Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
25-09-2022 01:32
Static task
static1
General
-
Target
b042f121f497e12dec719011bcfac3357f662d8412c1960d3599293eb0051543.exe
-
Size
197KB
-
MD5
c0c84e5c6c1b09b5a987bff067aa29dd
-
SHA1
d258b9984f0e13434d1cb337b8d9f53d5e29b4b3
-
SHA256
b042f121f497e12dec719011bcfac3357f662d8412c1960d3599293eb0051543
-
SHA512
e1c82276d5fc42a905aca9dbcdc03be434b9f418fa6457588ed0f9442d6dd56aabf66a02f54cfb219cb518e8a5d00149e354406c9e7ede74f80c387d3fa8a313
-
SSDEEP
3072:fbcAgLgJLGA4N5fi2x7iZin/RoJT3sYlBnnE8T/PkkXx:ILo5OLxmZM/RoJT8C
Malware Config
Extracted
danabot
198.15.112.179:443
185.62.56.245:443
153.92.223.225:443
192.119.70.159:443
-
embedded_hash
6618C163D57D6441FCCA65D86C4D380D
-
type
loader
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
5DC0.exepid process 4024 5DC0.exe -
Deletes itself 1 IoCs
Processes:
pid process 2900 -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3352 4024 WerFault.exe 5DC0.exe 4696 4024 WerFault.exe 5DC0.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
b042f121f497e12dec719011bcfac3357f662d8412c1960d3599293eb0051543.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b042f121f497e12dec719011bcfac3357f662d8412c1960d3599293eb0051543.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b042f121f497e12dec719011bcfac3357f662d8412c1960d3599293eb0051543.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b042f121f497e12dec719011bcfac3357f662d8412c1960d3599293eb0051543.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b042f121f497e12dec719011bcfac3357f662d8412c1960d3599293eb0051543.exepid process 2580 b042f121f497e12dec719011bcfac3357f662d8412c1960d3599293eb0051543.exe 2580 b042f121f497e12dec719011bcfac3357f662d8412c1960d3599293eb0051543.exe 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 2900 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2900 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
b042f121f497e12dec719011bcfac3357f662d8412c1960d3599293eb0051543.exepid process 2580 b042f121f497e12dec719011bcfac3357f662d8412c1960d3599293eb0051543.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2900 Token: SeCreatePagefilePrivilege 2900 -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
5DC0.exedescription pid process target process PID 2900 wrote to memory of 4024 2900 5DC0.exe PID 2900 wrote to memory of 4024 2900 5DC0.exe PID 2900 wrote to memory of 4024 2900 5DC0.exe PID 4024 wrote to memory of 4872 4024 5DC0.exe appidtel.exe PID 4024 wrote to memory of 4872 4024 5DC0.exe appidtel.exe PID 4024 wrote to memory of 4872 4024 5DC0.exe appidtel.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe PID 4024 wrote to memory of 3296 4024 5DC0.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b042f121f497e12dec719011bcfac3357f662d8412c1960d3599293eb0051543.exe"C:\Users\Admin\AppData\Local\Temp\b042f121f497e12dec719011bcfac3357f662d8412c1960d3599293eb0051543.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\5DC0.exeC:\Users\Admin\AppData\Local\Temp\5DC0.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\appidtel.exeC:\Windows\system32\appidtel.exe2⤵
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 6002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 6242⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5DC0.exeFilesize
1.3MB
MD50d04f4dcf1c8057b6ed68057444a68a8
SHA1c5c089025aef15d1aaa13c746f597bcb57fc45ce
SHA256c13e4751e60749c9f221b107efbc807514299c8452346f5fdf07de91fc47c7de
SHA51246a42550b0996c9875f7e68afa21b32437f013d2b3a8db7b6965b86ded369c3ef9dfbcbbc11904c58456e1d5919dea897b1f59455ea77af016c901e43b0984b2
-
C:\Users\Admin\AppData\Local\Temp\5DC0.exeFilesize
1.3MB
MD50d04f4dcf1c8057b6ed68057444a68a8
SHA1c5c089025aef15d1aaa13c746f597bcb57fc45ce
SHA256c13e4751e60749c9f221b107efbc807514299c8452346f5fdf07de91fc47c7de
SHA51246a42550b0996c9875f7e68afa21b32437f013d2b3a8db7b6965b86ded369c3ef9dfbcbbc11904c58456e1d5919dea897b1f59455ea77af016c901e43b0984b2
-
memory/2580-139-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-120-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-124-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-141-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-126-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-127-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-128-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-129-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-130-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-131-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-132-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-133-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-134-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-136-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-137-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-138-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-122-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-140-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-125-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-123-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-143-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-144-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-145-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-146-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-147-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-148-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-149-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-150-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-152-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-153-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-154-0x0000000000590000-0x000000000063E000-memory.dmpFilesize
696KB
-
memory/2580-155-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-151-0x0000000000590000-0x000000000063E000-memory.dmpFilesize
696KB
-
memory/2580-156-0x0000000000400000-0x000000000058B000-memory.dmpFilesize
1.5MB
-
memory/2580-157-0x0000000000400000-0x000000000058B000-memory.dmpFilesize
1.5MB
-
memory/2580-142-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/2580-121-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-158-0x0000000000000000-mapping.dmp
-
memory/4024-181-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-161-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-163-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-164-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-165-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-166-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-168-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-169-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-170-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-171-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-160-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-172-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-173-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-174-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-175-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-177-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-178-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-179-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-162-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-180-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-182-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-183-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-184-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-185-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-186-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-187-0x00000000022F0000-0x0000000002421000-memory.dmpFilesize
1.2MB
-
memory/4024-188-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-190-0x00000000024C0000-0x000000000279B000-memory.dmpFilesize
2.9MB
-
memory/4024-189-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-191-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-192-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4024-193-0x0000000000400000-0x00000000006E8000-memory.dmpFilesize
2.9MB
-
memory/4024-221-0x0000000000400000-0x00000000006E8000-memory.dmpFilesize
2.9MB
-
memory/4024-209-0x0000000000400000-0x00000000006E8000-memory.dmpFilesize
2.9MB
-
memory/4024-207-0x0000000000400000-0x00000000006E8000-memory.dmpFilesize
2.9MB
-
memory/4024-206-0x00000000024C0000-0x000000000279B000-memory.dmpFilesize
2.9MB
-
memory/4872-196-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4872-195-0x0000000077710000-0x000000007789E000-memory.dmpFilesize
1.6MB
-
memory/4872-194-0x0000000000000000-mapping.dmp