Analysis

  • max time kernel
    184s
  • max time network
    193s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    11-05-2022 13:54

General

  • Target

    a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.exe

  • Size

    2.2MB

  • MD5

    73c81633573ad5f1d30f16bbace78256

  • SHA1

    075c68a77646235b5e3972207fe8766a13b47f9c

  • SHA256

    a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06

  • SHA512

    0524aa6a83f67d3478ea46cf2d9f27878d1fa0377408eb045c1726c3ade60050e5d37390f8dbad8b898290b6298523681d6d63699116f40bddf1cdb0d6cffd93

Malware Config

Extracted

Family

danabot

C2

89.44.9.132

64.188.23.70

179.43.133.35

45.147.231.218

89.45.4.126

rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot x86 payload 4 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

  • Blocklisted process makes network request 8 IoCs
  • Loads dropped DLL 3 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.exe
    "C:\Users\Admin\AppData\Local\Temp\a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\A85658~1.DLL f1 C:\Users\Admin\AppData\Local\Temp\A85658~1.EXE@1888
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\A85658~1.DLL,f0
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        PID:4696
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 488
      2⤵
      • Program crash
      PID:3804
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1888 -ip 1888
    1⤵
      PID:632

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\A85658~1.DLL
      Filesize

      2.0MB

      MD5

      f44d1c7820bb02b486871ba9eab2f226

      SHA1

      d040d7b886002f37924536425b43091f21a3844b

      SHA256

      24bba101da3da6aefc2b1d454ede986180a5ac31c00ec601cc2d6827b00b26c2

      SHA512

      b633e8f09b12178da24e4dbd022289d4fdf0061175cd685e8357cef51183247da436deb81fd3672f8839b581428c3c46547c5dd3fcf4f726bc72dc070fc02baf

    • C:\Users\Admin\AppData\Local\Temp\a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.dll
      Filesize

      2.0MB

      MD5

      f44d1c7820bb02b486871ba9eab2f226

      SHA1

      d040d7b886002f37924536425b43091f21a3844b

      SHA256

      24bba101da3da6aefc2b1d454ede986180a5ac31c00ec601cc2d6827b00b26c2

      SHA512

      b633e8f09b12178da24e4dbd022289d4fdf0061175cd685e8357cef51183247da436deb81fd3672f8839b581428c3c46547c5dd3fcf4f726bc72dc070fc02baf

    • C:\Users\Admin\AppData\Local\Temp\a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.dll
      Filesize

      2.0MB

      MD5

      f44d1c7820bb02b486871ba9eab2f226

      SHA1

      d040d7b886002f37924536425b43091f21a3844b

      SHA256

      24bba101da3da6aefc2b1d454ede986180a5ac31c00ec601cc2d6827b00b26c2

      SHA512

      b633e8f09b12178da24e4dbd022289d4fdf0061175cd685e8357cef51183247da436deb81fd3672f8839b581428c3c46547c5dd3fcf4f726bc72dc070fc02baf

    • C:\Users\Admin\AppData\Local\Temp\a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.dll
      Filesize

      2.0MB

      MD5

      f44d1c7820bb02b486871ba9eab2f226

      SHA1

      d040d7b886002f37924536425b43091f21a3844b

      SHA256

      24bba101da3da6aefc2b1d454ede986180a5ac31c00ec601cc2d6827b00b26c2

      SHA512

      b633e8f09b12178da24e4dbd022289d4fdf0061175cd685e8357cef51183247da436deb81fd3672f8839b581428c3c46547c5dd3fcf4f726bc72dc070fc02baf

    • memory/1888-130-0x0000000002697000-0x00000000028B8000-memory.dmp
      Filesize

      2.1MB

    • memory/1888-131-0x00000000028C0000-0x0000000002AF6000-memory.dmp
      Filesize

      2.2MB

    • memory/1888-132-0x0000000000400000-0x000000000098B000-memory.dmp
      Filesize

      5.5MB

    • memory/1908-133-0x0000000000000000-mapping.dmp
    • memory/4696-136-0x0000000000000000-mapping.dmp
    • memory/4696-139-0x0000000001EE0000-0x00000000020F6000-memory.dmp
      Filesize

      2.1MB