Resubmissions
29-09-2021 10:05
210929-l4j75aefbp 10Analysis
-
max time kernel
147s -
max time network
131s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
29-09-2021 10:05
Static task
static1
Behavioral task
behavioral1
Sample
baabe38154bc2271d603513346457154.exe
Resource
win7-en-20210920
General
-
Target
baabe38154bc2271d603513346457154.exe
-
Size
1.1MB
-
MD5
baabe38154bc2271d603513346457154
-
SHA1
86ebdcd4ba7e7985c80f3897d5adba2d2c923d52
-
SHA256
0c1978c1bc51c425f13e670074ddfd36d3e6e458dab5bcb1527c2b37953e13d6
-
SHA512
149c353564df264c5d7f32f072fdcdc91e0c0ee12fe0508968003a887412fa9d47204abadc9d8c61cb955bdc1e3335db8f6f334a7838f62f95d3f28d8d576502
Malware Config
Extracted
danabot
2052
4
142.11.192.232:443
192.119.110.73:443
142.11.242.31:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
Signatures
-
Danabot Loader Component 16 IoCs
resource yara_rule behavioral1/files/0x000700000001224a-59.dat DanabotLoader2021 behavioral1/files/0x000700000001224a-60.dat DanabotLoader2021 behavioral1/memory/1616-64-0x0000000001EA0000-0x0000000002004000-memory.dmp DanabotLoader2021 behavioral1/files/0x000700000001224a-63.dat DanabotLoader2021 behavioral1/files/0x000700000001224a-62.dat DanabotLoader2021 behavioral1/files/0x000700000001224a-61.dat DanabotLoader2021 behavioral1/files/0x000700000001224a-69.dat DanabotLoader2021 behavioral1/files/0x000700000001224a-70.dat DanabotLoader2021 behavioral1/files/0x000700000001224a-68.dat DanabotLoader2021 behavioral1/files/0x000700000001224a-71.dat DanabotLoader2021 behavioral1/memory/1396-72-0x0000000000AA0000-0x0000000000C04000-memory.dmp DanabotLoader2021 behavioral1/files/0x000700000001224a-81.dat DanabotLoader2021 behavioral1/files/0x000700000001224a-82.dat DanabotLoader2021 behavioral1/files/0x000700000001224a-80.dat DanabotLoader2021 behavioral1/files/0x000700000001224a-83.dat DanabotLoader2021 behavioral1/memory/1052-84-0x0000000002070000-0x00000000021D4000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 2 IoCs
flow pid Process 2 1616 rundll32.exe 3 1396 RUNDLL32.EXE -
Loads dropped DLL 12 IoCs
pid Process 1616 rundll32.exe 1616 rundll32.exe 1616 rundll32.exe 1616 rundll32.exe 1396 RUNDLL32.EXE 1396 RUNDLL32.EXE 1396 RUNDLL32.EXE 1396 RUNDLL32.EXE 1052 RUNDLL32.EXE 1052 RUNDLL32.EXE 1052 RUNDLL32.EXE 1052 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1052 set thread context of 1700 1052 RUNDLL32.EXE 33 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\zohplghndapsm.tmp rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 37 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform ID RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information RUNDLL32.EXE Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform ID RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information RUNDLL32.EXE Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Signature RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Signature RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Signature RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\8BEEBD4DCF0BFBF05F81B128510D7ECD0C27A5CD RUNDLL32.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\8BEEBD4DCF0BFBF05F81B128510D7ECD0C27A5CD\Blob = 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 RUNDLL32.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1396 RUNDLL32.EXE 1396 RUNDLL32.EXE 1396 RUNDLL32.EXE 1052 RUNDLL32.EXE 1648 powershell.exe 1396 RUNDLL32.EXE 1396 RUNDLL32.EXE 280 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1396 RUNDLL32.EXE Token: SeDebugPrivilege 1648 powershell.exe Token: SeDebugPrivilege 280 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1700 rundll32.exe 1396 RUNDLL32.EXE -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1616 2040 baabe38154bc2271d603513346457154.exe 27 PID 2040 wrote to memory of 1616 2040 baabe38154bc2271d603513346457154.exe 27 PID 2040 wrote to memory of 1616 2040 baabe38154bc2271d603513346457154.exe 27 PID 2040 wrote to memory of 1616 2040 baabe38154bc2271d603513346457154.exe 27 PID 2040 wrote to memory of 1616 2040 baabe38154bc2271d603513346457154.exe 27 PID 2040 wrote to memory of 1616 2040 baabe38154bc2271d603513346457154.exe 27 PID 2040 wrote to memory of 1616 2040 baabe38154bc2271d603513346457154.exe 27 PID 1616 wrote to memory of 1396 1616 rundll32.exe 30 PID 1616 wrote to memory of 1396 1616 rundll32.exe 30 PID 1616 wrote to memory of 1396 1616 rundll32.exe 30 PID 1616 wrote to memory of 1396 1616 rundll32.exe 30 PID 1616 wrote to memory of 1396 1616 rundll32.exe 30 PID 1616 wrote to memory of 1396 1616 rundll32.exe 30 PID 1616 wrote to memory of 1396 1616 rundll32.exe 30 PID 1396 wrote to memory of 1052 1396 RUNDLL32.EXE 32 PID 1396 wrote to memory of 1052 1396 RUNDLL32.EXE 32 PID 1396 wrote to memory of 1052 1396 RUNDLL32.EXE 32 PID 1396 wrote to memory of 1052 1396 RUNDLL32.EXE 32 PID 1396 wrote to memory of 1052 1396 RUNDLL32.EXE 32 PID 1396 wrote to memory of 1052 1396 RUNDLL32.EXE 32 PID 1396 wrote to memory of 1052 1396 RUNDLL32.EXE 32 PID 1052 wrote to memory of 1700 1052 RUNDLL32.EXE 33 PID 1052 wrote to memory of 1700 1052 RUNDLL32.EXE 33 PID 1052 wrote to memory of 1700 1052 RUNDLL32.EXE 33 PID 1052 wrote to memory of 1700 1052 RUNDLL32.EXE 33 PID 1052 wrote to memory of 1700 1052 RUNDLL32.EXE 33 PID 1700 wrote to memory of 1868 1700 rundll32.exe 34 PID 1700 wrote to memory of 1868 1700 rundll32.exe 34 PID 1700 wrote to memory of 1868 1700 rundll32.exe 34 PID 1396 wrote to memory of 1648 1396 RUNDLL32.EXE 36 PID 1396 wrote to memory of 1648 1396 RUNDLL32.EXE 36 PID 1396 wrote to memory of 1648 1396 RUNDLL32.EXE 36 PID 1396 wrote to memory of 1648 1396 RUNDLL32.EXE 36 PID 1396 wrote to memory of 280 1396 RUNDLL32.EXE 39 PID 1396 wrote to memory of 280 1396 RUNDLL32.EXE 39 PID 1396 wrote to memory of 280 1396 RUNDLL32.EXE 39 PID 1396 wrote to memory of 280 1396 RUNDLL32.EXE 39 PID 280 wrote to memory of 1288 280 powershell.exe 41 PID 280 wrote to memory of 1288 280 powershell.exe 41 PID 280 wrote to memory of 1288 280 powershell.exe 41 PID 280 wrote to memory of 1288 280 powershell.exe 41 PID 1396 wrote to memory of 1312 1396 RUNDLL32.EXE 42 PID 1396 wrote to memory of 1312 1396 RUNDLL32.EXE 42 PID 1396 wrote to memory of 1312 1396 RUNDLL32.EXE 42 PID 1396 wrote to memory of 1312 1396 RUNDLL32.EXE 42 PID 1396 wrote to memory of 288 1396 RUNDLL32.EXE 44 PID 1396 wrote to memory of 288 1396 RUNDLL32.EXE 44 PID 1396 wrote to memory of 288 1396 RUNDLL32.EXE 44 PID 1396 wrote to memory of 288 1396 RUNDLL32.EXE 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\baabe38154bc2271d603513346457154.exe"C:\Users\Admin\AppData\Local\Temp\baabe38154bc2271d603513346457154.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\BAABE3~1.DLL,s C:\Users\Admin\AppData\Local\Temp\BAABE3~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\BAABE3~1.DLL,dDBESGc=3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\BAABE3~1.DLL,VRFDelZCSQ==4⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 177105⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\ctfmon.exectfmon.exe6⤵PID:1868
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpD49C.tmp.ps1"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpE4D4.tmp.ps1"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost5⤵PID:1288
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask4⤵PID:1312
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask4⤵PID:288
-
-
-