Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2022 19:42

General

  • Target

    file.exe

  • Size

    129KB

  • MD5

    28d8118cf4cf2ec566b49a370bda43c1

  • SHA1

    6a1603a6567e59687b3ca1e2fd3102e9abf02fe7

  • SHA256

    32962c7fc6405676aa4d7b2e1eda93019c5161ebbb932145f7af73928b341917

  • SHA512

    dcd04fc96dc8fe89576413952ab79a1f0adfff72b8e4c14dcfcdcc66cc054c472124d54bfc06320a99f38d4d1047c3bb902ac9bea9d5bcadf3e94767e80077a0

  • SSDEEP

    3072:SIj/lT55IuPGW9BgA4vAkQ1MaTk0Qm8d9m35B:tauPGWgLAkQ1BoRRd9m

Malware Config

Extracted

Family

danabot

C2

198.15.112.179:443

185.62.56.245:443

153.92.223.225:443

192.119.70.159:443

Attributes
  • embedded_hash

    6618C163D57D6441FCCA65D86C4D380D

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 39 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4984
  • C:\Users\Admin\AppData\Local\Temp\EE6C.exe
    C:\Users\Admin\AppData\Local\Temp\EE6C.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\Windows\SysWOW64\agentactivationruntimestarter.exe
      C:\Windows\system32\agentactivationruntimestarter.exe
      2⤵
        PID:4368
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 620
        2⤵
        • Program crash
        PID:3252
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        PID:4904
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:2632
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x510 0x4ec
      1⤵
        PID:3372
      • C:\Users\Admin\AppData\Local\Temp\1CD0.exe
        C:\Users\Admin\AppData\Local\Temp\1CD0.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4424
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 1320
          2⤵
          • Program crash
          PID:3268
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4424 -ip 4424
        1⤵
          PID:2436
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3540 -ip 3540
          1⤵
            PID:2940

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Credential Access

          Credentials in Files

          2
          T1081

          Discovery

          Query Registry

          2
          T1012

          Peripheral Device Discovery

          1
          T1120

          System Information Discovery

          1
          T1082

          Collection

          Data from Local System

          2
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\1CD0.exe
            Filesize

            304KB

            MD5

            15f1517f0ceaaf9b6c78cf7625510c07

            SHA1

            8aabce20aff43476586a1b69b0b761a7f39d1e7e

            SHA256

            d0d47dec11c63b6fa1a2dcac89e5a7352220e371b728781de041bf42fa8965fb

            SHA512

            931a79a6e0d38c9b59b03a68d31e3c8fdb2b51e5eeed1df45790eba38f516f767ed67d9edd10bef16d169dc253c81ba6afb5d52738761cc2fa84f601f86b3516

          • C:\Users\Admin\AppData\Local\Temp\1CD0.exe
            Filesize

            304KB

            MD5

            15f1517f0ceaaf9b6c78cf7625510c07

            SHA1

            8aabce20aff43476586a1b69b0b761a7f39d1e7e

            SHA256

            d0d47dec11c63b6fa1a2dcac89e5a7352220e371b728781de041bf42fa8965fb

            SHA512

            931a79a6e0d38c9b59b03a68d31e3c8fdb2b51e5eeed1df45790eba38f516f767ed67d9edd10bef16d169dc253c81ba6afb5d52738761cc2fa84f601f86b3516

          • C:\Users\Admin\AppData\Local\Temp\EE6C.exe
            Filesize

            1.2MB

            MD5

            823bae557b99aa78726b5bd0eb1d08fd

            SHA1

            17b1bad73df253425b558bef9f3bcc2f525c87a2

            SHA256

            79917e1e1d5bf309a08a7be36fa95c6a46dc90beae11bab2cddc46c5f0d2ceb9

            SHA512

            db42614f2144b5fbb6689e98997a7b45e5cac8f8327dbdb446b96f744259a831e174454666446ad97b13ec2405bfbd02d2c421184eb0b673059b27ad6b539f99

          • C:\Users\Admin\AppData\Local\Temp\EE6C.exe
            Filesize

            1.2MB

            MD5

            823bae557b99aa78726b5bd0eb1d08fd

            SHA1

            17b1bad73df253425b558bef9f3bcc2f525c87a2

            SHA256

            79917e1e1d5bf309a08a7be36fa95c6a46dc90beae11bab2cddc46c5f0d2ceb9

            SHA512

            db42614f2144b5fbb6689e98997a7b45e5cac8f8327dbdb446b96f744259a831e174454666446ad97b13ec2405bfbd02d2c421184eb0b673059b27ad6b539f99

          • C:\Users\Admin\AppData\Local\Temp\Fiuepr.tmp
            Filesize

            3.3MB

            MD5

            be03bd71d3ba639632b50cb9a3931d56

            SHA1

            bcf03bb5c228044abd984485b0e10fc4e16c0c6c

            SHA256

            1e50f193c8e645a6c93feb42b1ffd46dec68738106dec79014815ac444612234

            SHA512

            fc0eada90ff1b4c5c805fd38c1bfade389f8b1d58c45611fdaa6a0c303a56cf4d78a49dabb1de0b9eb7458d952b65589256a82262a84c5914b6b7f974336bc8d

          • memory/3540-167-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/3540-137-0x0000000000000000-mapping.dmp
          • memory/3540-141-0x00000000023C3000-0x00000000024E9000-memory.dmp
            Filesize

            1.1MB

          • memory/3540-142-0x00000000024F0000-0x00000000027CB000-memory.dmp
            Filesize

            2.9MB

          • memory/3540-143-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/3540-144-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/3540-166-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/3540-180-0x0000000000400000-0x00000000006E8000-memory.dmp
            Filesize

            2.9MB

          • memory/4368-140-0x0000000000000000-mapping.dmp
          • memory/4424-157-0x0000000006460000-0x00000000064F2000-memory.dmp
            Filesize

            584KB

          • memory/4424-164-0x00000000007F9000-0x0000000000823000-memory.dmp
            Filesize

            168KB

          • memory/4424-149-0x0000000000730000-0x0000000000767000-memory.dmp
            Filesize

            220KB

          • memory/4424-150-0x0000000000400000-0x00000000005A5000-memory.dmp
            Filesize

            1.6MB

          • memory/4424-151-0x0000000004D50000-0x00000000052F4000-memory.dmp
            Filesize

            5.6MB

          • memory/4424-152-0x0000000005300000-0x0000000005918000-memory.dmp
            Filesize

            6.1MB

          • memory/4424-153-0x0000000005940000-0x0000000005952000-memory.dmp
            Filesize

            72KB

          • memory/4424-154-0x0000000005960000-0x0000000005A6A000-memory.dmp
            Filesize

            1.0MB

          • memory/4424-155-0x0000000005A90000-0x0000000005ACC000-memory.dmp
            Filesize

            240KB

          • memory/4424-156-0x0000000005DA0000-0x0000000005E06000-memory.dmp
            Filesize

            408KB

          • memory/4424-145-0x0000000000000000-mapping.dmp
          • memory/4424-158-0x0000000006510000-0x0000000006560000-memory.dmp
            Filesize

            320KB

          • memory/4424-159-0x0000000006570000-0x00000000065E6000-memory.dmp
            Filesize

            472KB

          • memory/4424-160-0x0000000007370000-0x000000000738E000-memory.dmp
            Filesize

            120KB

          • memory/4424-161-0x0000000007550000-0x0000000007712000-memory.dmp
            Filesize

            1.8MB

          • memory/4424-162-0x0000000007720000-0x0000000007C4C000-memory.dmp
            Filesize

            5.2MB

          • memory/4424-163-0x00000000007F9000-0x0000000000823000-memory.dmp
            Filesize

            168KB

          • memory/4424-148-0x00000000007F9000-0x0000000000823000-memory.dmp
            Filesize

            168KB

          • memory/4424-165-0x0000000000400000-0x00000000005A5000-memory.dmp
            Filesize

            1.6MB

          • memory/4904-175-0x0000000000700000-0x0000000000703000-memory.dmp
            Filesize

            12KB

          • memory/4904-170-0x00000000006B0000-0x00000000006B3000-memory.dmp
            Filesize

            12KB

          • memory/4904-181-0x0000000000740000-0x0000000000743000-memory.dmp
            Filesize

            12KB

          • memory/4904-169-0x00000000006A0000-0x00000000006A3000-memory.dmp
            Filesize

            12KB

          • memory/4904-174-0x00000000006F0000-0x00000000006F3000-memory.dmp
            Filesize

            12KB

          • memory/4904-171-0x00000000006C0000-0x00000000006C3000-memory.dmp
            Filesize

            12KB

          • memory/4904-173-0x00000000006E0000-0x00000000006E3000-memory.dmp
            Filesize

            12KB

          • memory/4904-177-0x0000000000720000-0x0000000000723000-memory.dmp
            Filesize

            12KB

          • memory/4904-168-0x0000000000000000-mapping.dmp
          • memory/4904-178-0x0000000000730000-0x0000000000733000-memory.dmp
            Filesize

            12KB

          • memory/4904-172-0x00000000006D0000-0x00000000006D3000-memory.dmp
            Filesize

            12KB

          • memory/4904-176-0x0000000000710000-0x0000000000713000-memory.dmp
            Filesize

            12KB

          • memory/4904-179-0x0000000000740000-0x0000000000743000-memory.dmp
            Filesize

            12KB

          • memory/4984-136-0x0000000000400000-0x000000000057D000-memory.dmp
            Filesize

            1.5MB

          • memory/4984-135-0x0000000000400000-0x000000000057D000-memory.dmp
            Filesize

            1.5MB

          • memory/4984-133-0x0000000000580000-0x0000000000680000-memory.dmp
            Filesize

            1024KB

          • memory/4984-134-0x00000000022B0000-0x00000000022B9000-memory.dmp
            Filesize

            36KB