Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-10-2022 00:08

General

  • Target

    9d95e51bc6240a1e42b4d7ac35f3949e98bc2462cfd84ae3180b3d3753d6fd32.exe

  • Size

    146KB

  • MD5

    5857452a7c4f42e1be84602d6fdd5de4

  • SHA1

    031694f1a68eafa3915c886d6dba4c2034c7bea1

  • SHA256

    9d95e51bc6240a1e42b4d7ac35f3949e98bc2462cfd84ae3180b3d3753d6fd32

  • SHA512

    13d50804f489bad9340716ae7c1fb1a779e3d09917afc9bbf31d108f02223cc7295ca0d3e5b0c687e3d6d8d1434636a285743eda424e59ab5afd0223e500196e

  • SSDEEP

    3072:KIkS00hfhxLbvCTQXMfJZjLIyUMe9a+BPcBaGO:VmYHvExZjLhe9zB4aG

Malware Config

Extracted

Family

danabot

C2

49.0.50.0:57

51.0.52.0:0

53.0.54.0:1200

55.0.56.0:65535

Attributes
  • embedded_hash

    EAD30BF58E340E9E105B328F524565E0

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 44 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d95e51bc6240a1e42b4d7ac35f3949e98bc2462cfd84ae3180b3d3753d6fd32.exe
    "C:\Users\Admin\AppData\Local\Temp\9d95e51bc6240a1e42b4d7ac35f3949e98bc2462cfd84ae3180b3d3753d6fd32.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4152
  • C:\Users\Admin\AppData\Local\Temp\2625.exe
    C:\Users\Admin\AppData\Local\Temp\2625.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:5108
    • C:\Windows\SysWOW64\appidtel.exe
      C:\Windows\system32\appidtel.exe
      2⤵
        PID:2736
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 792
        2⤵
        • Program crash
        PID:3804
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 828
        2⤵
        • Program crash
        PID:3092
      • C:\Windows\syswow64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4396
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 968
        2⤵
        • Program crash
        PID:3812
    • C:\Users\Admin\AppData\Roaming\jbebfuv
      C:\Users\Admin\AppData\Roaming\jbebfuv
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1116

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    3
    T1082

    Query Registry

    2
    T1012

    Peripheral Device Discovery

    1
    T1120

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2625.exe
      Filesize

      4.5MB

      MD5

      630eda5f260f2dca98e6f04fbc12466b

      SHA1

      73204a957526c43ea8bae86cebd7297343575ff0

      SHA256

      dca1c32ed4c0d83654a8f3bb557ee6c17884e768ae19f81cdaa5b6f9fc6458c8

      SHA512

      15016f10c727a57a03fba182f54625327011501c30204b49992363f69ceaa291a6fee5f3d593669ba3b57ea85589ff5d3ebfaed40f30f40cdf0bb910c311e21e

    • C:\Users\Admin\AppData\Local\Temp\2625.exe
      Filesize

      4.5MB

      MD5

      630eda5f260f2dca98e6f04fbc12466b

      SHA1

      73204a957526c43ea8bae86cebd7297343575ff0

      SHA256

      dca1c32ed4c0d83654a8f3bb557ee6c17884e768ae19f81cdaa5b6f9fc6458c8

      SHA512

      15016f10c727a57a03fba182f54625327011501c30204b49992363f69ceaa291a6fee5f3d593669ba3b57ea85589ff5d3ebfaed40f30f40cdf0bb910c311e21e

    • C:\Users\Admin\AppData\Local\Temp\574a1556-3e10-4b46-be9e-7e118fbbd324\3950266016.pri
      Filesize

      3KB

      MD5

      2bf467eb5b9849766bbeaf369f660932

      SHA1

      379ecc09f68d991e26b042e05733249f24abf6f1

      SHA256

      d94477eb5e0e2211a80cceeaaa6e4ca2d3a2fa601399a3c3d305b91c79f729fb

      SHA512

      a61ee3201065c8e6a486d7e51273ff753364af636247cb7181fa92d0c21a60e76b5c7b46a21cd6e0c6b8de7b32f92738129983e7ccb7ac992cd1061b4aa33f98

    • C:\Users\Admin\AppData\Local\Temp\Uapaipuuih.tmp
      Filesize

      3.3MB

      MD5

      963024ce4b5518f20619bdcb2998a789

      SHA1

      bbce53b5aa2beeff5c9f1555a1e32350bba479b2

      SHA256

      e473b9afa947ef211c7e7cad6521687d504ec244a22f5ea5381f7020f947fc7d

      SHA512

      468f341fb7c284f0024ad5d13a72264d60e77b9ea724a770b4d45856dc0aaedd30e51263ea266e6979d7db1079703a9bc1358c5562aac6761ee45c06436baae8

    • C:\Users\Admin\AppData\Local\Temp\e42dc846-bc64-4388-b5da-4539f7d36f06.tmp
      Filesize

      23KB

      MD5

      7cd73270bd735f9fe77bc9278f9f2b8b

      SHA1

      b27a898970297c750fb7e4d70ad8f87c1e6c1739

      SHA256

      ee80340a02c0f96a3f9d01e635857d38d7b92444d6102ee29804f559f2eaa7f4

      SHA512

      1fe70455d4d8c0fbab9ef20cf85d0de55fea9f18499c653af5d234462aa5c45eaacceadab39e9be62dc548af4f710362dd34970e1d8a666bf09fe4101bf32077

    • C:\Users\Admin\AppData\Local\Temp\e6116bae-0100-4484-b715-90bda65650d7.tmp
      Filesize

      23KB

      MD5

      2e0a52964e4f43a9830f01775bcb061b

      SHA1

      deedc2124380dcc834798466b7ae8ca986aba82f

      SHA256

      3884df97009ac7e97143743660ed8e010d5f77edcf611bf85276e876fc70754b

      SHA512

      56c28175bfeb1adfa70761dbf3d46f60b3545de1dd879b346658a2701a173c5fd1959dcb6ecb931f7589f8178fa46d026da0edcfef0471f0fc9d65df7bc6ea44

    • C:\Users\Admin\AppData\Roaming\jbebfuv
      Filesize

      146KB

      MD5

      5857452a7c4f42e1be84602d6fdd5de4

      SHA1

      031694f1a68eafa3915c886d6dba4c2034c7bea1

      SHA256

      9d95e51bc6240a1e42b4d7ac35f3949e98bc2462cfd84ae3180b3d3753d6fd32

      SHA512

      13d50804f489bad9340716ae7c1fb1a779e3d09917afc9bbf31d108f02223cc7295ca0d3e5b0c687e3d6d8d1434636a285743eda424e59ab5afd0223e500196e

    • C:\Users\Admin\AppData\Roaming\jbebfuv
      Filesize

      146KB

      MD5

      5857452a7c4f42e1be84602d6fdd5de4

      SHA1

      031694f1a68eafa3915c886d6dba4c2034c7bea1

      SHA256

      9d95e51bc6240a1e42b4d7ac35f3949e98bc2462cfd84ae3180b3d3753d6fd32

      SHA512

      13d50804f489bad9340716ae7c1fb1a779e3d09917afc9bbf31d108f02223cc7295ca0d3e5b0c687e3d6d8d1434636a285743eda424e59ab5afd0223e500196e

    • memory/1116-243-0x000000000079A000-0x00000000007AA000-memory.dmp
      Filesize

      64KB

    • memory/1116-244-0x0000000000590000-0x00000000006DA000-memory.dmp
      Filesize

      1.3MB

    • memory/1116-245-0x0000000000400000-0x0000000000581000-memory.dmp
      Filesize

      1.5MB

    • memory/1116-246-0x0000000000400000-0x0000000000581000-memory.dmp
      Filesize

      1.5MB

    • memory/2736-195-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/2736-194-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/2736-193-0x0000000000000000-mapping.dmp
    • memory/4152-144-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-156-0x000000000089A000-0x00000000008AA000-memory.dmp
      Filesize

      64KB

    • memory/4152-137-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-138-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-139-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-140-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-141-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-142-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-143-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-120-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-145-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-146-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-147-0x000000000089A000-0x00000000008AA000-memory.dmp
      Filesize

      64KB

    • memory/4152-148-0x00000000006F0000-0x00000000006F9000-memory.dmp
      Filesize

      36KB

    • memory/4152-149-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-150-0x0000000000400000-0x0000000000581000-memory.dmp
      Filesize

      1.5MB

    • memory/4152-151-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-152-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-153-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-154-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-155-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-133-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-157-0x0000000000400000-0x0000000000581000-memory.dmp
      Filesize

      1.5MB

    • memory/4152-136-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-135-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-121-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-122-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-123-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-124-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-132-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-131-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-130-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-125-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-126-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-127-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-129-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-134-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4152-128-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/4396-295-0x0000000000395FB0-mapping.dmp
    • memory/4396-362-0x0000000002880000-0x0000000003228000-memory.dmp
      Filesize

      9.7MB

    • memory/4396-365-0x0000000004ED0000-0x0000000005997000-memory.dmp
      Filesize

      10.8MB

    • memory/4396-407-0x0000000004ED0000-0x0000000005997000-memory.dmp
      Filesize

      10.8MB

    • memory/5108-177-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-179-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-180-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-178-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-182-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-181-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-184-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-185-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-186-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-188-0x00000000028D0000-0x0000000002D46000-memory.dmp
      Filesize

      4.5MB

    • memory/5108-187-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-189-0x0000000002D50000-0x0000000003366000-memory.dmp
      Filesize

      6.1MB

    • memory/5108-190-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-191-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-192-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-176-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-175-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-174-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-205-0x0000000000400000-0x0000000000A22000-memory.dmp
      Filesize

      6.1MB

    • memory/5108-206-0x00000000028D0000-0x0000000002D46000-memory.dmp
      Filesize

      4.5MB

    • memory/5108-207-0x0000000002D50000-0x0000000003366000-memory.dmp
      Filesize

      6.1MB

    • memory/5108-173-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-172-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-171-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-170-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-169-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-168-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-248-0x0000000000400000-0x0000000000A22000-memory.dmp
      Filesize

      6.1MB

    • memory/5108-282-0x0000000003930000-0x00000000043F7000-memory.dmp
      Filesize

      10.8MB

    • memory/5108-166-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-356-0x0000000000400000-0x0000000000A22000-memory.dmp
      Filesize

      6.1MB

    • memory/5108-360-0x0000000003930000-0x00000000043F7000-memory.dmp
      Filesize

      10.8MB

    • memory/5108-165-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-164-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-163-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-161-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-162-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-160-0x0000000077DE0000-0x0000000077F6E000-memory.dmp
      Filesize

      1.6MB

    • memory/5108-158-0x0000000000000000-mapping.dmp