Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    11-12-2021 17:40

General

  • Target

    d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exe

  • Size

    5.3MB

  • MD5

    438392c9420a13ba91f1bf96c897dcf5

  • SHA1

    05daa3c541772e43f4bcc155dba6ce5cfcdf89ef

  • SHA256

    d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72

  • SHA512

    0bb4cfebe6232c9d00501080edd0b62d1beb00bdcb886425e72112c1b83c64d6bff08cc428e1133db15641c0e241cef74566e90c6ffece727a7c2f744d367e6a

Malware Config

Extracted

Family

danabot

C2

142.11.244.223:443

23.106.122.139:443

Attributes
  • embedded_hash

    0FA95F120D6EB149A5D48E36BC76879D

  • type

    loader

rsa_pubkey.plain
rsa_privkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 3 IoCs
  • Themida packer 18 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exe
    "C:\Users\Admin\AppData\Local\Temp\d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3828
    • C:\Users\Admin\AppData\Local\Temp\imphee\delawn.exe
      "C:\Users\Admin\AppData\Local\Temp\imphee\delawn.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4132
      • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
        "C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        PID:4352
    • C:\Users\Admin\AppData\Local\Temp\imphee\fashervp.exe
      "C:\Users\Admin\AppData\Local\Temp\imphee\fashervp.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Users\Admin\AppData\Local\Temp\qdjatrywa.exe
        "C:\Users\Admin\AppData\Local\Temp\qdjatrywa.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2152
        • C:\Windows\SysWOW64\rundll32.exe
          C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\QDJATR~1.DLL,s C:\Users\Admin\AppData\Local\Temp\QDJATR~1.EXE
          4⤵
          • Loads dropped DLL
          PID:2032
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\uahhurppng.vbs"
        3⤵
          PID:4320
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ogmaqlibc.vbs"
          3⤵
          • Blocklisted process makes network request
          PID:64

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

      MD5

      54e9306f95f32e50ccd58af19753d929

      SHA1

      eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

      SHA256

      45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

      SHA512

      8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

      MD5

      89c2690080c4e898c9b5d98d83206db2

      SHA1

      8eaa658af1a7cf32f086af903c1ac5a51366ccde

      SHA256

      557e26ff5d1d57db515f392ce3624455a8745aae86936dd7bd71d9c880247781

      SHA512

      80796a634e04ba9fd416356196585eb52fc4d1c88a9065aafef2ab3ccc86229dfb8df3479fe6418f37aa063e977d14434a91db0dc851638d09427e6192e31a7f

    • C:\Users\Admin\AppData\Local\Temp\QDJATR~1.DLL

      MD5

      0514d9edab1623a6da3269577527d5e3

      SHA1

      004a52233bfb1007e2686d57bc7a46f299f8ac3d

      SHA256

      891966865b53814ae2170eee1df4146767768915dca88338c70a8e2006c49275

      SHA512

      ca7bbb5ac556dac601c62c7221901249c1ee09e28d96f3040c6dd07a64f85daa0f545966aa9e1c2876c14757cf4bc3c474eaa14a530e9b513f8e66d7e10517ac

    • C:\Users\Admin\AppData\Local\Temp\imphee\delawn.exe

      MD5

      dfdbc43a1c08dc6894b2f4700ad5de8a

      SHA1

      17948bc723d8f505dca7b0d3dbec4ce733f38887

      SHA256

      f871b69ac0344fc9d444b40dfc81bbdb6a6610277b56799c4d0d2e2160fbdf2f

      SHA512

      d81d11efb53bb1282b355f2be3ef4e73d9a778e58f87461755875f58c209dbb39ea19d6f506b6df51e1bcb4d7ddf7ae1f9e7d7206d769de4d2326b7f362ce61d

    • C:\Users\Admin\AppData\Local\Temp\imphee\delawn.exe

      MD5

      dfdbc43a1c08dc6894b2f4700ad5de8a

      SHA1

      17948bc723d8f505dca7b0d3dbec4ce733f38887

      SHA256

      f871b69ac0344fc9d444b40dfc81bbdb6a6610277b56799c4d0d2e2160fbdf2f

      SHA512

      d81d11efb53bb1282b355f2be3ef4e73d9a778e58f87461755875f58c209dbb39ea19d6f506b6df51e1bcb4d7ddf7ae1f9e7d7206d769de4d2326b7f362ce61d

    • C:\Users\Admin\AppData\Local\Temp\imphee\fashervp.exe

      MD5

      51ed8f36933e365456cc894dc36f5d3c

      SHA1

      abea54b5c7be770be76a746a169064d840f17eb3

      SHA256

      6adbacce0d2732ec2feb14e707c9ee6975d5e0958065a7342e5645f80999cf65

      SHA512

      a8db66f854d9f889beb23494b70b9918c773d3d370afb561b6beecb6d1d11511b14d257877360517a68e02e78ee57aa76646ca3c23b261467d52b4488eb95894

    • C:\Users\Admin\AppData\Local\Temp\imphee\fashervp.exe

      MD5

      51ed8f36933e365456cc894dc36f5d3c

      SHA1

      abea54b5c7be770be76a746a169064d840f17eb3

      SHA256

      6adbacce0d2732ec2feb14e707c9ee6975d5e0958065a7342e5645f80999cf65

      SHA512

      a8db66f854d9f889beb23494b70b9918c773d3d370afb561b6beecb6d1d11511b14d257877360517a68e02e78ee57aa76646ca3c23b261467d52b4488eb95894

    • C:\Users\Admin\AppData\Local\Temp\ogmaqlibc.vbs

      MD5

      81a1419cf4ca6a596e7beb796e912d1d

      SHA1

      7ae5973f75828ab729d3cb90f31e9540381b421d

      SHA256

      07b5696be46bffe08c10cc30484f5d1e3cf3d1aa1429a825d897209112e7f0c6

      SHA512

      4769d96ccfbb0cece356cb6ec5b80c6d4b543291c92bfe0ecd2bfcfd4939dc3f16892bcc553d0bc867e4ebc070b30cd2180a8e0d949a156d5bbc73ba0362ac45

    • C:\Users\Admin\AppData\Local\Temp\qdjatrywa.exe

      MD5

      5490712918575c28330cfe2ec8d85ee9

      SHA1

      e753188062c36f4e84435c7cf4bd03f6deb3075d

      SHA256

      834aa075da9cef1fe7957c7fc02a9b9cbb84718aa2ea8e0ecf955a6078c9cfcd

      SHA512

      fce947aa3623285cfe2472e9e90a79b40123ccf4df85be24ff96e0edfa108519066c001f3f9684001bc56b2f3040a93ea2b7f7e025bb5254fe506bd2ac60b8cf

    • C:\Users\Admin\AppData\Local\Temp\qdjatrywa.exe

      MD5

      5490712918575c28330cfe2ec8d85ee9

      SHA1

      e753188062c36f4e84435c7cf4bd03f6deb3075d

      SHA256

      834aa075da9cef1fe7957c7fc02a9b9cbb84718aa2ea8e0ecf955a6078c9cfcd

      SHA512

      fce947aa3623285cfe2472e9e90a79b40123ccf4df85be24ff96e0edfa108519066c001f3f9684001bc56b2f3040a93ea2b7f7e025bb5254fe506bd2ac60b8cf

    • C:\Users\Admin\AppData\Local\Temp\uahhurppng.vbs

      MD5

      3ec03263a15bb31dac5f54c9aff6623e

      SHA1

      555c2871f6379615404325b47232cc4a50b705e6

      SHA256

      d37c28a948d85d92b2c52e5ed71b919fda53b9a7b10630932e9db7e9e7c70e54

      SHA512

      51c2b629c5c9d7a72667585f99fb718b9a6add7841f04cb875ad43a6f18d6ad8be2f16514f9389e8bbeab3fccf481e07edcfda03c6375e2d6b9f4330e2a9794b

    • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe

      MD5

      dfdbc43a1c08dc6894b2f4700ad5de8a

      SHA1

      17948bc723d8f505dca7b0d3dbec4ce733f38887

      SHA256

      f871b69ac0344fc9d444b40dfc81bbdb6a6610277b56799c4d0d2e2160fbdf2f

      SHA512

      d81d11efb53bb1282b355f2be3ef4e73d9a778e58f87461755875f58c209dbb39ea19d6f506b6df51e1bcb4d7ddf7ae1f9e7d7206d769de4d2326b7f362ce61d

    • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe

      MD5

      dfdbc43a1c08dc6894b2f4700ad5de8a

      SHA1

      17948bc723d8f505dca7b0d3dbec4ce733f38887

      SHA256

      f871b69ac0344fc9d444b40dfc81bbdb6a6610277b56799c4d0d2e2160fbdf2f

      SHA512

      d81d11efb53bb1282b355f2be3ef4e73d9a778e58f87461755875f58c209dbb39ea19d6f506b6df51e1bcb4d7ddf7ae1f9e7d7206d769de4d2326b7f362ce61d

    • \Users\Admin\AppData\Local\Temp\QDJATR~1.DLL

      MD5

      0514d9edab1623a6da3269577527d5e3

      SHA1

      004a52233bfb1007e2686d57bc7a46f299f8ac3d

      SHA256

      891966865b53814ae2170eee1df4146767768915dca88338c70a8e2006c49275

      SHA512

      ca7bbb5ac556dac601c62c7221901249c1ee09e28d96f3040c6dd07a64f85daa0f545966aa9e1c2876c14757cf4bc3c474eaa14a530e9b513f8e66d7e10517ac

    • \Users\Admin\AppData\Local\Temp\QDJATR~1.DLL

      MD5

      0514d9edab1623a6da3269577527d5e3

      SHA1

      004a52233bfb1007e2686d57bc7a46f299f8ac3d

      SHA256

      891966865b53814ae2170eee1df4146767768915dca88338c70a8e2006c49275

      SHA512

      ca7bbb5ac556dac601c62c7221901249c1ee09e28d96f3040c6dd07a64f85daa0f545966aa9e1c2876c14757cf4bc3c474eaa14a530e9b513f8e66d7e10517ac

    • \Users\Admin\AppData\Local\Temp\nsqACFB.tmp\UAC.dll

      MD5

      adb29e6b186daa765dc750128649b63d

      SHA1

      160cbdc4cb0ac2c142d361df138c537aa7e708c9

      SHA256

      2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

      SHA512

      b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

    • memory/64-148-0x0000000000000000-mapping.dmp

    • memory/2032-152-0x0000000000000000-mapping.dmp

    • memory/2032-156-0x0000000000DB0000-0x0000000001028000-memory.dmp

      Filesize

      2.5MB

    • memory/2152-146-0x0000000000D50000-0x0000000000EDC000-memory.dmp

      Filesize

      1.5MB

    • memory/2152-147-0x0000000000EE0000-0x0000000001082000-memory.dmp

      Filesize

      1.6MB

    • memory/2152-132-0x0000000000000000-mapping.dmp

    • memory/2152-145-0x0000000000400000-0x00000000009A2000-memory.dmp

      Filesize

      5.6MB

    • memory/3024-125-0x00000000000A0000-0x0000000000716000-memory.dmp

      Filesize

      6.5MB

    • memory/3024-128-0x00000000000A0000-0x0000000000716000-memory.dmp

      Filesize

      6.5MB

    • memory/3024-119-0x0000000000000000-mapping.dmp

    • memory/3024-124-0x00000000000A0000-0x0000000000716000-memory.dmp

      Filesize

      6.5MB

    • memory/3024-131-0x0000000076FF0000-0x000000007717E000-memory.dmp

      Filesize

      1.6MB

    • memory/3024-129-0x00000000000A0000-0x0000000000716000-memory.dmp

      Filesize

      6.5MB

    • memory/4132-116-0x0000000000000000-mapping.dmp

    • memory/4132-122-0x0000000001300000-0x00000000019E5000-memory.dmp

      Filesize

      6.9MB

    • memory/4132-123-0x0000000001300000-0x00000000019E5000-memory.dmp

      Filesize

      6.9MB

    • memory/4132-127-0x0000000001300000-0x00000000019E5000-memory.dmp

      Filesize

      6.9MB

    • memory/4132-130-0x0000000076FF0000-0x000000007717E000-memory.dmp

      Filesize

      1.6MB

    • memory/4132-126-0x0000000001300000-0x00000000019E5000-memory.dmp

      Filesize

      6.9MB

    • memory/4320-135-0x0000000000000000-mapping.dmp

    • memory/4352-142-0x0000000001340000-0x0000000001A25000-memory.dmp

      Filesize

      6.9MB

    • memory/4352-144-0x0000000001340000-0x0000000001A25000-memory.dmp

      Filesize

      6.9MB

    • memory/4352-137-0x0000000000000000-mapping.dmp

    • memory/4352-143-0x0000000076FF0000-0x000000007717E000-memory.dmp

      Filesize

      1.6MB

    • memory/4352-140-0x0000000001340000-0x0000000001A25000-memory.dmp

      Filesize

      6.9MB

    • memory/4352-141-0x0000000001340000-0x0000000001A25000-memory.dmp

      Filesize

      6.9MB