Analysis

  • max time kernel
    118s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    18-12-2021 10:56

General

  • Target

    1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exe

  • Size

    5.6MB

  • MD5

    b07af9e0cae7f5541c447749a0ac2bfb

  • SHA1

    5420cdb06b2482f38c63ddf85ca65a4f836c2c42

  • SHA256

    1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e

  • SHA512

    26b9dbf93f9bf554e34e86391b3a8c78da25d678d9b9e583f7a77d503da241974320722bfbd948abe640678aa9aaa643acbea471d5e1eb9ab7b1e406ce680a2c

Malware Config

Extracted

Family

danabot

Botnet

4

C2

142.11.244.223:443

23.106.122.139:443

Attributes
  • embedded_hash

    0FA95F120D6EB149A5D48E36BC76879D

  • type

    loader

rsa_pubkey.plain
rsa_privkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot Loader Component 4 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 3 IoCs
  • Themida packer 18 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exe
    "C:\Users\Admin\AppData\Local\Temp\1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3596
    • C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exe
      "C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
        "C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        PID:1900
    • C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exe
      "C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Users\Admin\AppData\Local\Temp\ugvvljoyxs.exe
        "C:\Users\Admin\AppData\Local\Temp\ugvvljoyxs.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1540
        • C:\Windows\SysWOW64\rundll32.exe
          C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\UGVVLJ~1.DLL,s C:\Users\Admin\AppData\Local\Temp\UGVVLJ~1.EXE
          4⤵
          • Loads dropped DLL
          PID:1560
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cagdoybtci.vbs"
        3⤵
          PID:784
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\jvnpuom.vbs"
          3⤵
          • Blocklisted process makes network request
          PID:3732

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Virtualization/Sandbox Evasion

    1
    T1497

    Discovery

    Query Registry

    3
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    4
    T1082

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
      MD5

      54e9306f95f32e50ccd58af19753d929

      SHA1

      eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

      SHA256

      45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

      SHA512

      8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
      MD5

      9d147215f2df893fd0944e95316d1a4b

      SHA1

      825c7b234842a50bfbd9a6527741a59217338ccf

      SHA256

      98275871a91d373a72a9c75fb4f76b76889d688f59eebad132709d3f9942fe58

      SHA512

      40b2222d8e3fdc447bd030591c3fc1666783df8c3cdea92e9671b4dfa7523f35ee010e72d31c3ba4b009c6ab6ffba4251ab5bb46b622e604fd02370eb8039d97

    • C:\Users\Admin\AppData\Local\Temp\UGVVLJ~1.DLL
      MD5

      bacce6ed0bab72761fa4e784e93a4365

      SHA1

      2d70de082c81fd35d711843a0e754be978f0e76e

      SHA256

      75591b9b3b4936cacc0a92dab7ba9a7ed24c0952691684483f119c116d66c0a7

      SHA512

      6c72b1753029f0fafb0971f5e66da5e41ec99da02e3f186730dc1b3d497423b0d92674d52da7f9755b9c1db3a31f284392bf0c97497edbd4a3cf02710288323a

    • C:\Users\Admin\AppData\Local\Temp\cagdoybtci.vbs
      MD5

      15d3fc522e4abdd8826e8c4a7d227dc6

      SHA1

      d96edba11924115087225a00aca8b9f16cfc9b0c

      SHA256

      42bb99525f3df7a8cf3efd458da4bc8323826a304a807161d0eb5ce60ef6d877

      SHA512

      ea4039f563a86ef76fc56bd2028898fde313d3a0f6206e1f6d5080667b35d4ad0cd959fe45224317afb32854a6e5ed75adda1906e237390586f5e338f4c71946

    • C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exe
      MD5

      8d013018cbd8e2de770f984633ad3dc2

      SHA1

      c435e2fddeb819dca3fbbac84dfbffdc9f134b40

      SHA256

      bd5ed485d3189ff442bea4067aedf80ee9264f701f57ee0c3db346df334fcbb3

      SHA512

      c7f21a018c569c6cc29b7c128e6c9ef500a3e6383fff14921335d265f5174e34374ae7aef964fd3979384d32991c69b422bcb748183d07aab41b41abc2228c15

    • C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exe
      MD5

      8d013018cbd8e2de770f984633ad3dc2

      SHA1

      c435e2fddeb819dca3fbbac84dfbffdc9f134b40

      SHA256

      bd5ed485d3189ff442bea4067aedf80ee9264f701f57ee0c3db346df334fcbb3

      SHA512

      c7f21a018c569c6cc29b7c128e6c9ef500a3e6383fff14921335d265f5174e34374ae7aef964fd3979384d32991c69b422bcb748183d07aab41b41abc2228c15

    • C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exe
      MD5

      60a8d5c07264b9058c28548dc18feafe

      SHA1

      e60f40321f2f194e2f2d2d860e11f2c6959e30b3

      SHA256

      528049ab9e8f2ce40419e1ded49dcfd676d65b4b744dbe2490cf1254bfe236ba

      SHA512

      e2ae2e8c00bf3c3d26fa26c0d0c35afd5375edbf90a442fb51f3f5b5bbd9e8c01bc158a19d512430d0be411295dc4489995e42b6af3f19baea1d90b1e6a38903

    • C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exe
      MD5

      60a8d5c07264b9058c28548dc18feafe

      SHA1

      e60f40321f2f194e2f2d2d860e11f2c6959e30b3

      SHA256

      528049ab9e8f2ce40419e1ded49dcfd676d65b4b744dbe2490cf1254bfe236ba

      SHA512

      e2ae2e8c00bf3c3d26fa26c0d0c35afd5375edbf90a442fb51f3f5b5bbd9e8c01bc158a19d512430d0be411295dc4489995e42b6af3f19baea1d90b1e6a38903

    • C:\Users\Admin\AppData\Local\Temp\jvnpuom.vbs
      MD5

      960caad0d3321b49d7658f4c458a598d

      SHA1

      74f6e57d810d01f6046cf9e1700b43debf85ec73

      SHA256

      32d3eaef3af6a0e9fa926ddfc0694df412acefd9505321c4691a8b35247671f5

      SHA512

      0cf3dbdbe0cb4b362766b31bfe0187ebbccae765880117e7949bb0b3f453b413008baa26df09cdf15b67b8b04a264a8c62ff35ed6fc1c3da27603b90ff1faff5

    • C:\Users\Admin\AppData\Local\Temp\ugvvljoyxs.exe
      MD5

      e30439253fcddef70e664b75590161ef

      SHA1

      422108f8b3c20d467f7d3f311e622b4c5f3ed6df

      SHA256

      98365896cc37bbd213f8e0f4b1d0d98581e7243c84d802eb4966abf276e2945a

      SHA512

      0005908ec2d4ae95cbd52c5185832c9f76bc2c75b677549b920e0329860d47be08dd4750160be261a6e3cfd7f52c206f358610fd862937fb062e8a285cf13d32

    • C:\Users\Admin\AppData\Local\Temp\ugvvljoyxs.exe
      MD5

      e30439253fcddef70e664b75590161ef

      SHA1

      422108f8b3c20d467f7d3f311e622b4c5f3ed6df

      SHA256

      98365896cc37bbd213f8e0f4b1d0d98581e7243c84d802eb4966abf276e2945a

      SHA512

      0005908ec2d4ae95cbd52c5185832c9f76bc2c75b677549b920e0329860d47be08dd4750160be261a6e3cfd7f52c206f358610fd862937fb062e8a285cf13d32

    • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      MD5

      8d013018cbd8e2de770f984633ad3dc2

      SHA1

      c435e2fddeb819dca3fbbac84dfbffdc9f134b40

      SHA256

      bd5ed485d3189ff442bea4067aedf80ee9264f701f57ee0c3db346df334fcbb3

      SHA512

      c7f21a018c569c6cc29b7c128e6c9ef500a3e6383fff14921335d265f5174e34374ae7aef964fd3979384d32991c69b422bcb748183d07aab41b41abc2228c15

    • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      MD5

      8d013018cbd8e2de770f984633ad3dc2

      SHA1

      c435e2fddeb819dca3fbbac84dfbffdc9f134b40

      SHA256

      bd5ed485d3189ff442bea4067aedf80ee9264f701f57ee0c3db346df334fcbb3

      SHA512

      c7f21a018c569c6cc29b7c128e6c9ef500a3e6383fff14921335d265f5174e34374ae7aef964fd3979384d32991c69b422bcb748183d07aab41b41abc2228c15

    • \Users\Admin\AppData\Local\Temp\UGVVLJ~1.DLL
      MD5

      bacce6ed0bab72761fa4e784e93a4365

      SHA1

      2d70de082c81fd35d711843a0e754be978f0e76e

      SHA256

      75591b9b3b4936cacc0a92dab7ba9a7ed24c0952691684483f119c116d66c0a7

      SHA512

      6c72b1753029f0fafb0971f5e66da5e41ec99da02e3f186730dc1b3d497423b0d92674d52da7f9755b9c1db3a31f284392bf0c97497edbd4a3cf02710288323a

    • \Users\Admin\AppData\Local\Temp\UGVVLJ~1.DLL
      MD5

      bacce6ed0bab72761fa4e784e93a4365

      SHA1

      2d70de082c81fd35d711843a0e754be978f0e76e

      SHA256

      75591b9b3b4936cacc0a92dab7ba9a7ed24c0952691684483f119c116d66c0a7

      SHA512

      6c72b1753029f0fafb0971f5e66da5e41ec99da02e3f186730dc1b3d497423b0d92674d52da7f9755b9c1db3a31f284392bf0c97497edbd4a3cf02710288323a

    • \Users\Admin\AppData\Local\Temp\nsp2845.tmp\UAC.dll
      MD5

      adb29e6b186daa765dc750128649b63d

      SHA1

      160cbdc4cb0ac2c142d361df138c537aa7e708c9

      SHA256

      2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

      SHA512

      b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

    • memory/784-135-0x0000000000000000-mapping.dmp
    • memory/1368-125-0x0000000000E10000-0x0000000001564000-memory.dmp
      Filesize

      7.3MB

    • memory/1368-126-0x0000000000E10000-0x0000000001564000-memory.dmp
      Filesize

      7.3MB

    • memory/1368-116-0x0000000000000000-mapping.dmp
    • memory/1368-122-0x0000000000E10000-0x0000000001564000-memory.dmp
      Filesize

      7.3MB

    • memory/1368-123-0x0000000000E10000-0x0000000001564000-memory.dmp
      Filesize

      7.3MB

    • memory/1368-124-0x0000000077810000-0x000000007799E000-memory.dmp
      Filesize

      1.6MB

    • memory/1540-145-0x0000000002286000-0x0000000002415000-memory.dmp
      Filesize

      1.6MB

    • memory/1540-132-0x0000000000000000-mapping.dmp
    • memory/1540-146-0x0000000002420000-0x00000000025C6000-memory.dmp
      Filesize

      1.6MB

    • memory/1540-147-0x0000000000400000-0x000000000064D000-memory.dmp
      Filesize

      2.3MB

    • memory/1560-156-0x0000000000BB0000-0x0000000000E2C000-memory.dmp
      Filesize

      2.5MB

    • memory/1560-152-0x0000000000000000-mapping.dmp
    • memory/1900-143-0x0000000000AB0000-0x0000000001204000-memory.dmp
      Filesize

      7.3MB

    • memory/1900-144-0x0000000077810000-0x000000007799E000-memory.dmp
      Filesize

      1.6MB

    • memory/1900-142-0x0000000000AB0000-0x0000000001204000-memory.dmp
      Filesize

      7.3MB

    • memory/1900-137-0x0000000000000000-mapping.dmp
    • memory/1900-141-0x0000000000AB0000-0x0000000001204000-memory.dmp
      Filesize

      7.3MB

    • memory/1900-140-0x0000000000AB0000-0x0000000001204000-memory.dmp
      Filesize

      7.3MB

    • memory/2712-127-0x0000000001000000-0x00000000016C7000-memory.dmp
      Filesize

      6.8MB

    • memory/2712-128-0x0000000001000000-0x00000000016C7000-memory.dmp
      Filesize

      6.8MB

    • memory/2712-129-0x0000000001000000-0x00000000016C7000-memory.dmp
      Filesize

      6.8MB

    • memory/2712-130-0x0000000001000000-0x00000000016C7000-memory.dmp
      Filesize

      6.8MB

    • memory/2712-119-0x0000000000000000-mapping.dmp
    • memory/2712-131-0x0000000077810000-0x000000007799E000-memory.dmp
      Filesize

      1.6MB

    • memory/3732-148-0x0000000000000000-mapping.dmp