Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
11-12-2021 17:40
Static task
static1
General
-
Target
d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exe
-
Size
5.3MB
-
MD5
438392c9420a13ba91f1bf96c897dcf5
-
SHA1
05daa3c541772e43f4bcc155dba6ce5cfcdf89ef
-
SHA256
d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72
-
SHA512
0bb4cfebe6232c9d00501080edd0b62d1beb00bdcb886425e72112c1b83c64d6bff08cc428e1133db15641c0e241cef74566e90c6ffece727a7c2f744d367e6a
Malware Config
Extracted
danabot
142.11.244.223:443
23.106.122.139:443
-
embedded_hash
0FA95F120D6EB149A5D48E36BC76879D
-
type
loader
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 1 IoCs
Processes:
WScript.exeflow pid process 34 64 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
delawn.exefashervp.exeqdjatrywa.exeDpEditor.exepid process 4132 delawn.exe 3024 fashervp.exe 2152 qdjatrywa.exe 4352 DpEditor.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
delawn.exefashervp.exeDpEditor.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion delawn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fashervp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fashervp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion delawn.exe -
Loads dropped DLL 3 IoCs
Processes:
d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exerundll32.exepid process 3828 d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exe 2032 rundll32.exe 2032 rundll32.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\imphee\delawn.exe themida C:\Users\Admin\AppData\Local\Temp\imphee\delawn.exe themida C:\Users\Admin\AppData\Local\Temp\imphee\fashervp.exe themida C:\Users\Admin\AppData\Local\Temp\imphee\fashervp.exe themida behavioral1/memory/4132-122-0x0000000001300000-0x00000000019E5000-memory.dmp themida behavioral1/memory/3024-124-0x00000000000A0000-0x0000000000716000-memory.dmp themida behavioral1/memory/4132-123-0x0000000001300000-0x00000000019E5000-memory.dmp themida behavioral1/memory/3024-125-0x00000000000A0000-0x0000000000716000-memory.dmp themida behavioral1/memory/4132-127-0x0000000001300000-0x00000000019E5000-memory.dmp themida behavioral1/memory/3024-128-0x00000000000A0000-0x0000000000716000-memory.dmp themida behavioral1/memory/4132-126-0x0000000001300000-0x00000000019E5000-memory.dmp themida behavioral1/memory/3024-129-0x00000000000A0000-0x0000000000716000-memory.dmp themida C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida behavioral1/memory/4352-141-0x0000000001340000-0x0000000001A25000-memory.dmp themida behavioral1/memory/4352-140-0x0000000001340000-0x0000000001A25000-memory.dmp themida behavioral1/memory/4352-144-0x0000000001340000-0x0000000001A25000-memory.dmp themida behavioral1/memory/4352-142-0x0000000001340000-0x0000000001A25000-memory.dmp themida -
Processes:
DpEditor.exedelawn.exefashervp.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DpEditor.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA delawn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fashervp.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 10 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
delawn.exefashervp.exeDpEditor.exepid process 4132 delawn.exe 3024 fashervp.exe 4352 DpEditor.exe -
Drops file in Program Files directory 3 IoCs
Processes:
d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exedescription ioc process File created C:\Program Files (x86)\foler\olader\acppage.dll d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exe File created C:\Program Files (x86)\foler\olader\acledit.dll d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
fashervp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 fashervp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString fashervp.exe -
Modifies registry class 1 IoCs
Processes:
fashervp.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings fashervp.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
DpEditor.exepid process 4352 DpEditor.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
fashervp.exedelawn.exeDpEditor.exepid process 3024 fashervp.exe 3024 fashervp.exe 4132 delawn.exe 4132 delawn.exe 4352 DpEditor.exe 4352 DpEditor.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exefashervp.exedelawn.exeqdjatrywa.exedescription pid process target process PID 3828 wrote to memory of 4132 3828 d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exe delawn.exe PID 3828 wrote to memory of 4132 3828 d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exe delawn.exe PID 3828 wrote to memory of 4132 3828 d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exe delawn.exe PID 3828 wrote to memory of 3024 3828 d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exe fashervp.exe PID 3828 wrote to memory of 3024 3828 d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exe fashervp.exe PID 3828 wrote to memory of 3024 3828 d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exe fashervp.exe PID 3024 wrote to memory of 2152 3024 fashervp.exe qdjatrywa.exe PID 3024 wrote to memory of 2152 3024 fashervp.exe qdjatrywa.exe PID 3024 wrote to memory of 2152 3024 fashervp.exe qdjatrywa.exe PID 3024 wrote to memory of 4320 3024 fashervp.exe WScript.exe PID 3024 wrote to memory of 4320 3024 fashervp.exe WScript.exe PID 3024 wrote to memory of 4320 3024 fashervp.exe WScript.exe PID 4132 wrote to memory of 4352 4132 delawn.exe DpEditor.exe PID 4132 wrote to memory of 4352 4132 delawn.exe DpEditor.exe PID 4132 wrote to memory of 4352 4132 delawn.exe DpEditor.exe PID 3024 wrote to memory of 64 3024 fashervp.exe WScript.exe PID 3024 wrote to memory of 64 3024 fashervp.exe WScript.exe PID 3024 wrote to memory of 64 3024 fashervp.exe WScript.exe PID 2152 wrote to memory of 2032 2152 qdjatrywa.exe rundll32.exe PID 2152 wrote to memory of 2032 2152 qdjatrywa.exe rundll32.exe PID 2152 wrote to memory of 2032 2152 qdjatrywa.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exe"C:\Users\Admin\AppData\Local\Temp\d3e59dc676e16119abad9021b3db7f5df9f7e9eebb6a0a5a7b0295e46a3a6b72.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\imphee\delawn.exe"C:\Users\Admin\AppData\Local\Temp\imphee\delawn.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
-
-
C:\Users\Admin\AppData\Local\Temp\imphee\fashervp.exe"C:\Users\Admin\AppData\Local\Temp\imphee\fashervp.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\qdjatrywa.exe"C:\Users\Admin\AppData\Local\Temp\qdjatrywa.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\QDJATR~1.DLL,s C:\Users\Admin\AppData\Local\Temp\QDJATR~1.EXE4⤵
- Loads dropped DLL
PID:2032
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\uahhurppng.vbs"3⤵PID:4320
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ogmaqlibc.vbs"3⤵
- Blocklisted process makes network request
PID:64
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
MD589c2690080c4e898c9b5d98d83206db2
SHA18eaa658af1a7cf32f086af903c1ac5a51366ccde
SHA256557e26ff5d1d57db515f392ce3624455a8745aae86936dd7bd71d9c880247781
SHA51280796a634e04ba9fd416356196585eb52fc4d1c88a9065aafef2ab3ccc86229dfb8df3479fe6418f37aa063e977d14434a91db0dc851638d09427e6192e31a7f
-
MD5
0514d9edab1623a6da3269577527d5e3
SHA1004a52233bfb1007e2686d57bc7a46f299f8ac3d
SHA256891966865b53814ae2170eee1df4146767768915dca88338c70a8e2006c49275
SHA512ca7bbb5ac556dac601c62c7221901249c1ee09e28d96f3040c6dd07a64f85daa0f545966aa9e1c2876c14757cf4bc3c474eaa14a530e9b513f8e66d7e10517ac
-
MD5
dfdbc43a1c08dc6894b2f4700ad5de8a
SHA117948bc723d8f505dca7b0d3dbec4ce733f38887
SHA256f871b69ac0344fc9d444b40dfc81bbdb6a6610277b56799c4d0d2e2160fbdf2f
SHA512d81d11efb53bb1282b355f2be3ef4e73d9a778e58f87461755875f58c209dbb39ea19d6f506b6df51e1bcb4d7ddf7ae1f9e7d7206d769de4d2326b7f362ce61d
-
MD5
dfdbc43a1c08dc6894b2f4700ad5de8a
SHA117948bc723d8f505dca7b0d3dbec4ce733f38887
SHA256f871b69ac0344fc9d444b40dfc81bbdb6a6610277b56799c4d0d2e2160fbdf2f
SHA512d81d11efb53bb1282b355f2be3ef4e73d9a778e58f87461755875f58c209dbb39ea19d6f506b6df51e1bcb4d7ddf7ae1f9e7d7206d769de4d2326b7f362ce61d
-
MD5
51ed8f36933e365456cc894dc36f5d3c
SHA1abea54b5c7be770be76a746a169064d840f17eb3
SHA2566adbacce0d2732ec2feb14e707c9ee6975d5e0958065a7342e5645f80999cf65
SHA512a8db66f854d9f889beb23494b70b9918c773d3d370afb561b6beecb6d1d11511b14d257877360517a68e02e78ee57aa76646ca3c23b261467d52b4488eb95894
-
MD5
51ed8f36933e365456cc894dc36f5d3c
SHA1abea54b5c7be770be76a746a169064d840f17eb3
SHA2566adbacce0d2732ec2feb14e707c9ee6975d5e0958065a7342e5645f80999cf65
SHA512a8db66f854d9f889beb23494b70b9918c773d3d370afb561b6beecb6d1d11511b14d257877360517a68e02e78ee57aa76646ca3c23b261467d52b4488eb95894
-
MD5
81a1419cf4ca6a596e7beb796e912d1d
SHA17ae5973f75828ab729d3cb90f31e9540381b421d
SHA25607b5696be46bffe08c10cc30484f5d1e3cf3d1aa1429a825d897209112e7f0c6
SHA5124769d96ccfbb0cece356cb6ec5b80c6d4b543291c92bfe0ecd2bfcfd4939dc3f16892bcc553d0bc867e4ebc070b30cd2180a8e0d949a156d5bbc73ba0362ac45
-
MD5
5490712918575c28330cfe2ec8d85ee9
SHA1e753188062c36f4e84435c7cf4bd03f6deb3075d
SHA256834aa075da9cef1fe7957c7fc02a9b9cbb84718aa2ea8e0ecf955a6078c9cfcd
SHA512fce947aa3623285cfe2472e9e90a79b40123ccf4df85be24ff96e0edfa108519066c001f3f9684001bc56b2f3040a93ea2b7f7e025bb5254fe506bd2ac60b8cf
-
MD5
5490712918575c28330cfe2ec8d85ee9
SHA1e753188062c36f4e84435c7cf4bd03f6deb3075d
SHA256834aa075da9cef1fe7957c7fc02a9b9cbb84718aa2ea8e0ecf955a6078c9cfcd
SHA512fce947aa3623285cfe2472e9e90a79b40123ccf4df85be24ff96e0edfa108519066c001f3f9684001bc56b2f3040a93ea2b7f7e025bb5254fe506bd2ac60b8cf
-
MD5
3ec03263a15bb31dac5f54c9aff6623e
SHA1555c2871f6379615404325b47232cc4a50b705e6
SHA256d37c28a948d85d92b2c52e5ed71b919fda53b9a7b10630932e9db7e9e7c70e54
SHA51251c2b629c5c9d7a72667585f99fb718b9a6add7841f04cb875ad43a6f18d6ad8be2f16514f9389e8bbeab3fccf481e07edcfda03c6375e2d6b9f4330e2a9794b
-
MD5
dfdbc43a1c08dc6894b2f4700ad5de8a
SHA117948bc723d8f505dca7b0d3dbec4ce733f38887
SHA256f871b69ac0344fc9d444b40dfc81bbdb6a6610277b56799c4d0d2e2160fbdf2f
SHA512d81d11efb53bb1282b355f2be3ef4e73d9a778e58f87461755875f58c209dbb39ea19d6f506b6df51e1bcb4d7ddf7ae1f9e7d7206d769de4d2326b7f362ce61d
-
MD5
dfdbc43a1c08dc6894b2f4700ad5de8a
SHA117948bc723d8f505dca7b0d3dbec4ce733f38887
SHA256f871b69ac0344fc9d444b40dfc81bbdb6a6610277b56799c4d0d2e2160fbdf2f
SHA512d81d11efb53bb1282b355f2be3ef4e73d9a778e58f87461755875f58c209dbb39ea19d6f506b6df51e1bcb4d7ddf7ae1f9e7d7206d769de4d2326b7f362ce61d
-
MD5
0514d9edab1623a6da3269577527d5e3
SHA1004a52233bfb1007e2686d57bc7a46f299f8ac3d
SHA256891966865b53814ae2170eee1df4146767768915dca88338c70a8e2006c49275
SHA512ca7bbb5ac556dac601c62c7221901249c1ee09e28d96f3040c6dd07a64f85daa0f545966aa9e1c2876c14757cf4bc3c474eaa14a530e9b513f8e66d7e10517ac
-
MD5
0514d9edab1623a6da3269577527d5e3
SHA1004a52233bfb1007e2686d57bc7a46f299f8ac3d
SHA256891966865b53814ae2170eee1df4146767768915dca88338c70a8e2006c49275
SHA512ca7bbb5ac556dac601c62c7221901249c1ee09e28d96f3040c6dd07a64f85daa0f545966aa9e1c2876c14757cf4bc3c474eaa14a530e9b513f8e66d7e10517ac
-
MD5
adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada