Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2022 17:59

General

  • Target

    file.exe

  • Size

    128KB

  • MD5

    bedc12f0bf88584c2dc4a9e9bb3b4a76

  • SHA1

    a822940d174f6c4dcb5443337aa374a9a7c538a4

  • SHA256

    7cfb016588c51d6ce75aeda0afcf0e5f979cdcaa59b2ecc07d488f1a5f6180d4

  • SHA512

    850981cf6494bd4d0a858d712ababa6c9636a5a36998fb11e193677a3eafc36dd9f6f6eb9c7bd1e78f5e50a9be928b20f31f4e338e3b2401deed55fcb3156896

  • SSDEEP

    3072:7Lh5Tc55KZjE5RXOEqmGBS5PTMrHBQq3d5B:cKZ45RX7B5PwrhZ

Malware Config

Extracted

Family

danabot

C2

198.15.112.179:443

185.62.56.245:443

153.92.223.225:443

192.119.70.159:443

Attributes
  • embedded_hash

    6618C163D57D6441FCCA65D86C4D380D

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 42 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4888
  • C:\Users\Admin\AppData\Local\Temp\8DA9.exe
    C:\Users\Admin\AppData\Local\Temp\8DA9.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4320
    • C:\Windows\SysWOW64\agentactivationruntimestarter.exe
      C:\Windows\system32\agentactivationruntimestarter.exe
      2⤵
        PID:2284
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        PID:4340
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 628
        2⤵
        • Program crash
        PID:1500
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:680
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x420 0x4c0
      1⤵
        PID:4652
      • C:\Users\Admin\AppData\Roaming\subdeef
        C:\Users\Admin\AppData\Roaming\subdeef
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:4016
      • C:\Users\Admin\AppData\Local\Temp\C60.exe
        C:\Users\Admin\AppData\Local\Temp\C60.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4344
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 1688
          2⤵
          • Program crash
          PID:3788
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4344 -ip 4344
        1⤵
          PID:4168
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4320 -ip 4320
          1⤵
            PID:2356

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\8DA9.exe
            Filesize

            1.2MB

            MD5

            dd0c13f8c9d5e919279a39759b0a6b55

            SHA1

            3fa6bf6011b9256d19a78d433a8d9c4a449c84fd

            SHA256

            c784d7449bdac569e387240729b5e13f13be80f613e1ec71112a8853e834e273

            SHA512

            0f6deba86678f539f45dbed31e63c33252acc089870a63101f92b0901badc0c3e851d39eba5ec3876f7fabc421457e1ed16b65f4a43adb2e964f5abade16a72d

          • C:\Users\Admin\AppData\Local\Temp\8DA9.exe
            Filesize

            1.2MB

            MD5

            dd0c13f8c9d5e919279a39759b0a6b55

            SHA1

            3fa6bf6011b9256d19a78d433a8d9c4a449c84fd

            SHA256

            c784d7449bdac569e387240729b5e13f13be80f613e1ec71112a8853e834e273

            SHA512

            0f6deba86678f539f45dbed31e63c33252acc089870a63101f92b0901badc0c3e851d39eba5ec3876f7fabc421457e1ed16b65f4a43adb2e964f5abade16a72d

          • C:\Users\Admin\AppData\Local\Temp\C60.exe
            Filesize

            304KB

            MD5

            15f1517f0ceaaf9b6c78cf7625510c07

            SHA1

            8aabce20aff43476586a1b69b0b761a7f39d1e7e

            SHA256

            d0d47dec11c63b6fa1a2dcac89e5a7352220e371b728781de041bf42fa8965fb

            SHA512

            931a79a6e0d38c9b59b03a68d31e3c8fdb2b51e5eeed1df45790eba38f516f767ed67d9edd10bef16d169dc253c81ba6afb5d52738761cc2fa84f601f86b3516

          • C:\Users\Admin\AppData\Local\Temp\C60.exe
            Filesize

            304KB

            MD5

            15f1517f0ceaaf9b6c78cf7625510c07

            SHA1

            8aabce20aff43476586a1b69b0b761a7f39d1e7e

            SHA256

            d0d47dec11c63b6fa1a2dcac89e5a7352220e371b728781de041bf42fa8965fb

            SHA512

            931a79a6e0d38c9b59b03a68d31e3c8fdb2b51e5eeed1df45790eba38f516f767ed67d9edd10bef16d169dc253c81ba6afb5d52738761cc2fa84f601f86b3516

          • C:\Users\Admin\AppData\Roaming\subdeef
            Filesize

            128KB

            MD5

            bedc12f0bf88584c2dc4a9e9bb3b4a76

            SHA1

            a822940d174f6c4dcb5443337aa374a9a7c538a4

            SHA256

            7cfb016588c51d6ce75aeda0afcf0e5f979cdcaa59b2ecc07d488f1a5f6180d4

            SHA512

            850981cf6494bd4d0a858d712ababa6c9636a5a36998fb11e193677a3eafc36dd9f6f6eb9c7bd1e78f5e50a9be928b20f31f4e338e3b2401deed55fcb3156896

          • C:\Users\Admin\AppData\Roaming\subdeef
            Filesize

            128KB

            MD5

            bedc12f0bf88584c2dc4a9e9bb3b4a76

            SHA1

            a822940d174f6c4dcb5443337aa374a9a7c538a4

            SHA256

            7cfb016588c51d6ce75aeda0afcf0e5f979cdcaa59b2ecc07d488f1a5f6180d4

            SHA512

            850981cf6494bd4d0a858d712ababa6c9636a5a36998fb11e193677a3eafc36dd9f6f6eb9c7bd1e78f5e50a9be928b20f31f4e338e3b2401deed55fcb3156896

          • memory/2284-139-0x0000000000000000-mapping.dmp
          • memory/4016-148-0x0000000000400000-0x000000000057D000-memory.dmp
            Filesize

            1.5MB

          • memory/4016-147-0x0000000000400000-0x000000000057D000-memory.dmp
            Filesize

            1.5MB

          • memory/4016-146-0x0000000000728000-0x0000000000738000-memory.dmp
            Filesize

            64KB

          • memory/4320-136-0x0000000000000000-mapping.dmp
          • memory/4320-142-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/4320-141-0x0000000002570000-0x000000000284B000-memory.dmp
            Filesize

            2.9MB

          • memory/4320-145-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/4320-140-0x0000000002447000-0x000000000256D000-memory.dmp
            Filesize

            1.1MB

          • memory/4320-171-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/4320-170-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/4320-173-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/4340-172-0x0000000000000000-mapping.dmp
          • memory/4344-152-0x0000000004D30000-0x00000000052D4000-memory.dmp
            Filesize

            5.6MB

          • memory/4344-162-0x0000000006610000-0x0000000006686000-memory.dmp
            Filesize

            472KB

          • memory/4344-153-0x00000000007E8000-0x0000000000812000-memory.dmp
            Filesize

            168KB

          • memory/4344-154-0x0000000000720000-0x0000000000757000-memory.dmp
            Filesize

            220KB

          • memory/4344-155-0x0000000000400000-0x00000000005A5000-memory.dmp
            Filesize

            1.6MB

          • memory/4344-156-0x00000000052E0000-0x00000000058F8000-memory.dmp
            Filesize

            6.1MB

          • memory/4344-157-0x0000000005940000-0x0000000005952000-memory.dmp
            Filesize

            72KB

          • memory/4344-158-0x0000000005960000-0x0000000005A6A000-memory.dmp
            Filesize

            1.0MB

          • memory/4344-159-0x0000000005A90000-0x0000000005ACC000-memory.dmp
            Filesize

            240KB

          • memory/4344-160-0x0000000005DA0000-0x0000000005E32000-memory.dmp
            Filesize

            584KB

          • memory/4344-161-0x0000000005E40000-0x0000000005EA6000-memory.dmp
            Filesize

            408KB

          • memory/4344-149-0x0000000000000000-mapping.dmp
          • memory/4344-163-0x00000000066D0000-0x00000000066EE000-memory.dmp
            Filesize

            120KB

          • memory/4344-164-0x0000000006780000-0x0000000006942000-memory.dmp
            Filesize

            1.8MB

          • memory/4344-165-0x0000000006960000-0x0000000006E8C000-memory.dmp
            Filesize

            5.2MB

          • memory/4344-166-0x0000000007160000-0x00000000071B0000-memory.dmp
            Filesize

            320KB

          • memory/4344-167-0x00000000007E8000-0x0000000000812000-memory.dmp
            Filesize

            168KB

          • memory/4344-168-0x00000000007E8000-0x0000000000812000-memory.dmp
            Filesize

            168KB

          • memory/4344-169-0x0000000000400000-0x00000000005A5000-memory.dmp
            Filesize

            1.6MB

          • memory/4888-134-0x0000000000400000-0x000000000057D000-memory.dmp
            Filesize

            1.5MB

          • memory/4888-135-0x0000000000400000-0x000000000057D000-memory.dmp
            Filesize

            1.5MB

          • memory/4888-132-0x00000000007B9000-0x00000000007C9000-memory.dmp
            Filesize

            64KB

          • memory/4888-133-0x0000000000710000-0x0000000000719000-memory.dmp
            Filesize

            36KB