Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-09-2022 10:30

General

  • Target

    3b3c1bf5606df5cba57dc1a7356b930d4f3085d36009dace3dcdc1142bec89ae.exe

  • Size

    1.3MB

  • MD5

    6c8dae264996341ae65a75924ff7fc53

  • SHA1

    42effe3e6fcf3fdefaa35efe8df240e1b6b12cc2

  • SHA256

    3b3c1bf5606df5cba57dc1a7356b930d4f3085d36009dace3dcdc1142bec89ae

  • SHA512

    e2395302f97bdcdc6e71227e1e7c0dd7349846766160fc0977884e709ca194dda836799f9c3eef0122fd6bd1d9bb612e44b41c40e856f68e0d938e691b8141cd

  • SSDEEP

    24576:2NKZnf0/89gyp3ZHGy9oAwfOD+4K9YPW51Vg14pcB9eXdv3wMQDKvAI:wKRf0UzCfOD+4K91ViBBgv3wMQ7

Malware Config

Extracted

Family

danabot

C2

198.15.112.179:443

185.62.56.245:443

153.92.223.225:443

192.119.70.159:443

Attributes
  • embedded_hash

    6618C163D57D6441FCCA65D86C4D380D

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 36 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 52 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b3c1bf5606df5cba57dc1a7356b930d4f3085d36009dace3dcdc1142bec89ae.exe
    "C:\Users\Admin\AppData\Local\Temp\3b3c1bf5606df5cba57dc1a7356b930d4f3085d36009dace3dcdc1142bec89ae.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Windows\SysWOW64\agentactivationruntimestarter.exe
      C:\Windows\system32\agentactivationruntimestarter.exe
      2⤵
        PID:4856
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        PID:2612
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 420
        2⤵
        • Program crash
        PID:2448
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 884
        2⤵
        • Program crash
        PID:548
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 920
        2⤵
        • Program crash
        PID:4316
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        • Accesses Microsoft Outlook accounts
        • Accesses Microsoft Outlook profiles
        • Suspicious use of SetThreadContext
        • Drops file in Program Files directory
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        • outlook_win_path
        PID:3828
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 23870
          3⤵
          • Suspicious use of FindShellTrayWindow
          PID:1904
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:4716
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
            3⤵
              PID:2788
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 1012
            2⤵
            • Program crash
            PID:3292
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc
          1⤵
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:4604
        • C:\Windows\system32\AUDIODG.EXE
          C:\Windows\system32\AUDIODG.EXE 0x4e0 0x3c0
          1⤵
            PID:508
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1588 -ip 1588
            1⤵
              PID:4580
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1588 -ip 1588
              1⤵
                PID:3080
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1588 -ip 1588
                1⤵
                  PID:900
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1588 -ip 1588
                  1⤵
                    PID:1704

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Defense Evasion

                  Install Root Certificate

                  1
                  T1130

                  Modify Registry

                  1
                  T1112

                  Credential Access

                  Credentials in Files

                  1
                  T1081

                  Discovery

                  Query Registry

                  3
                  T1012

                  System Information Discovery

                  3
                  T1082

                  Peripheral Device Discovery

                  1
                  T1120

                  Collection

                  Data from Local System

                  1
                  T1005

                  Email Collection

                  2
                  T1114

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\Fiuepr.tmp
                    Filesize

                    3.3MB

                    MD5

                    be03bd71d3ba639632b50cb9a3931d56

                    SHA1

                    bcf03bb5c228044abd984485b0e10fc4e16c0c6c

                    SHA256

                    1e50f193c8e645a6c93feb42b1ffd46dec68738106dec79014815ac444612234

                    SHA512

                    fc0eada90ff1b4c5c805fd38c1bfade389f8b1d58c45611fdaa6a0c303a56cf4d78a49dabb1de0b9eb7458d952b65589256a82262a84c5914b6b7f974336bc8d

                  • memory/1588-168-0x0000000003FA0000-0x00000000040E0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1588-137-0x0000000000400000-0x00000000006E8000-memory.dmp
                    Filesize

                    2.9MB

                  • memory/1588-178-0x0000000003200000-0x0000000003CBE000-memory.dmp
                    Filesize

                    10.7MB

                  • memory/1588-136-0x0000000000400000-0x00000000006E8000-memory.dmp
                    Filesize

                    2.9MB

                  • memory/1588-171-0x0000000003FA0000-0x00000000040E0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1588-138-0x0000000000400000-0x00000000006E8000-memory.dmp
                    Filesize

                    2.9MB

                  • memory/1588-133-0x0000000002463000-0x000000000258A000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1588-172-0x0000000003FA0000-0x00000000040E0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1588-162-0x0000000003200000-0x0000000003CBE000-memory.dmp
                    Filesize

                    10.7MB

                  • memory/1588-163-0x0000000003200000-0x0000000003CBE000-memory.dmp
                    Filesize

                    10.7MB

                  • memory/1588-164-0x0000000003200000-0x0000000003CBE000-memory.dmp
                    Filesize

                    10.7MB

                  • memory/1588-165-0x0000000003FA0000-0x00000000040E0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1588-135-0x0000000000400000-0x00000000006E8000-memory.dmp
                    Filesize

                    2.9MB

                  • memory/1588-134-0x0000000002590000-0x000000000286B000-memory.dmp
                    Filesize

                    2.9MB

                  • memory/1588-166-0x0000000003FA0000-0x00000000040E0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1588-170-0x0000000003FA0000-0x00000000040E0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1588-169-0x0000000003FA0000-0x00000000040E0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1588-160-0x0000000000400000-0x00000000006E8000-memory.dmp
                    Filesize

                    2.9MB

                  • memory/1588-167-0x0000000003FA0000-0x00000000040E0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1904-190-0x00000231E46E0000-0x00000231E48FF000-memory.dmp
                    Filesize

                    2.1MB

                  • memory/1904-186-0x00007FF70EBA6890-mapping.dmp
                  • memory/1904-187-0x00000231E60A0000-0x00000231E61E0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1904-189-0x00000231E60A0000-0x00000231E61E0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1904-188-0x0000000000340000-0x0000000000550000-memory.dmp
                    Filesize

                    2.1MB

                  • memory/1904-193-0x00000231E46E0000-0x00000231E48FF000-memory.dmp
                    Filesize

                    2.1MB

                  • memory/2612-147-0x0000000000B20000-0x0000000000B23000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-149-0x0000000000B40000-0x0000000000B43000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-158-0x0000000000BD0000-0x0000000000BD3000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-156-0x0000000000BB0000-0x0000000000BB3000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-157-0x0000000000BC0000-0x0000000000BC3000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-155-0x0000000000BA0000-0x0000000000BA3000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-153-0x0000000000B80000-0x0000000000B83000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-154-0x0000000000B90000-0x0000000000B93000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-152-0x0000000000B70000-0x0000000000B73000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-151-0x0000000000B60000-0x0000000000B63000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-150-0x0000000000B50000-0x0000000000B53000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-145-0x0000000000B00000-0x0000000000B03000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-148-0x0000000000B30000-0x0000000000B33000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-139-0x0000000000000000-mapping.dmp
                  • memory/2612-143-0x0000000000AE0000-0x0000000000AE3000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-146-0x0000000000B10000-0x0000000000B13000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-140-0x0000000000AB0000-0x0000000000AB3000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-159-0x0000000000BD0000-0x0000000000BD3000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-141-0x0000000000AC0000-0x0000000000AC3000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-142-0x0000000000AD0000-0x0000000000AD3000-memory.dmp
                    Filesize

                    12KB

                  • memory/2612-144-0x0000000000AF0000-0x0000000000AF3000-memory.dmp
                    Filesize

                    12KB

                  • memory/2788-192-0x0000000000000000-mapping.dmp
                  • memory/3828-175-0x0000000002B60000-0x000000000361E000-memory.dmp
                    Filesize

                    10.7MB

                  • memory/3828-179-0x0000000002B60000-0x000000000361E000-memory.dmp
                    Filesize

                    10.7MB

                  • memory/3828-182-0x0000000003770000-0x00000000038B0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/3828-184-0x0000000003770000-0x00000000038B0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/3828-183-0x0000000003770000-0x00000000038B0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/3828-180-0x0000000003770000-0x00000000038B0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/3828-185-0x0000000003770000-0x00000000038B0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/3828-181-0x0000000003770000-0x00000000038B0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/3828-177-0x0000000003770000-0x00000000038B0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/3828-176-0x0000000003770000-0x00000000038B0000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/3828-174-0x0000000000690000-0x000000000102E000-memory.dmp
                    Filesize

                    9.6MB

                  • memory/3828-173-0x0000000000000000-mapping.dmp
                  • memory/4716-191-0x0000000000000000-mapping.dmp
                  • memory/4856-132-0x0000000000000000-mapping.dmp