Analysis

  • max time kernel
    90s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    22-10-2021 10:12

General

  • Target

    0b24b06fc8dd46d543cd12f15e182884.exe

  • Size

    1.2MB

  • MD5

    0b24b06fc8dd46d543cd12f15e182884

  • SHA1

    c4e01c51b4f17c644e85d308fcde80ac0d8f971b

  • SHA256

    c0c908fdb5c67cd4ab56ab911320adaf68e4bc9a230a4a04eaf2cf6ae92443f4

  • SHA512

    7b32e2f2dacbe5eda936e1780ec68646bc004b0110f66ffa47e2d7fe57e967c022ea8071cfcfd63be500069c4c6da95077273baf5e308091a8bce7c16df88ff4

Malware Config

Extracted

Family

danabot

C2

192.119.110.73:443

192.236.147.159:443

192.210.222.88:443

Attributes
  • embedded_hash

    F4711E27D559B4AEB1A081A1EB0AC465

  • type

    loader

rsa_pubkey.plain
rsa_privkey.plain

Extracted

Family

danabot

Version

2052

Botnet

4

C2

192.119.110.73:443

192.236.147.159:443

192.210.222.88:443

Attributes
  • embedded_hash

    F4711E27D559B4AEB1A081A1EB0AC465

  • type

    main

rsa_privkey.plain
rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot Loader Component 16 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 16 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Checks processor information in registry 2 TTPs 39 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b24b06fc8dd46d543cd12f15e182884.exe
    "C:\Users\Admin\AppData\Local\Temp\0b24b06fc8dd46d543cd12f15e182884.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\0B24B0~1.DLL,s C:\Users\Admin\AppData\Local\Temp\0B24B0~1.EXE
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Windows\SysWOW64\RUNDLL32.EXE
        C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\0B24B0~1.DLL,KggicTdx
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1228
        • C:\Windows\SysWOW64\RUNDLL32.EXE
          C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\0B24B0~1.DLL,dmEUa1BRWEhL
          4⤵
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1908
          • C:\Windows\system32\rundll32.exe
            C:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 17739
            5⤵
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:680
            • C:\Windows\system32\ctfmon.exe
              ctfmon.exe
              6⤵
                PID:2040
          • C:\Windows\SysWOW64\RUNDLL32.EXE
            C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\58cfb4a6.dll,Start
            4⤵
            • Loads dropped DLL
            PID:1264
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp4412.tmp.ps1"
            4⤵
              PID:744

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Install Root Certificate

      1
      T1130

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\PROGRA~3\zohplghndapsm.tmp
        MD5

        ac9aa30f97cba656ecc798d1aead4410

        SHA1

        b220e54a401c1c1135ce0a8106c249a7b7a87c44

        SHA256

        de3d0be676bca261b2ce5691b55b444355dd3ba0dd7614f1dd4f2921656b24d8

        SHA512

        118a41f3c386a29c2833d717d7d3eeab8c1cf85b34c303dd31f5e461aa14edb0198d75329902864402621b7431dcada6d2ee999e7bb071042f13d45604614d59

      • C:\PROGRA~3\zohplghndapsm.tmp
        MD5

        b71fc5ea23f992987999e349193f5b0a

        SHA1

        8b61e302fda370e6964567396d7b4a054d379269

        SHA256

        d550514d410d303df4ae7d9d2c3ef852100198c7a505964e18e16435cc1a0fdb

        SHA512

        6626821d384501eb5aae6cfeab12cf64237d8ce548d3b7ec9779545551c278522764a9ccf6e647e3240ad2220e7f944118a2ab06ed6c24bbb6da3a393266b181

      • C:\Users\Admin\AppData\Local\Temp\0B24B0~1.DLL
        MD5

        68a47996e47dc69b8858435fc0291478

        SHA1

        8e1f7e5411b7dc02c0c11982647bafc4aeb105e1

        SHA256

        9111403f65a5331cba94fdbb217331f590a1be3b2eb351c37eac092bda102493

        SHA512

        94ec1a6fecaf19cb15318d4ed11fed887a5b4c0defe5b28b69854e3513c92db7979b2b185cb58f4a321f111fbca5694690b48f2cad9ac35c399dbabb7d675dfe

      • C:\Users\Admin\AppData\Local\Temp\58cfb4a6.dll
        MD5

        5951f0afa96cda14623b4cce74d58cca

        SHA1

        ad4a21bd28a3065037b1ea40fab4d7c4d7549fde

        SHA256

        8b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce

        SHA512

        b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071

      • C:\Users\Admin\AppData\Local\Temp\tmp4412.tmp.ps1
        MD5

        6f8e45ccae864f1e50beb63f56ec2a0e

        SHA1

        75c94532a76d0db1f457c5cf2819ef97090b2d24

        SHA256

        8c1264a89b6cfdce6f5c681d9b91f4c0c4fd66f0e8cac4296c3a916e7717283e

        SHA512

        f9eea69e65675b8baeb8494405075a31179e928c31c3124573e0e3640766657d4574ba2609ab605746887acc8c7d6a3bdf5cc50c9fe5a8e0ba2d086a3cfa1e4f

      • \Users\Admin\AppData\Local\Temp\0B24B0~1.DLL
        MD5

        68a47996e47dc69b8858435fc0291478

        SHA1

        8e1f7e5411b7dc02c0c11982647bafc4aeb105e1

        SHA256

        9111403f65a5331cba94fdbb217331f590a1be3b2eb351c37eac092bda102493

        SHA512

        94ec1a6fecaf19cb15318d4ed11fed887a5b4c0defe5b28b69854e3513c92db7979b2b185cb58f4a321f111fbca5694690b48f2cad9ac35c399dbabb7d675dfe

      • \Users\Admin\AppData\Local\Temp\0B24B0~1.DLL
        MD5

        68a47996e47dc69b8858435fc0291478

        SHA1

        8e1f7e5411b7dc02c0c11982647bafc4aeb105e1

        SHA256

        9111403f65a5331cba94fdbb217331f590a1be3b2eb351c37eac092bda102493

        SHA512

        94ec1a6fecaf19cb15318d4ed11fed887a5b4c0defe5b28b69854e3513c92db7979b2b185cb58f4a321f111fbca5694690b48f2cad9ac35c399dbabb7d675dfe

      • \Users\Admin\AppData\Local\Temp\0B24B0~1.DLL
        MD5

        68a47996e47dc69b8858435fc0291478

        SHA1

        8e1f7e5411b7dc02c0c11982647bafc4aeb105e1

        SHA256

        9111403f65a5331cba94fdbb217331f590a1be3b2eb351c37eac092bda102493

        SHA512

        94ec1a6fecaf19cb15318d4ed11fed887a5b4c0defe5b28b69854e3513c92db7979b2b185cb58f4a321f111fbca5694690b48f2cad9ac35c399dbabb7d675dfe

      • \Users\Admin\AppData\Local\Temp\0B24B0~1.DLL
        MD5

        68a47996e47dc69b8858435fc0291478

        SHA1

        8e1f7e5411b7dc02c0c11982647bafc4aeb105e1

        SHA256

        9111403f65a5331cba94fdbb217331f590a1be3b2eb351c37eac092bda102493

        SHA512

        94ec1a6fecaf19cb15318d4ed11fed887a5b4c0defe5b28b69854e3513c92db7979b2b185cb58f4a321f111fbca5694690b48f2cad9ac35c399dbabb7d675dfe

      • \Users\Admin\AppData\Local\Temp\0B24B0~1.DLL
        MD5

        68a47996e47dc69b8858435fc0291478

        SHA1

        8e1f7e5411b7dc02c0c11982647bafc4aeb105e1

        SHA256

        9111403f65a5331cba94fdbb217331f590a1be3b2eb351c37eac092bda102493

        SHA512

        94ec1a6fecaf19cb15318d4ed11fed887a5b4c0defe5b28b69854e3513c92db7979b2b185cb58f4a321f111fbca5694690b48f2cad9ac35c399dbabb7d675dfe

      • \Users\Admin\AppData\Local\Temp\0B24B0~1.DLL
        MD5

        68a47996e47dc69b8858435fc0291478

        SHA1

        8e1f7e5411b7dc02c0c11982647bafc4aeb105e1

        SHA256

        9111403f65a5331cba94fdbb217331f590a1be3b2eb351c37eac092bda102493

        SHA512

        94ec1a6fecaf19cb15318d4ed11fed887a5b4c0defe5b28b69854e3513c92db7979b2b185cb58f4a321f111fbca5694690b48f2cad9ac35c399dbabb7d675dfe

      • \Users\Admin\AppData\Local\Temp\0B24B0~1.DLL
        MD5

        68a47996e47dc69b8858435fc0291478

        SHA1

        8e1f7e5411b7dc02c0c11982647bafc4aeb105e1

        SHA256

        9111403f65a5331cba94fdbb217331f590a1be3b2eb351c37eac092bda102493

        SHA512

        94ec1a6fecaf19cb15318d4ed11fed887a5b4c0defe5b28b69854e3513c92db7979b2b185cb58f4a321f111fbca5694690b48f2cad9ac35c399dbabb7d675dfe

      • \Users\Admin\AppData\Local\Temp\0B24B0~1.DLL
        MD5

        68a47996e47dc69b8858435fc0291478

        SHA1

        8e1f7e5411b7dc02c0c11982647bafc4aeb105e1

        SHA256

        9111403f65a5331cba94fdbb217331f590a1be3b2eb351c37eac092bda102493

        SHA512

        94ec1a6fecaf19cb15318d4ed11fed887a5b4c0defe5b28b69854e3513c92db7979b2b185cb58f4a321f111fbca5694690b48f2cad9ac35c399dbabb7d675dfe

      • \Users\Admin\AppData\Local\Temp\0B24B0~1.DLL
        MD5

        68a47996e47dc69b8858435fc0291478

        SHA1

        8e1f7e5411b7dc02c0c11982647bafc4aeb105e1

        SHA256

        9111403f65a5331cba94fdbb217331f590a1be3b2eb351c37eac092bda102493

        SHA512

        94ec1a6fecaf19cb15318d4ed11fed887a5b4c0defe5b28b69854e3513c92db7979b2b185cb58f4a321f111fbca5694690b48f2cad9ac35c399dbabb7d675dfe

      • \Users\Admin\AppData\Local\Temp\0B24B0~1.DLL
        MD5

        68a47996e47dc69b8858435fc0291478

        SHA1

        8e1f7e5411b7dc02c0c11982647bafc4aeb105e1

        SHA256

        9111403f65a5331cba94fdbb217331f590a1be3b2eb351c37eac092bda102493

        SHA512

        94ec1a6fecaf19cb15318d4ed11fed887a5b4c0defe5b28b69854e3513c92db7979b2b185cb58f4a321f111fbca5694690b48f2cad9ac35c399dbabb7d675dfe

      • \Users\Admin\AppData\Local\Temp\0B24B0~1.DLL
        MD5

        68a47996e47dc69b8858435fc0291478

        SHA1

        8e1f7e5411b7dc02c0c11982647bafc4aeb105e1

        SHA256

        9111403f65a5331cba94fdbb217331f590a1be3b2eb351c37eac092bda102493

        SHA512

        94ec1a6fecaf19cb15318d4ed11fed887a5b4c0defe5b28b69854e3513c92db7979b2b185cb58f4a321f111fbca5694690b48f2cad9ac35c399dbabb7d675dfe

      • \Users\Admin\AppData\Local\Temp\0B24B0~1.DLL
        MD5

        68a47996e47dc69b8858435fc0291478

        SHA1

        8e1f7e5411b7dc02c0c11982647bafc4aeb105e1

        SHA256

        9111403f65a5331cba94fdbb217331f590a1be3b2eb351c37eac092bda102493

        SHA512

        94ec1a6fecaf19cb15318d4ed11fed887a5b4c0defe5b28b69854e3513c92db7979b2b185cb58f4a321f111fbca5694690b48f2cad9ac35c399dbabb7d675dfe

      • \Users\Admin\AppData\Local\Temp\58cfb4a6.dll
        MD5

        5951f0afa96cda14623b4cce74d58cca

        SHA1

        ad4a21bd28a3065037b1ea40fab4d7c4d7549fde

        SHA256

        8b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce

        SHA512

        b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071

      • \Users\Admin\AppData\Local\Temp\58cfb4a6.dll
        MD5

        5951f0afa96cda14623b4cce74d58cca

        SHA1

        ad4a21bd28a3065037b1ea40fab4d7c4d7549fde

        SHA256

        8b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce

        SHA512

        b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071

      • \Users\Admin\AppData\Local\Temp\58cfb4a6.dll
        MD5

        5951f0afa96cda14623b4cce74d58cca

        SHA1

        ad4a21bd28a3065037b1ea40fab4d7c4d7549fde

        SHA256

        8b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce

        SHA512

        b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071

      • \Users\Admin\AppData\Local\Temp\58cfb4a6.dll
        MD5

        5951f0afa96cda14623b4cce74d58cca

        SHA1

        ad4a21bd28a3065037b1ea40fab4d7c4d7549fde

        SHA256

        8b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce

        SHA512

        b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071

      • memory/680-94-0x0000000000130000-0x00000000002D0000-memory.dmp
        Filesize

        1.6MB

      • memory/680-113-0x0000000001C80000-0x0000000001E32000-memory.dmp
        Filesize

        1.7MB

      • memory/680-101-0x00000000FFB83CEC-mapping.dmp
      • memory/680-109-0x000007FEFC461000-0x000007FEFC463000-memory.dmp
        Filesize

        8KB

      • memory/680-111-0x0000000000130000-0x00000000002D0000-memory.dmp
        Filesize

        1.6MB

      • memory/744-115-0x0000000000000000-mapping.dmp
      • memory/744-119-0x0000000002412000-0x0000000002414000-memory.dmp
        Filesize

        8KB

      • memory/744-118-0x0000000002411000-0x0000000002412000-memory.dmp
        Filesize

        4KB

      • memory/744-117-0x0000000002410000-0x0000000002411000-memory.dmp
        Filesize

        4KB

      • memory/752-55-0x0000000000970000-0x0000000000A60000-memory.dmp
        Filesize

        960KB

      • memory/752-58-0x0000000076241000-0x0000000076243000-memory.dmp
        Filesize

        8KB

      • memory/752-57-0x0000000000400000-0x0000000000966000-memory.dmp
        Filesize

        5.4MB

      • memory/752-56-0x0000000000C20000-0x0000000000D27000-memory.dmp
        Filesize

        1.0MB

      • memory/1228-69-0x0000000000000000-mapping.dmp
      • memory/1228-110-0x0000000000200000-0x000000000020D000-memory.dmp
        Filesize

        52KB

      • memory/1228-77-0x0000000002421000-0x0000000003405000-memory.dmp
        Filesize

        15.9MB

      • memory/1228-114-0x0000000000210000-0x0000000000239000-memory.dmp
        Filesize

        164KB

      • memory/1228-78-0x00000000020F0000-0x00000000020F1000-memory.dmp
        Filesize

        4KB

      • memory/1228-75-0x0000000001C80000-0x0000000001DE4000-memory.dmp
        Filesize

        1.4MB

      • memory/1264-98-0x0000000000000000-mapping.dmp
      • memory/1364-59-0x0000000000000000-mapping.dmp
      • memory/1364-68-0x00000000003B0000-0x00000000003B1000-memory.dmp
        Filesize

        4KB

      • memory/1364-66-0x0000000000240000-0x00000000003A4000-memory.dmp
        Filesize

        1.4MB

      • memory/1364-67-0x0000000002521000-0x0000000003505000-memory.dmp
        Filesize

        15.9MB

      • memory/1908-89-0x00000000001B0000-0x00000000001B1000-memory.dmp
        Filesize

        4KB

      • memory/1908-99-0x00000000034E0000-0x0000000003620000-memory.dmp
        Filesize

        1.2MB

      • memory/1908-97-0x00000000034E0000-0x0000000003620000-memory.dmp
        Filesize

        1.2MB

      • memory/1908-96-0x00000000001C0000-0x00000000001C1000-memory.dmp
        Filesize

        4KB

      • memory/1908-95-0x00000000034E0000-0x0000000003620000-memory.dmp
        Filesize

        1.2MB

      • memory/1908-93-0x00000000034E0000-0x0000000003620000-memory.dmp
        Filesize

        1.2MB

      • memory/1908-90-0x00000000034E0000-0x0000000003620000-memory.dmp
        Filesize

        1.2MB

      • memory/1908-91-0x00000000034E0000-0x0000000003620000-memory.dmp
        Filesize

        1.2MB

      • memory/1908-79-0x0000000000000000-mapping.dmp
      • memory/1908-88-0x00000000020D0000-0x00000000020D1000-memory.dmp
        Filesize

        4KB

      • memory/1908-87-0x00000000024F1000-0x00000000034D5000-memory.dmp
        Filesize

        15.9MB

      • memory/1908-85-0x0000000001DA0000-0x0000000001F04000-memory.dmp
        Filesize

        1.4MB

      • memory/2040-112-0x0000000000000000-mapping.dmp