b46f1163e4e06817b6c2f17944703c3e88a2ae57563d304d854f69fa4f61793b75f292e371e5d47ebed63055f27fad0df85e57c6f9b2707054495088d

      • C:\Users\Admin\AppData\Local\Temp\picoid\wakingvp.exe
        MD5

        a528555dff61a67168646ec8c542cb98

        SHA1

        74db3485a17d22befa1a7ba4d090434e47007fb1

        SHA256

        0513f7eee6e496728165e72393dc910e3319efce1a624e231ab47a6b57009570

        SHA512

        561aac7278d0411a163dbfc63149ba42f645d058545003168b95939fecdfe6b2e6a520fcedf80648f63481b3d9c1690c49d3919d7675e9463f3fee1d2535f77a

      • C:\Users\Admin\AppData\Local\Temp\picoid\wakingvp.exe
        MD5

        a528555dff61a67168646ec8c542cb98

        SHA1

        74db3485a17d22befa1a7ba4d090434e47007fb1

        SHA256

        0513f7eee6e496728165e72393dc910e3319efce1a624e231ab47a6b57009570

        SHA512

        561aac7278d0411a163dbfc63149ba42f645d058545003168b95939fecdfe6b2e6a520fcedf80648f63481b3d9c1690c49d3919d7675e9463f3fee1d2535f77a

      • C:\Users\Admin\AppData\Roaming\Ape.vst
        MD5

        0f95d588ea95ba041d1e1ab00ab5985a

        SHA1

        59b0f6f218ca27e6bb4a8f709a9bb5c322caa5d9

        SHA256

        e785765db1d69967274f7556a1bb7f58d03ac7a42ce30c898f8b82b5967a836c

        SHA512

        0f0bc00fb441342f01574eb95fd2ea82c01dfe358476226af2de5038b6529dab71da430b2394efb229eea75e6ea2a58f625d8d92cadb497a8cdbcfbe82b53d8a

      • C:\Users\Admin\AppData\Roaming\Estremita.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Roaming\Estremita.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Roaming\Giu.vst
        MD5

        6b8f8744aed55fed3f2a4d8641a51b38

        SHA1

        7bb78b0d2cfaa007b004d664975fab47f8e61573

        SHA256

        dca7e57053322373679c95f82885555615554b4b6d614b271f733c1c32dccf08

        SHA512

        60e92939d82e6a6458c7928012d89c988b5b4d35fc5d4d1dfded22855dbb638c952dd4bf293360dc2ec89407b58d8cc47bd1cc19caa181ec84bbc8d933802aad

      • C:\Users\Admin\AppData\Roaming\Guardo.vst
        MD5

        ba3ab0710c08184730d023649fb798a7

        SHA1

        9681e1f7cbf4f69a4067993b64faf85faa6beb08

        SHA256

        69ff4fcbd902b901ade16bb5702560b0a13ee0b353f9cc16d90fe995e5b01498

        SHA512

        ea744158004880f643e947abeae924a58b4f95426970f688a8083b2d5a44fa566919e3271f5ede1e0c48de4aec43e50383f723fbe71915a96c3f1ced50c07b5a

      • C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
        MD5

        03a2391c69f3fb0c90500a7713b83b0c

        SHA1

        72d5a9b0547a061ed86a060c699bfb89fe045e55

        SHA256

        9080c0afa31a3a559dcfc88d2377fe46a36e82d53f35d98fa44041a2ae081c37

        SHA512

        de94437b46f1163e4e06817b6c2f17944703c3e88a2ae57563d304d854f69fa4f61793b75f292e371e5d47ebed63055f27fad0df85e57c6f9b2707054495088d

      • C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
        MD5

        03a2391c69f3fb0c90500a7713b83b0c

        SHA1

        72d5a9b0547a061ed86a060c699bfb89fe045e55

        SHA256

        9080c0afa31a3a559dcfc88d2377fe46a36e82d53f35d98fa44041a2ae081c37

        SHA512

        de94437b46f1163e4e06817b6c2f17944703c3e88a2ae57563d304d854f69fa4f61793b75f292e371e5d47ebed63055f27fad0df85e57c6f9b2707054495088d

      • C:\Users\Admin\AppData\Roaming\ipconfig.exe
        MD5

        a69ba0e84d1a6b853acf752969d3f937

        SHA1

        ff1bee9468afc6c4ff82cba3f5ae13842ea07f0c

        SHA256

        01cbe910e5d343c25e9066ccc7f8777a79b0d3e210aa2fb7e4428ab259712469

        SHA512

        fd4fa4b978b746638bd847fce9dfa9bc9c0ab5c91fb989e9aeea147a4a35e2326586ec04d80bdab6b21d06b2f41e870e9f588aeca27fc3473e3fca0973e60eca

      • C:\Users\Admin\AppData\Roaming\ipconfig.exe
        MD5

        a69ba0e84d1a6b853acf752969d3f937

        SHA1

        ff1bee9468afc6c4ff82cba3f5ae13842ea07f0c

        SHA256

        01cbe910e5d343c25e9066ccc7f8777a79b0d3e210aa2fb7e4428ab259712469

        SHA512

        fd4fa4b978b746638bd847fce9dfa9bc9c0ab5c91fb989e9aeea147a4a35e2326586ec04d80bdab6b21d06b2f41e870e9f588aeca27fc3473e3fca0973e60eca

      • C:\Users\Admin\AppData\Roaming\o
        MD5

        ba3ab0710c08184730d023649fb798a7

        SHA1

        9681e1f7cbf4f69a4067993b64faf85faa6beb08

        SHA256

        69ff4fcbd902b901ade16bb5702560b0a13ee0b353f9cc16d90fe995e5b01498

        SHA512

        ea744158004880f643e947abeae924a58b4f95426970f688a8083b2d5a44fa566919e3271f5ede1e0c48de4aec43e50383f723fbe71915a96c3f1ced50c07b5a

      • \Users\Admin\AppData\Local\Temp\KXONPV~1.DLL
        MD5

        89040b045779533e76aedd7bf9bd74e9

        SHA1

        54a8f9f8f37d7762311fc4909087df5678cead38

        SHA256

        5e8548f31ce6af153949e12f2ed1461d9c92486d4c0919ced88d61a89dde0480

        SHA512

        6d16cab64d487a60c11d6e55b1a6e020e1fcabdd07052e0749e4616e96420d647fa22eda92eb4df6c78e54bbef3a93a2a29aca94e911504cd274d0d044b71b4a

      • \Users\Admin\AppData\Local\Temp\KXONPV~1.DLL
        MD5

        89040b045779533e76aedd7bf9bd74e9

        SHA1

        54a8f9f8f37d7762311fc4909087df5678cead38

        SHA256

        5e8548f31ce6af153949e12f2ed1461d9c92486d4c0919ced88d61a89dde0480

        SHA512

        6d16cab64d487a60c11d6e55b1a6e020e1fcabdd07052e0749e4616e96420d647fa22eda92eb4df6c78e54bbef3a93a2a29aca94e911504cd274d0d044b71b4a

      • \Users\Admin\AppData\Local\Temp\nsf20AE.tmp\nsExec.dll
        MD5

        09c2e27c626d6f33018b8a34d3d98cb6

        SHA1

        8d6bf50218c8f201f06ecf98ca73b74752a2e453

        SHA256

        114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1

        SHA512

        883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

      • \Users\Admin\AppData\Local\Temp\nso1E7B.tmp\UAC.dll
        MD5

        adb29e6b186daa765dc750128649b63d

        SHA1

        160cbdc4cb0ac2c142d361df138c537aa7e708c9

        SHA256

        2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

        SHA512

        b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

      • memory/356-150-0x0000000003620000-0x0000000003725000-memory.dmp
        Filesize

        1.0MB

      • memory/356-151-0x0000000000400000-0x0000000001860000-memory.dmp
        Filesize

        20.4MB

      • memory/356-145-0x0000000000000000-mapping.dmp
      • memory/516-126-0x0000000000000000-mapping.dmp
      • memory/652-127-0x0000000000000000-mapping.dmp
      • memory/652-130-0x00007FF7DA9A0000-0x00007FF7DB2B4000-memory.dmp
        Filesize

        9.1MB

      • memory/972-148-0x0000000000000000-mapping.dmp
      • memory/2168-152-0x0000000000000000-mapping.dmp
      • memory/2284-154-0x0000000000000000-mapping.dmp
      • memory/2284-158-0x00000000042A0000-0x0000000004402000-memory.dmp
        Filesize

        1.4MB

      • memory/2624-131-0x0000000000000000-mapping.dmp
      • memory/2736-116-0x0000000000000000-mapping.dmp
      • memory/3248-134-0x0000000000000000-mapping.dmp
      • memory/3452-123-0x0000000000000000-mapping.dmp
      • memory/3896-138-0x0000000000000000-mapping.dmp
      • memory/3896-142-0x0000000000A80000-0x0000000000A82000-memory.dmp
        Filesize

        8KB

      • memory/3940-140-0x000000000040591E-mapping.dmp
      • memory/3940-143-0x0000000000400000-0x0000000000427000-memory.dmp
        Filesize

        156KB

      • memory/3984-124-0x00007FF7668B0000-0x00007FF7671C4000-memory.dmp
        Filesize

        9.1MB

      • memory/3984-118-0x0000000000000000-mapping.dmp
      • memory/3988-136-0x0000000000000000-mapping.dmp