Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
15-12-2021 12:09
Static task
static1
General
-
Target
3836136ddb7cfa2fc48e44c6b385da79df47380445f4c4fdaf552cf0aeb09816.exe
-
Size
5.3MB
-
MD5
d2872894b340230e9ba247da3a53000f
-
SHA1
d5b1d7352f2fdd7dcd64a525002a67fe7752ac43
-
SHA256
3836136ddb7cfa2fc48e44c6b385da79df47380445f4c4fdaf552cf0aeb09816
-
SHA512
73e009a03ebdcf7ca3284b0484bed6999679a355a10e28c7b606c66df7e950f91d688f247bb5d4b94ac94f999e9d7b41d8a5d771ba3cd6cce67a75f83dc6713e
Malware Config
Extracted
danabot
142.11.244.223:443
23.106.122.139:443
-
embedded_hash
0FA95F120D6EB149A5D48E36BC76879D
-
type
loader
Signatures
-
Danabot Loader Component 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\FWYUOH~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\FWYUOH~1.DLL DanabotLoader2021 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 1 IoCs
Processes:
WScript.exeflow pid process 30 1184 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
oxgoad.exepalmusvp.exefwyuohoecg.exeDpEditor.exepid process 2124 oxgoad.exe 4496 palmusvp.exe 4632 fwyuohoecg.exe 4728 DpEditor.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
DpEditor.exeoxgoad.exepalmusvp.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oxgoad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oxgoad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion palmusvp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion palmusvp.exe -
Loads dropped DLL 2 IoCs
Processes:
3836136ddb7cfa2fc48e44c6b385da79df47380445f4c4fdaf552cf0aeb09816.exerundll32.exepid process 4160 3836136ddb7cfa2fc48e44c6b385da79df47380445f4c4fdaf552cf0aeb09816.exe 4572 rundll32.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\kulmet\oxgoad.exe themida C:\Users\Admin\AppData\Local\Temp\kulmet\oxgoad.exe themida C:\Users\Admin\AppData\Local\Temp\kulmet\palmusvp.exe themida C:\Users\Admin\AppData\Local\Temp\kulmet\palmusvp.exe themida behavioral1/memory/2124-125-0x00000000009F0000-0x00000000010E0000-memory.dmp themida behavioral1/memory/4496-124-0x0000000000B10000-0x0000000001183000-memory.dmp themida behavioral1/memory/4496-123-0x0000000000B10000-0x0000000001183000-memory.dmp themida behavioral1/memory/2124-122-0x00000000009F0000-0x00000000010E0000-memory.dmp themida behavioral1/memory/4496-126-0x0000000000B10000-0x0000000001183000-memory.dmp themida behavioral1/memory/2124-127-0x00000000009F0000-0x00000000010E0000-memory.dmp themida behavioral1/memory/4496-128-0x0000000000B10000-0x0000000001183000-memory.dmp themida behavioral1/memory/2124-129-0x00000000009F0000-0x00000000010E0000-memory.dmp themida C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida behavioral1/memory/4728-141-0x0000000000880000-0x0000000000F70000-memory.dmp themida behavioral1/memory/4728-142-0x0000000000880000-0x0000000000F70000-memory.dmp themida behavioral1/memory/4728-144-0x0000000000880000-0x0000000000F70000-memory.dmp themida behavioral1/memory/4728-143-0x0000000000880000-0x0000000000F70000-memory.dmp themida -
Processes:
oxgoad.exepalmusvp.exeDpEditor.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oxgoad.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA palmusvp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DpEditor.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
oxgoad.exepalmusvp.exeDpEditor.exepid process 2124 oxgoad.exe 4496 palmusvp.exe 4728 DpEditor.exe -
Drops file in Program Files directory 3 IoCs
Processes:
3836136ddb7cfa2fc48e44c6b385da79df47380445f4c4fdaf552cf0aeb09816.exedescription ioc process File created C:\Program Files (x86)\foler\olader\acppage.dll 3836136ddb7cfa2fc48e44c6b385da79df47380445f4c4fdaf552cf0aeb09816.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll 3836136ddb7cfa2fc48e44c6b385da79df47380445f4c4fdaf552cf0aeb09816.exe File created C:\Program Files (x86)\foler\olader\acledit.dll 3836136ddb7cfa2fc48e44c6b385da79df47380445f4c4fdaf552cf0aeb09816.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
palmusvp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 palmusvp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString palmusvp.exe -
Modifies registry class 1 IoCs
Processes:
palmusvp.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings palmusvp.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
DpEditor.exepid process 4728 DpEditor.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
oxgoad.exepalmusvp.exeDpEditor.exepid process 2124 oxgoad.exe 2124 oxgoad.exe 4496 palmusvp.exe 4496 palmusvp.exe 4728 DpEditor.exe 4728 DpEditor.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
3836136ddb7cfa2fc48e44c6b385da79df47380445f4c4fdaf552cf0aeb09816.exepalmusvp.exeoxgoad.exefwyuohoecg.exedescription pid process target process PID 4160 wrote to memory of 2124 4160 3836136ddb7cfa2fc48e44c6b385da79df47380445f4c4fdaf552cf0aeb09816.exe oxgoad.exe PID 4160 wrote to memory of 2124 4160 3836136ddb7cfa2fc48e44c6b385da79df47380445f4c4fdaf552cf0aeb09816.exe oxgoad.exe PID 4160 wrote to memory of 2124 4160 3836136ddb7cfa2fc48e44c6b385da79df47380445f4c4fdaf552cf0aeb09816.exe oxgoad.exe PID 4160 wrote to memory of 4496 4160 3836136ddb7cfa2fc48e44c6b385da79df47380445f4c4fdaf552cf0aeb09816.exe palmusvp.exe PID 4160 wrote to memory of 4496 4160 3836136ddb7cfa2fc48e44c6b385da79df47380445f4c4fdaf552cf0aeb09816.exe palmusvp.exe PID 4160 wrote to memory of 4496 4160 3836136ddb7cfa2fc48e44c6b385da79df47380445f4c4fdaf552cf0aeb09816.exe palmusvp.exe PID 4496 wrote to memory of 4632 4496 palmusvp.exe fwyuohoecg.exe PID 4496 wrote to memory of 4632 4496 palmusvp.exe fwyuohoecg.exe PID 4496 wrote to memory of 4632 4496 palmusvp.exe fwyuohoecg.exe PID 4496 wrote to memory of 4432 4496 palmusvp.exe WScript.exe PID 4496 wrote to memory of 4432 4496 palmusvp.exe WScript.exe PID 4496 wrote to memory of 4432 4496 palmusvp.exe WScript.exe PID 2124 wrote to memory of 4728 2124 oxgoad.exe DpEditor.exe PID 2124 wrote to memory of 4728 2124 oxgoad.exe DpEditor.exe PID 2124 wrote to memory of 4728 2124 oxgoad.exe DpEditor.exe PID 4496 wrote to memory of 1184 4496 palmusvp.exe WScript.exe PID 4496 wrote to memory of 1184 4496 palmusvp.exe WScript.exe PID 4496 wrote to memory of 1184 4496 palmusvp.exe WScript.exe PID 4632 wrote to memory of 4572 4632 fwyuohoecg.exe rundll32.exe PID 4632 wrote to memory of 4572 4632 fwyuohoecg.exe rundll32.exe PID 4632 wrote to memory of 4572 4632 fwyuohoecg.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3836136ddb7cfa2fc48e44c6b385da79df47380445f4c4fdaf552cf0aeb09816.exe"C:\Users\Admin\AppData\Local\Temp\3836136ddb7cfa2fc48e44c6b385da79df47380445f4c4fdaf552cf0aeb09816.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\kulmet\oxgoad.exe"C:\Users\Admin\AppData\Local\Temp\kulmet\oxgoad.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
-
C:\Users\Admin\AppData\Local\Temp\kulmet\palmusvp.exe"C:\Users\Admin\AppData\Local\Temp\kulmet\palmusvp.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\fwyuohoecg.exe"C:\Users\Admin\AppData\Local\Temp\fwyuohoecg.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\FWYUOH~1.DLL,s C:\Users\Admin\AppData\Local\Temp\FWYUOH~1.EXE4⤵
- Loads dropped DLL
PID:4572
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ctiohbvmss.vbs"3⤵PID:4432
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\kwvcfdsj.vbs"3⤵
- Blocklisted process makes network request
PID:1184
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
MD5d324502b59492b8e1cddb3fef6ade430
SHA11ca1c0827fd464b0ae54d317812396e4fcacc89e
SHA256455022193f536554b9ed4ab5113e1aed61ae4c5a233b8fdd59b363a6d44e4f80
SHA512773580c547aecf1ad94941c23dac45720b242e0ed1107f8afbdf176ccbbee10ab6766cc7e72bd47eeba7e6963b4793b1691419dab542e0592b3d90b43660481d
-
MD5
c55bfb96231c31e46d49029068f5038f
SHA12a3328965ea6377462263965adeb61ff16ab97c0
SHA2561751f2d23fb9b7ea68edaaeae2f438cfb4f1cb6829da82f6073f9560c623d855
SHA5127d7d3f4fbc9184bc5f3a02b73b90ac328e6ad184b2fedd3a999e15607da6c6df08a34c74083dcd71c39e0262ede4c24ea05550b71a2c4f39312b60ba728fc431
-
MD5
76cd25d10c3b5fdff6e6897ba3e0a70c
SHA19c9c8348bb0eb70eea289b70c7154743817d29b7
SHA25694386bbd487b507ce3693399a2d0462a12cdb2f80e997f07b28e54cab210118f
SHA5129b1de286d4d653560cc06aa2063a42e9fd577189605483d0ab3a5995b5a48fed5965e05e1660908b348e198858bd5c1783c0e056ddb0a5e7fd221159b1367246
-
MD5
5b8ac949b8ed84ffc199b163e9824d2a
SHA102ed6b7fbe9ab4001c3361089f51dc5beb838d5e
SHA2569886aec9e4d28d17934672e6c595c95514647deaf54fbf19429cfaa143939a35
SHA51280025a2551fa67b5ee10bdfb152233a2371e5c769be0065f591c9fce9917bc78425aecac116aa498fbb136998f0fc9251d9773e7c83f51f91235dd2b2ae80005
-
MD5
5b8ac949b8ed84ffc199b163e9824d2a
SHA102ed6b7fbe9ab4001c3361089f51dc5beb838d5e
SHA2569886aec9e4d28d17934672e6c595c95514647deaf54fbf19429cfaa143939a35
SHA51280025a2551fa67b5ee10bdfb152233a2371e5c769be0065f591c9fce9917bc78425aecac116aa498fbb136998f0fc9251d9773e7c83f51f91235dd2b2ae80005
-
MD5
210f32668620f31c7f8645ac36d3bfdf
SHA120b4712c32a298b4ba1b4ed750c4ae587b9ebb1d
SHA256bef4ff4a6039e3e73e38656a8fcbcd3d0af53ef920863b94054ba395e9650dd8
SHA512000ec58065f7d32cb1047e5817460ae2d094b82d1b9d7819b1b927952c7b8506a7fea3e5489f9ced8c03bfd88340f7837061df477e02479a6ed6851f74ee1107
-
MD5
210f32668620f31c7f8645ac36d3bfdf
SHA120b4712c32a298b4ba1b4ed750c4ae587b9ebb1d
SHA256bef4ff4a6039e3e73e38656a8fcbcd3d0af53ef920863b94054ba395e9650dd8
SHA512000ec58065f7d32cb1047e5817460ae2d094b82d1b9d7819b1b927952c7b8506a7fea3e5489f9ced8c03bfd88340f7837061df477e02479a6ed6851f74ee1107
-
MD5
7968fcafa0046836bc8020b9a73ca29a
SHA11e64e12ec518d19cc5da20bd94d636cd80afbd5e
SHA256d89835afecbfe85d8a8c3f330e77199319a423038b018e1b89d04b1d2fb99fa4
SHA51225923712606f9c7a3aaee429d6e05b225ff3d1211870fcc60dda500b0238a280363f528224ab2cfd05ee2e28cb1ed56763f7b7a97f7bf0ee37d5ca074ff0404c
-
MD5
7968fcafa0046836bc8020b9a73ca29a
SHA11e64e12ec518d19cc5da20bd94d636cd80afbd5e
SHA256d89835afecbfe85d8a8c3f330e77199319a423038b018e1b89d04b1d2fb99fa4
SHA51225923712606f9c7a3aaee429d6e05b225ff3d1211870fcc60dda500b0238a280363f528224ab2cfd05ee2e28cb1ed56763f7b7a97f7bf0ee37d5ca074ff0404c
-
MD5
487bb48ddd1a790a0d32fd8307738333
SHA199b70a66b5be449c2406462bb5a64c96a0bbe31c
SHA25664e262a8c40a6215f054f817fe2b0d51031a41996d5c9ffeef64ddfb6fe5c2cc
SHA512a2bacbaab81bf7718509ec26b4bf1ad6f98c52a9a572e212c68c6b3548d1ef457d6d8b6aec742c71c032018e3578c1be35799c98524579f65bb761f8bed85623
-
MD5
210f32668620f31c7f8645ac36d3bfdf
SHA120b4712c32a298b4ba1b4ed750c4ae587b9ebb1d
SHA256bef4ff4a6039e3e73e38656a8fcbcd3d0af53ef920863b94054ba395e9650dd8
SHA512000ec58065f7d32cb1047e5817460ae2d094b82d1b9d7819b1b927952c7b8506a7fea3e5489f9ced8c03bfd88340f7837061df477e02479a6ed6851f74ee1107
-
MD5
210f32668620f31c7f8645ac36d3bfdf
SHA120b4712c32a298b4ba1b4ed750c4ae587b9ebb1d
SHA256bef4ff4a6039e3e73e38656a8fcbcd3d0af53ef920863b94054ba395e9650dd8
SHA512000ec58065f7d32cb1047e5817460ae2d094b82d1b9d7819b1b927952c7b8506a7fea3e5489f9ced8c03bfd88340f7837061df477e02479a6ed6851f74ee1107
-
MD5
c55bfb96231c31e46d49029068f5038f
SHA12a3328965ea6377462263965adeb61ff16ab97c0
SHA2561751f2d23fb9b7ea68edaaeae2f438cfb4f1cb6829da82f6073f9560c623d855
SHA5127d7d3f4fbc9184bc5f3a02b73b90ac328e6ad184b2fedd3a999e15607da6c6df08a34c74083dcd71c39e0262ede4c24ea05550b71a2c4f39312b60ba728fc431
-
MD5
adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada