Analysis

  • max time kernel
    77s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    22-10-2021 12:12

General

  • Target

    d9e365ef3c3b36a9974bf0b5c95d50188d0879849fb39bc3dc38fdda6ced9b8b.exe

  • Size

    1.2MB

  • MD5

    00c28e54775b45f20fddff77b1ded22c

  • SHA1

    f802027b030cc702464498dd28c58bfd61145a11

  • SHA256

    d9e365ef3c3b36a9974bf0b5c95d50188d0879849fb39bc3dc38fdda6ced9b8b

  • SHA512

    d0807f03ddfd6bca693fe3fc405e4a45cb86cab03dcff9b5dccf7401cab4236d29a8413c3c52e04e7adc06d30a5751d303eae25a888d5e14592a8fbd16795b8e

Malware Config

Extracted

Family

danabot

C2

192.119.110.73:443

192.236.147.159:443

192.210.222.88:443

Attributes
  • embedded_hash

    F4711E27D559B4AEB1A081A1EB0AC465

  • type

    loader

rsa_pubkey.plain
rsa_privkey.plain

Extracted

Family

danabot

Version

2052

Botnet

4

C2

192.119.110.73:443

192.236.147.159:443

192.210.222.88:443

Attributes
  • embedded_hash

    F4711E27D559B4AEB1A081A1EB0AC465

  • type

    main

rsa_privkey.plain
rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot Loader Component 6 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 40 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9e365ef3c3b36a9974bf0b5c95d50188d0879849fb39bc3dc38fdda6ced9b8b.exe
    "C:\Users\Admin\AppData\Local\Temp\d9e365ef3c3b36a9974bf0b5c95d50188d0879849fb39bc3dc38fdda6ced9b8b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3776
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\D9E365~1.DLL,s C:\Users\Admin\AppData\Local\Temp\D9E365~1.EXE
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1016
      • C:\Windows\SysWOW64\RUNDLL32.EXE
        C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\D9E365~1.DLL,PxQrQg==
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3664
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\D9E365~1.DLL
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2496
        • C:\Windows\SysWOW64\RUNDLL32.EXE
          C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\D9E365~1.DLL,WSYyOUV4NQ==
          4⤵
          • Loads dropped DLL
          • Checks processor information in registry
          PID:1844
          • C:\Windows\system32\rundll32.exe
            C:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 19638
            5⤵
              PID:3408
              • C:\Windows\system32\ctfmon.exe
                ctfmon.exe
                6⤵
                  PID:836
            • C:\Windows\SysWOW64\RUNDLL32.EXE
              C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\58cfb4a6.dll,Start
              4⤵
                PID:4040
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpC5B.tmp.ps1"
                4⤵
                  PID:3244
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp486C.tmp.ps1"
                  4⤵
                    PID:1528
                    • C:\Windows\SysWOW64\nslookup.exe
                      "C:\Windows\system32\nslookup.exe" -type=any localhost
                      5⤵
                        PID:756
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                      4⤵
                        PID:608
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                        4⤵
                          PID:1784
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 784
                        3⤵
                        • Suspicious use of NtCreateProcessExOtherParentProcess
                        • Program crash
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1736
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 556
                      2⤵
                      • Suspicious use of NtCreateProcessExOtherParentProcess
                      • Program crash
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3484

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Defense Evasion

                  Install Root Certificate

                  1
                  T1130

                  Modify Registry

                  1
                  T1112

                  Discovery

                  Query Registry

                  2
                  T1012

                  System Information Discovery

                  2
                  T1082

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\PROGRA~3\zohplghndapsm.tmp
                    MD5

                    ac9aa30f97cba656ecc798d1aead4410

                    SHA1

                    b220e54a401c1c1135ce0a8106c249a7b7a87c44

                    SHA256

                    de3d0be676bca261b2ce5691b55b444355dd3ba0dd7614f1dd4f2921656b24d8

                    SHA512

                    118a41f3c386a29c2833d717d7d3eeab8c1cf85b34c303dd31f5e461aa14edb0198d75329902864402621b7431dcada6d2ee999e7bb071042f13d45604614d59

                  • C:\PROGRA~3\zohplghndapsm.tmp
                    MD5

                    dba6627d6baef57ecacb08825d7ebba4

                    SHA1

                    05fd8900ac6a134ef8d306db20f670203190f176

                    SHA256

                    25ece705d860daba71a498a4662f9c76e696f4aaa31cceabe38bb94182ee3659

                    SHA512

                    3f0e251031a4569c8db687ab0803fe464ac42a83a578022d791774dd945d2a62c1e1f4d2298c9de80169ea8d7edd8bc57067fbfe202acd0fcf53488fb181a975

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
                    MD5

                    f7a808b5711f58fb4f85476c1bb24ac3

                    SHA1

                    fbdf9670d622e8fc3446ad4f53fbbd83016f03d1

                    SHA256

                    de4aadfe00c4cf41434a12450cdc69d37cb2d9cec951b074c3b5e7bfce9e94ec

                    SHA512

                    866848d13e999e6a1a79d77c33adb642d78d0a11adee293fca411b4ed5f7bf85324f90b3031148a66ac10dccc577d3c2a7c1ab6ed4237360de9911c27516a5af

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                    MD5

                    34cbce7a86066983ddec1c5c7316fa24

                    SHA1

                    a1135a1ddbfd3ae8079f7e449d7978fdb92f3bd9

                    SHA256

                    23bf6d99f757f6728c8c896676b0707e190e1acb80ec8758696fa3efa8d6cb42

                    SHA512

                    f6537a61341ef316200de61d4185d7fdf8169fa5f01446241d34dc74ffdf9edfd520c5d06d54c9df8a8d1eb0eeab53141d75c88f157b72cbcb6b7f0bdb84e769

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                    MD5

                    869286e754512d2c337a401a9133ecb9

                    SHA1

                    38295182c52a62349232828c7fa992c0d498b744

                    SHA256

                    a2020f717ddaf598871f6f0b6935e1b3344dc129dc5eeda0a210ee39d11bda1c

                    SHA512

                    6714fa0af23d3610c8ecdd17584062f5cc627946275a4e3d6b5653d9addcd36408099aea8047c4d61df07fe8bda327dd8a258cea882152f037305f014ac3743a

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                    MD5

                    2d47480d8a1ab4955f2304931619a07c

                    SHA1

                    4e96ffc8706b57ae6bb59f505219a2a7ade594d5

                    SHA256

                    d2ecc177c25f31804e91e1a6e81f4f2d3b0d83baec3e0a97857565ba0a6a054e

                    SHA512

                    c8971f4a1df261407558880be0157ebf5a8bc178b90c877c36abd2a69420e4a254c3034a03d9bb81756d58c2e55b526543d3c4d03cee3c7994090b635a8aa47d

                  • C:\Users\Admin\AppData\Local\Temp\58cfb4a6.dll
                    MD5

                    5951f0afa96cda14623b4cce74d58cca

                    SHA1

                    ad4a21bd28a3065037b1ea40fab4d7c4d7549fde

                    SHA256

                    8b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce

                    SHA512

                    b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071

                  • C:\Users\Admin\AppData\Local\Temp\D9E365~1.DLL
                    MD5

                    588015089510ceffde67534bcfc71925

                    SHA1

                    d3088b3f06e23db4a92f66501f923bea6e5d6188

                    SHA256

                    87099af73ffe4b39ad72f621c5e77690c2c145fa71e879679add1eb70d66782d

                    SHA512

                    4d8031a7f3c25fdb1e039eff98496e0aa5cdd76f74f342ba0b7cfef9ac555067a161b97ac85d243a056cbb71b5729e6e487ae127d806ef66c9ec7d343577338e

                  • C:\Users\Admin\AppData\Local\Temp\tmp486C.tmp.ps1
                    MD5

                    ed2a8107cda003c90330b6e8e1c9319b

                    SHA1

                    0c646aa9c71f32d896d9a38505ee3323176c6055

                    SHA256

                    da0360d6d64ce522e3dc02cef50f532a0ac28ee8d2ca2a9d09130e706cffb87a

                    SHA512

                    5ea2a33e25e958527ca3958d06ae6151d9a90eb78ea1a7201c0ca97f068b4f504ae64b4f2211dcf158b82aead3e7d81ec773edbdb65be5939c6645c101a694ef

                  • C:\Users\Admin\AppData\Local\Temp\tmp486D.tmp
                    MD5

                    1860260b2697808b80802352fe324782

                    SHA1

                    f07b4cb6a8133d8dd942fc285d63cb3ce5a1ed6b

                    SHA256

                    0c4bb6ae7726faa47aef8459bcf37bf9ca16f0b93fd52790932adaf7845d1fb1

                    SHA512

                    d9fd458e2fe871e93199d7f3783133ded898d824024d9525e8c9af2af31892b13f3fb147d3bfda7dfd7659b7072f5cd1d6c3ebfe2dbf5893afd00e59a96aa94f

                  • C:\Users\Admin\AppData\Local\Temp\tmpC5B.tmp.ps1
                    MD5

                    6b7c44cf95e53de4f5c741f9be48e50e

                    SHA1

                    4e4e57d422499a8707bbcc145880fac6c7d6c64d

                    SHA256

                    af1158fb5e7605ad219d4f3d21858008175e7e27bf709c67615929b1da9a7820

                    SHA512

                    3498c5007efed85e847e0f978de9213bf4c0f2c5699306610abd7d1b64d908a0dbb2df49048db5ba612a3d549b81ff995ad28cf79f1d243aa7d76485ac857b2e

                  • C:\Users\Admin\AppData\Local\Temp\tmpC5C.tmp
                    MD5

                    c416c12d1b2b1da8c8655e393b544362

                    SHA1

                    fb1a43cd8e1c556c2d25f361f42a21293c29e447

                    SHA256

                    0600d59103840dff210778179fdfba904dcb737a4bfdb35384608698c86ea046

                    SHA512

                    cb6d3636be4330aa2fd577c3636d0b7165f92ee817e98f21180ba0c918eb76f4e38f025086593a0e508234ca981cfec2c53482b0e9cc0acfa885fefbdf89913c

                  • \Users\Admin\AppData\Local\Temp\58cfb4a6.dll
                    MD5

                    5951f0afa96cda14623b4cce74d58cca

                    SHA1

                    ad4a21bd28a3065037b1ea40fab4d7c4d7549fde

                    SHA256

                    8b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce

                    SHA512

                    b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071

                  • \Users\Admin\AppData\Local\Temp\D9E365~1.DLL
                    MD5

                    588015089510ceffde67534bcfc71925

                    SHA1

                    d3088b3f06e23db4a92f66501f923bea6e5d6188

                    SHA256

                    87099af73ffe4b39ad72f621c5e77690c2c145fa71e879679add1eb70d66782d

                    SHA512

                    4d8031a7f3c25fdb1e039eff98496e0aa5cdd76f74f342ba0b7cfef9ac555067a161b97ac85d243a056cbb71b5729e6e487ae127d806ef66c9ec7d343577338e

                  • \Users\Admin\AppData\Local\Temp\D9E365~1.DLL
                    MD5

                    588015089510ceffde67534bcfc71925

                    SHA1

                    d3088b3f06e23db4a92f66501f923bea6e5d6188

                    SHA256

                    87099af73ffe4b39ad72f621c5e77690c2c145fa71e879679add1eb70d66782d

                    SHA512

                    4d8031a7f3c25fdb1e039eff98496e0aa5cdd76f74f342ba0b7cfef9ac555067a161b97ac85d243a056cbb71b5729e6e487ae127d806ef66c9ec7d343577338e

                  • \Users\Admin\AppData\Local\Temp\D9E365~1.DLL
                    MD5

                    588015089510ceffde67534bcfc71925

                    SHA1

                    d3088b3f06e23db4a92f66501f923bea6e5d6188

                    SHA256

                    87099af73ffe4b39ad72f621c5e77690c2c145fa71e879679add1eb70d66782d

                    SHA512

                    4d8031a7f3c25fdb1e039eff98496e0aa5cdd76f74f342ba0b7cfef9ac555067a161b97ac85d243a056cbb71b5729e6e487ae127d806ef66c9ec7d343577338e

                  • \Users\Admin\AppData\Local\Temp\D9E365~1.DLL
                    MD5

                    588015089510ceffde67534bcfc71925

                    SHA1

                    d3088b3f06e23db4a92f66501f923bea6e5d6188

                    SHA256

                    87099af73ffe4b39ad72f621c5e77690c2c145fa71e879679add1eb70d66782d

                    SHA512

                    4d8031a7f3c25fdb1e039eff98496e0aa5cdd76f74f342ba0b7cfef9ac555067a161b97ac85d243a056cbb71b5729e6e487ae127d806ef66c9ec7d343577338e

                  • memory/608-452-0x0000000000000000-mapping.dmp
                  • memory/756-449-0x0000000000000000-mapping.dmp
                  • memory/836-165-0x0000000000000000-mapping.dmp
                  • memory/1016-122-0x0000000000570000-0x0000000000571000-memory.dmp
                    Filesize

                    4KB

                  • memory/1016-121-0x0000000004A21000-0x0000000005A05000-memory.dmp
                    Filesize

                    15.9MB

                  • memory/1016-117-0x0000000000000000-mapping.dmp
                  • memory/1528-398-0x0000000004D52000-0x0000000004D53000-memory.dmp
                    Filesize

                    4KB

                  • memory/1528-397-0x0000000004D50000-0x0000000004D51000-memory.dmp
                    Filesize

                    4KB

                  • memory/1528-453-0x0000000004D53000-0x0000000004D54000-memory.dmp
                    Filesize

                    4KB

                  • memory/1528-379-0x0000000000000000-mapping.dmp
                  • memory/1784-454-0x0000000000000000-mapping.dmp
                  • memory/1844-153-0x0000000005890000-0x00000000059D0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1844-156-0x0000000005890000-0x00000000059D0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1844-133-0x0000000000000000-mapping.dmp
                  • memory/1844-136-0x0000000004100000-0x0000000004264000-memory.dmp
                    Filesize

                    1.4MB

                  • memory/1844-146-0x00000000059F0000-0x00000000059F1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1844-148-0x0000000005AD0000-0x0000000005AD1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1844-149-0x0000000005890000-0x00000000059D0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1844-150-0x0000000005890000-0x00000000059D0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1844-152-0x0000000005890000-0x00000000059D0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1844-144-0x00000000047E1000-0x00000000057C5000-memory.dmp
                    Filesize

                    15.9MB

                  • memory/1844-155-0x0000000005AE0000-0x0000000005AE1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1844-157-0x0000000005890000-0x00000000059D0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/2496-137-0x0000000004200000-0x0000000004201000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-145-0x0000000007290000-0x0000000007291000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-128-0x0000000000000000-mapping.dmp
                  • memory/2496-130-0x0000000000740000-0x0000000000741000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-129-0x0000000000740000-0x0000000000741000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-131-0x00000000040D0000-0x00000000040D1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-143-0x00000000075E0000-0x00000000075E1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-142-0x0000000007570000-0x0000000007571000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-141-0x0000000007320000-0x0000000007321000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-132-0x0000000006C20000-0x0000000006C21000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-147-0x0000000007DA0000-0x0000000007DA1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-168-0x0000000000740000-0x0000000000741000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-154-0x0000000007B90000-0x0000000007B91000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-139-0x0000000004202000-0x0000000004203000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-140-0x0000000006AA0000-0x0000000006AA1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-184-0x0000000008B80000-0x0000000008BB3000-memory.dmp
                    Filesize

                    204KB

                  • memory/2496-191-0x0000000008B40000-0x0000000008B41000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-196-0x0000000008CB0000-0x0000000008CB1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-213-0x0000000004203000-0x0000000004204000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-199-0x000000007F6D0000-0x000000007F6D1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2496-200-0x0000000008E80000-0x0000000008E81000-memory.dmp
                    Filesize

                    4KB

                  • memory/3244-198-0x00000000073B2000-0x00000000073B3000-memory.dmp
                    Filesize

                    4KB

                  • memory/3244-197-0x00000000073B0000-0x00000000073B1000-memory.dmp
                    Filesize

                    4KB

                  • memory/3244-172-0x0000000004DC0000-0x0000000004DC1000-memory.dmp
                    Filesize

                    4KB

                  • memory/3244-171-0x0000000004DC0000-0x0000000004DC1000-memory.dmp
                    Filesize

                    4KB

                  • memory/3244-284-0x00000000073B3000-0x00000000073B4000-memory.dmp
                    Filesize

                    4KB

                  • memory/3244-170-0x0000000000000000-mapping.dmp
                  • memory/3408-166-0x0000000000FA0000-0x0000000001140000-memory.dmp
                    Filesize

                    1.6MB

                  • memory/3408-167-0x000001A53E420000-0x000001A53E5D2000-memory.dmp
                    Filesize

                    1.7MB

                  • memory/3408-161-0x000001A53E120000-0x000001A53E122000-memory.dmp
                    Filesize

                    8KB

                  • memory/3408-160-0x000001A53E120000-0x000001A53E122000-memory.dmp
                    Filesize

                    8KB

                  • memory/3408-158-0x00007FF7FE9F5FD0-mapping.dmp
                  • memory/3664-127-0x0000000000570000-0x0000000000571000-memory.dmp
                    Filesize

                    4KB

                  • memory/3664-126-0x0000000005081000-0x0000000006065000-memory.dmp
                    Filesize

                    15.9MB

                  • memory/3664-123-0x0000000000000000-mapping.dmp
                  • memory/3776-115-0x0000000000E25000-0x0000000000F15000-memory.dmp
                    Filesize

                    960KB

                  • memory/3776-120-0x0000000000400000-0x0000000000966000-memory.dmp
                    Filesize

                    5.4MB

                  • memory/3776-116-0x0000000000FC0000-0x00000000010C7000-memory.dmp
                    Filesize

                    1.0MB

                  • memory/4040-162-0x0000000000000000-mapping.dmp