Analysis

  • max time kernel
    78s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    22-10-2021 06:51

General

  • Target

    80549941c4979de8b029f388d37ce857833ce85cc8fde669966a539d7d7e8c13.exe

  • Size

    1.2MB

  • MD5

    da16518340d8fcc553592896b5c5ff68

  • SHA1

    d6e3ac4f06d244f18a5ea603f3d8de5fd53dd355

  • SHA256

    80549941c4979de8b029f388d37ce857833ce85cc8fde669966a539d7d7e8c13

  • SHA512

    3d83033648d6eb6c7cd62b5c573d28e0424caf2f2c346e204c3f89a728a4cb797e8375093845f9df6e9a4381f935de7451e00125c905caa6d4ff65b317440dd3

Malware Config

Extracted

Family

danabot

C2

192.119.110.73:443

192.236.147.159:443

192.210.222.88:443

Attributes
  • embedded_hash

    F4711E27D559B4AEB1A081A1EB0AC465

  • type

    loader

rsa_pubkey.plain
rsa_privkey.plain

Extracted

Family

danabot

Version

2052

Botnet

4

C2

192.119.110.73:443

192.236.147.159:443

192.210.222.88:443

Attributes
  • embedded_hash

    F4711E27D559B4AEB1A081A1EB0AC465

  • type

    main

rsa_privkey.plain
rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot Loader Component 8 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 48 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80549941c4979de8b029f388d37ce857833ce85cc8fde669966a539d7d7e8c13.exe
    "C:\Users\Admin\AppData\Local\Temp\80549941c4979de8b029f388d37ce857833ce85cc8fde669966a539d7d7e8c13.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3760
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\805499~1.DLL,s C:\Users\Admin\AppData\Local\Temp\805499~1.EXE
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1872
      • C:\Windows\SysWOW64\RUNDLL32.EXE
        C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\805499~1.DLL,Thg2UU8=
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:964
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\805499~1.DLL
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1304
        • C:\Windows\SysWOW64\RUNDLL32.EXE
          C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\805499~1.DLL,UEQLWlZYa1E=
          4⤵
          • Loads dropped DLL
          • Checks processor information in registry
          PID:2140
          • C:\Windows\system32\rundll32.exe
            C:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 19638
            5⤵
              PID:2388
              • C:\Windows\system32\ctfmon.exe
                ctfmon.exe
                6⤵
                  PID:3992
            • C:\Windows\SysWOW64\RUNDLL32.EXE
              C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\58cfb4a6.dll,Start
              4⤵
                PID:2220
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp1053.tmp.ps1"
                4⤵
                  PID:752
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp4D7D.tmp.ps1"
                  4⤵
                    PID:1348
                    • C:\Windows\SysWOW64\nslookup.exe
                      "C:\Windows\system32\nslookup.exe" -type=any localhost
                      5⤵
                        PID:976
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                      4⤵
                        PID:4056
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                        4⤵
                          PID:3912
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 812
                        3⤵
                        • Suspicious use of NtCreateProcessExOtherParentProcess
                        • Program crash
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4064
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 580
                      2⤵
                      • Suspicious use of NtCreateProcessExOtherParentProcess
                      • Program crash
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:428

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Defense Evasion

                  Install Root Certificate

                  1
                  T1130

                  Modify Registry

                  1
                  T1112

                  Discovery

                  Query Registry

                  2
                  T1012

                  System Information Discovery

                  2
                  T1082

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\PROGRA~3\zohplghndapsm.tmp
                    MD5

                    ac9aa30f97cba656ecc798d1aead4410

                    SHA1

                    b220e54a401c1c1135ce0a8106c249a7b7a87c44

                    SHA256

                    de3d0be676bca261b2ce5691b55b444355dd3ba0dd7614f1dd4f2921656b24d8

                    SHA512

                    118a41f3c386a29c2833d717d7d3eeab8c1cf85b34c303dd31f5e461aa14edb0198d75329902864402621b7431dcada6d2ee999e7bb071042f13d45604614d59

                  • C:\PROGRA~3\zohplghndapsm.tmp
                    MD5

                    8e4b0de235c0fcccbd843f1c4cf74aff

                    SHA1

                    7fa2f2e00866eefb4ffb16543de3579947d26552

                    SHA256

                    7b6f7dc78d6b0d66962b503781b09c75f7ed71a459974695fcb88721232aaae1

                    SHA512

                    28a703eb246a895a3e64a67118b6db43edfea0d6e8f7ca916181ce678ee7b6fc8b746fefffcbeaacca299196ba4a7c016651ca1aa0deac7f3bd1ca2714fcae6a

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
                    MD5

                    f7a808b5711f58fb4f85476c1bb24ac3

                    SHA1

                    fbdf9670d622e8fc3446ad4f53fbbd83016f03d1

                    SHA256

                    de4aadfe00c4cf41434a12450cdc69d37cb2d9cec951b074c3b5e7bfce9e94ec

                    SHA512

                    866848d13e999e6a1a79d77c33adb642d78d0a11adee293fca411b4ed5f7bf85324f90b3031148a66ac10dccc577d3c2a7c1ab6ed4237360de9911c27516a5af

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                    MD5

                    fece5b2a3b23fad5b45339b7e8bf5fe9

                    SHA1

                    0a000b549dc90861720e495150e76cbba3f6c343

                    SHA256

                    36ca0c3632b7fa62ea6a2c927d3a0e2aabfa78eeef348bd62fc856cfd6c99596

                    SHA512

                    200a5fe3760f34f0ba207395acaa33943f1767da7077a92f079a9a5ac90425cb86786328256375a149b5a73f0a9a75dbeeca3747e520dc8aa1067a6dabe9bdca

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                    MD5

                    f8581de50ea9c185c0a33b16113c1f5f

                    SHA1

                    3133709325532de848a5a6cfd3fed99e0a479aa6

                    SHA256

                    97364d964b130379645fdf4a2420c41de7a3b8b36a70dbad76ef4b1638053cff

                    SHA512

                    cab43cb78c8784a7731fa5fc17df1262a309a6d5a051897d4891d59e055465872b221d55ebf84ebe2d69605a84cdb852f0b3ac305aa499fc83cc5905b9799415

                  • C:\Users\Admin\AppData\Local\Temp\58cfb4a6.dll
                    MD5

                    5951f0afa96cda14623b4cce74d58cca

                    SHA1

                    ad4a21bd28a3065037b1ea40fab4d7c4d7549fde

                    SHA256

                    8b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce

                    SHA512

                    b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071

                  • C:\Users\Admin\AppData\Local\Temp\805499~1.DLL
                    MD5

                    5b84d31e6060585536387e7a9b481b5d

                    SHA1

                    dbd13d59767486bb4ab724517ab44b3f8af221bc

                    SHA256

                    e1c7a5f04c9e80596c6260b6943240d96703af943997338b496bbb03bd833560

                    SHA512

                    09f61cb91f5292b942b281c8a1f6d93bb6168a26af95ecc16211f4ae7ac1a1eecc9418a744eae54de3a71727c25007427d8e8244c7a78a9ec08c9a5112e0d277

                  • C:\Users\Admin\AppData\Local\Temp\tmp1053.tmp.ps1
                    MD5

                    723fd017a5ecfbb69f4d8de5b86334a5

                    SHA1

                    81428602c582eda1c6a8a86e8fe778feb219eb37

                    SHA256

                    8003f4fdfcf72a3a6a8562b86cefa13132bafbe71d8f71bd9f618c044e213f9b

                    SHA512

                    4c7c1bdbb7ce80df37220b24dc3ca95322505d800c3558bc66d68527f90d83b0f9be2c08dd2cac0a7b510f50ff5c23079c932dfad49040055dffcb56b201ccf9

                  • C:\Users\Admin\AppData\Local\Temp\tmp1054.tmp
                    MD5

                    c416c12d1b2b1da8c8655e393b544362

                    SHA1

                    fb1a43cd8e1c556c2d25f361f42a21293c29e447

                    SHA256

                    0600d59103840dff210778179fdfba904dcb737a4bfdb35384608698c86ea046

                    SHA512

                    cb6d3636be4330aa2fd577c3636d0b7165f92ee817e98f21180ba0c918eb76f4e38f025086593a0e508234ca981cfec2c53482b0e9cc0acfa885fefbdf89913c

                  • C:\Users\Admin\AppData\Local\Temp\tmp4D7D.tmp.ps1
                    MD5

                    e7e243de2597aa33baf53d18168a076c

                    SHA1

                    bb68b261be3be296cd9677d2686171f0d7ccfdcd

                    SHA256

                    f149c919762e3f7687c99ac65b771ff1d25b2c82e8f40be55c3579e1b231f3a6

                    SHA512

                    7855c2928bd2649ca0a80d74dc90b6f621f6bd0b4857f8f24e38f4a2e9264b715559670fb503e1ad28c8a36407d9bfa8cccdd6bd841f42167df6db9d3aa48575

                  • C:\Users\Admin\AppData\Local\Temp\tmp4DCC.tmp
                    MD5

                    1860260b2697808b80802352fe324782

                    SHA1

                    f07b4cb6a8133d8dd942fc285d63cb3ce5a1ed6b

                    SHA256

                    0c4bb6ae7726faa47aef8459bcf37bf9ca16f0b93fd52790932adaf7845d1fb1

                    SHA512

                    d9fd458e2fe871e93199d7f3783133ded898d824024d9525e8c9af2af31892b13f3fb147d3bfda7dfd7659b7072f5cd1d6c3ebfe2dbf5893afd00e59a96aa94f

                  • \Users\Admin\AppData\Local\Temp\58cfb4a6.dll
                    MD5

                    5951f0afa96cda14623b4cce74d58cca

                    SHA1

                    ad4a21bd28a3065037b1ea40fab4d7c4d7549fde

                    SHA256

                    8b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce

                    SHA512

                    b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071

                  • \Users\Admin\AppData\Local\Temp\805499~1.DLL
                    MD5

                    5b84d31e6060585536387e7a9b481b5d

                    SHA1

                    dbd13d59767486bb4ab724517ab44b3f8af221bc

                    SHA256

                    e1c7a5f04c9e80596c6260b6943240d96703af943997338b496bbb03bd833560

                    SHA512

                    09f61cb91f5292b942b281c8a1f6d93bb6168a26af95ecc16211f4ae7ac1a1eecc9418a744eae54de3a71727c25007427d8e8244c7a78a9ec08c9a5112e0d277

                  • \Users\Admin\AppData\Local\Temp\805499~1.DLL
                    MD5

                    5b84d31e6060585536387e7a9b481b5d

                    SHA1

                    dbd13d59767486bb4ab724517ab44b3f8af221bc

                    SHA256

                    e1c7a5f04c9e80596c6260b6943240d96703af943997338b496bbb03bd833560

                    SHA512

                    09f61cb91f5292b942b281c8a1f6d93bb6168a26af95ecc16211f4ae7ac1a1eecc9418a744eae54de3a71727c25007427d8e8244c7a78a9ec08c9a5112e0d277

                  • \Users\Admin\AppData\Local\Temp\805499~1.DLL
                    MD5

                    5b84d31e6060585536387e7a9b481b5d

                    SHA1

                    dbd13d59767486bb4ab724517ab44b3f8af221bc

                    SHA256

                    e1c7a5f04c9e80596c6260b6943240d96703af943997338b496bbb03bd833560

                    SHA512

                    09f61cb91f5292b942b281c8a1f6d93bb6168a26af95ecc16211f4ae7ac1a1eecc9418a744eae54de3a71727c25007427d8e8244c7a78a9ec08c9a5112e0d277

                  • \Users\Admin\AppData\Local\Temp\805499~1.DLL
                    MD5

                    5b84d31e6060585536387e7a9b481b5d

                    SHA1

                    dbd13d59767486bb4ab724517ab44b3f8af221bc

                    SHA256

                    e1c7a5f04c9e80596c6260b6943240d96703af943997338b496bbb03bd833560

                    SHA512

                    09f61cb91f5292b942b281c8a1f6d93bb6168a26af95ecc16211f4ae7ac1a1eecc9418a744eae54de3a71727c25007427d8e8244c7a78a9ec08c9a5112e0d277

                  • \Users\Admin\AppData\Local\Temp\805499~1.DLL
                    MD5

                    5b84d31e6060585536387e7a9b481b5d

                    SHA1

                    dbd13d59767486bb4ab724517ab44b3f8af221bc

                    SHA256

                    e1c7a5f04c9e80596c6260b6943240d96703af943997338b496bbb03bd833560

                    SHA512

                    09f61cb91f5292b942b281c8a1f6d93bb6168a26af95ecc16211f4ae7ac1a1eecc9418a744eae54de3a71727c25007427d8e8244c7a78a9ec08c9a5112e0d277

                  • memory/752-202-0x0000000004F52000-0x0000000004F53000-memory.dmp
                    Filesize

                    4KB

                  • memory/752-180-0x0000000004F50000-0x0000000004F51000-memory.dmp
                    Filesize

                    4KB

                  • memory/752-178-0x0000000004E30000-0x0000000004E31000-memory.dmp
                    Filesize

                    4KB

                  • memory/752-288-0x0000000004F53000-0x0000000004F54000-memory.dmp
                    Filesize

                    4KB

                  • memory/752-177-0x0000000004E30000-0x0000000004E31000-memory.dmp
                    Filesize

                    4KB

                  • memory/752-176-0x0000000000000000-mapping.dmp
                  • memory/964-125-0x0000000000000000-mapping.dmp
                  • memory/964-129-0x0000000000570000-0x0000000000571000-memory.dmp
                    Filesize

                    4KB

                  • memory/964-128-0x0000000004A61000-0x0000000005A45000-memory.dmp
                    Filesize

                    15.9MB

                  • memory/976-454-0x0000000000000000-mapping.dmp
                  • memory/1304-198-0x0000000006E80000-0x0000000006E81000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-130-0x0000000000000000-mapping.dmp
                  • memory/1304-146-0x0000000007C50000-0x0000000007C51000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-144-0x0000000007AE0000-0x0000000007AE1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-143-0x00000000072E0000-0x00000000072E1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-131-0x0000000002EE0000-0x0000000002EE1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-213-0x0000000004983000-0x0000000004984000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-132-0x0000000002EE0000-0x0000000002EE1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-208-0x00000000095A0000-0x00000000095A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-157-0x00000000079E0000-0x00000000079E1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-205-0x0000000009410000-0x0000000009411000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-158-0x00000000084D0000-0x00000000084D1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-133-0x00000000047A0000-0x00000000047A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-204-0x000000007E3C0000-0x000000007E3C1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-191-0x0000000009080000-0x00000000090B3000-memory.dmp
                    Filesize

                    204KB

                  • memory/1304-134-0x0000000007360000-0x0000000007361000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-139-0x0000000004980000-0x0000000004981000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-174-0x0000000002EE0000-0x0000000002EE1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-169-0x00000000082D0000-0x00000000082D1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-141-0x0000000004982000-0x0000000004983000-memory.dmp
                    Filesize

                    4KB

                  • memory/1304-142-0x0000000007140000-0x0000000007141000-memory.dmp
                    Filesize

                    4KB

                  • memory/1348-362-0x0000000000000000-mapping.dmp
                  • memory/1348-458-0x0000000006A63000-0x0000000006A64000-memory.dmp
                    Filesize

                    4KB

                  • memory/1348-381-0x0000000006A60000-0x0000000006A61000-memory.dmp
                    Filesize

                    4KB

                  • memory/1348-383-0x0000000006A62000-0x0000000006A63000-memory.dmp
                    Filesize

                    4KB

                  • memory/1872-118-0x0000000000000000-mapping.dmp
                  • memory/1872-122-0x0000000004160000-0x00000000042C4000-memory.dmp
                    Filesize

                    1.4MB

                  • memory/1872-123-0x0000000004981000-0x0000000005965000-memory.dmp
                    Filesize

                    15.9MB

                  • memory/1872-124-0x00000000042D0000-0x00000000042D1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2140-135-0x0000000000000000-mapping.dmp
                  • memory/2140-145-0x0000000004901000-0x00000000058E5000-memory.dmp
                    Filesize

                    15.9MB

                  • memory/2140-161-0x00000000059B0000-0x0000000005AF0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/2140-138-0x0000000004290000-0x00000000043F4000-memory.dmp
                    Filesize

                    1.4MB

                  • memory/2140-160-0x0000000005C10000-0x0000000005C11000-memory.dmp
                    Filesize

                    4KB

                  • memory/2140-159-0x00000000059B0000-0x0000000005AF0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/2140-156-0x00000000059B0000-0x0000000005AF0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/2140-154-0x00000000059B0000-0x0000000005AF0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/2140-153-0x00000000059B0000-0x0000000005AF0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/2140-152-0x0000000005C00000-0x0000000005C01000-memory.dmp
                    Filesize

                    4KB

                  • memory/2140-147-0x0000000005B10000-0x0000000005B11000-memory.dmp
                    Filesize

                    4KB

                  • memory/2140-162-0x00000000059B0000-0x0000000005AF0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/2220-166-0x0000000000000000-mapping.dmp
                  • memory/2388-163-0x00007FF760925FD0-mapping.dmp
                  • memory/2388-167-0x000002C05DFC0000-0x000002C05DFC2000-memory.dmp
                    Filesize

                    8KB

                  • memory/2388-172-0x0000000000F10000-0x00000000010B0000-memory.dmp
                    Filesize

                    1.6MB

                  • memory/2388-173-0x000002C05E3A0000-0x000002C05E552000-memory.dmp
                    Filesize

                    1.7MB

                  • memory/2388-165-0x000002C05DFC0000-0x000002C05DFC2000-memory.dmp
                    Filesize

                    8KB

                  • memory/3760-115-0x0000000001035000-0x0000000001125000-memory.dmp
                    Filesize

                    960KB

                  • memory/3760-117-0x0000000000400000-0x0000000000957000-memory.dmp
                    Filesize

                    5.3MB

                  • memory/3760-116-0x0000000001130000-0x0000000001237000-memory.dmp
                    Filesize

                    1.0MB

                  • memory/3912-459-0x0000000000000000-mapping.dmp
                  • memory/3992-171-0x0000000000000000-mapping.dmp
                  • memory/4056-457-0x0000000000000000-mapping.dmp