Analysis

  • max time kernel
    130s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-07-2022 14:33

General

  • Target

    be5050ecd867ea931bcecaafa8d10d6f8c83ab677be207a4a1332f063b3d8624.exe

  • Size

    4.4MB

  • MD5

    a10d4f80ed910baeb4fd603e7b121643

  • SHA1

    3716da6b25cc95a7a17c4fc2a412db52043cc4b0

  • SHA256

    be5050ecd867ea931bcecaafa8d10d6f8c83ab677be207a4a1332f063b3d8624

  • SHA512

    fa6d059476a193e9b85516df678d99139d0c73f00f38217ceef4f49d290b498385c735e0d8dbc49c618e4b62fa7dbf39a85a614505b7a8fca4136e16e0ac7b31

Malware Config

Extracted

Family

danabot

Version

1732

Botnet

3

C2

108.62.118.103:443

23.226.132.92:443

104.144.64.163:443

108.62.141.152:443

Attributes
  • embedded_hash

    49574F66CD0103BBD725C08A9805C2BE

  • type

    main

rsa_pubkey.plain
rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 4 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be5050ecd867ea931bcecaafa8d10d6f8c83ab677be207a4a1332f063b3d8624.exe
    "C:\Users\Admin\AppData\Local\Temp\be5050ecd867ea931bcecaafa8d10d6f8c83ab677be207a4a1332f063b3d8624.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\BE5050~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\BE5050~1.EXE
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:744
      • C:\Windows\SysWOW64\RUNDLL32.EXE
        C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\BE5050~1.DLL,sFdZfI0=
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:3496
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 448
      2⤵
      • Program crash
      PID:2384
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4968 -ip 4968
    1⤵
      PID:3468

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\BE5050~1.DLL
      Filesize

      3.7MB

      MD5

      3e80a67b80152a887124c085dcb6ddda

      SHA1

      c91e8a53e484f4adf6a4aeaad6503fe866722ba6

      SHA256

      24b412d6681877993f2dfb6ff7e115400e8f0bde7c51b81f24b7588abe263426

      SHA512

      9967457202f585cdb749b24af97b5e444d2898d9437c1727e59db259b2b1fc460884d58eb2462c03a0c2cc88b41c72a10c4b7de58d9ec772de0fa1eb0cf25fde

    • C:\Users\Admin\AppData\Local\Temp\BE5050~1.EXE.dll
      Filesize

      3.7MB

      MD5

      3e80a67b80152a887124c085dcb6ddda

      SHA1

      c91e8a53e484f4adf6a4aeaad6503fe866722ba6

      SHA256

      24b412d6681877993f2dfb6ff7e115400e8f0bde7c51b81f24b7588abe263426

      SHA512

      9967457202f585cdb749b24af97b5e444d2898d9437c1727e59db259b2b1fc460884d58eb2462c03a0c2cc88b41c72a10c4b7de58d9ec772de0fa1eb0cf25fde

    • C:\Users\Admin\AppData\Local\Temp\BE5050~1.EXE.dll
      Filesize

      3.7MB

      MD5

      3e80a67b80152a887124c085dcb6ddda

      SHA1

      c91e8a53e484f4adf6a4aeaad6503fe866722ba6

      SHA256

      24b412d6681877993f2dfb6ff7e115400e8f0bde7c51b81f24b7588abe263426

      SHA512

      9967457202f585cdb749b24af97b5e444d2898d9437c1727e59db259b2b1fc460884d58eb2462c03a0c2cc88b41c72a10c4b7de58d9ec772de0fa1eb0cf25fde

    • C:\Users\Admin\AppData\Local\Temp\BE5050~1.EXE.dll
      Filesize

      3.7MB

      MD5

      3e80a67b80152a887124c085dcb6ddda

      SHA1

      c91e8a53e484f4adf6a4aeaad6503fe866722ba6

      SHA256

      24b412d6681877993f2dfb6ff7e115400e8f0bde7c51b81f24b7588abe263426

      SHA512

      9967457202f585cdb749b24af97b5e444d2898d9437c1727e59db259b2b1fc460884d58eb2462c03a0c2cc88b41c72a10c4b7de58d9ec772de0fa1eb0cf25fde

    • C:\Users\Admin\AppData\Local\Temp\BE5050~1.EXE.dll
      Filesize

      3.7MB

      MD5

      3e80a67b80152a887124c085dcb6ddda

      SHA1

      c91e8a53e484f4adf6a4aeaad6503fe866722ba6

      SHA256

      24b412d6681877993f2dfb6ff7e115400e8f0bde7c51b81f24b7588abe263426

      SHA512

      9967457202f585cdb749b24af97b5e444d2898d9437c1727e59db259b2b1fc460884d58eb2462c03a0c2cc88b41c72a10c4b7de58d9ec772de0fa1eb0cf25fde

    • memory/744-138-0x0000000002FC0000-0x0000000003620000-memory.dmp
      Filesize

      6.4MB

    • memory/744-136-0x0000000002670000-0x0000000002A3B000-memory.dmp
      Filesize

      3.8MB

    • memory/744-147-0x0000000002FC0000-0x0000000003620000-memory.dmp
      Filesize

      6.4MB

    • memory/744-132-0x0000000000000000-mapping.dmp
    • memory/3496-143-0x0000000000000000-mapping.dmp
    • memory/3496-146-0x00000000026C0000-0x0000000002A8B000-memory.dmp
      Filesize

      3.8MB

    • memory/3496-149-0x0000000003010000-0x0000000003670000-memory.dmp
      Filesize

      6.4MB

    • memory/3496-155-0x0000000003010000-0x0000000003670000-memory.dmp
      Filesize

      6.4MB

    • memory/3496-156-0x0000000003010000-0x0000000003670000-memory.dmp
      Filesize

      6.4MB

    • memory/4968-130-0x0000000000400000-0x0000000005158000-memory.dmp
      Filesize

      77.3MB

    • memory/4968-137-0x0000000000400000-0x0000000005158000-memory.dmp
      Filesize

      77.3MB

    • memory/4968-131-0x0000000005B00000-0x0000000005EDD000-memory.dmp
      Filesize

      3.9MB

    • memory/4968-148-0x0000000005734000-0x0000000005AFF000-memory.dmp
      Filesize

      3.8MB

    • memory/4968-154-0x0000000000400000-0x0000000005158000-memory.dmp
      Filesize

      77.3MB