Analysis
-
max time kernel
101s -
max time network
181s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12/10/2022, 05:25
Static task
static1
Behavioral task
behavioral1
Sample
35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe
Resource
win7-20220812-en
General
-
Target
35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe
-
Size
1.2MB
-
MD5
6c22e9ff51c52ea93902af7b8c2283c3
-
SHA1
e4afe2353cafa647916cfca70e12443dea0a6387
-
SHA256
35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92
-
SHA512
49e1345148a74a1f0e743048fcd3918c5fc06b1d09308823b95368f8bd0b8a4fba80478768f27cb341faa014fa567f19a5cef0deca10bfdd9a13811377efa7ee
-
SSDEEP
24576:uXhnBIzrRKpZv3ilD09IiYanTw75Vx6fO9qUigRnhqOGVdvbnu6/SZv:EBIMvPilDunTw73wOEysdC6/SZv
Malware Config
Extracted
danabot
192.236.233.188:443
23.106.124.171:443
192.119.70.159:443
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
embedded_hash
A813CAF845B5703DA814AF785BB60B21
-
type
loader
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 1964 rundll32.exe 6 1964 rundll32.exe 7 3640 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1684 set thread context of 3640 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 69 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 47 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3640 rundll32.exe 3640 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3640 rundll32.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2760 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 66 PID 1684 wrote to memory of 2760 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 66 PID 1684 wrote to memory of 2760 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 66 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 1964 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 68 PID 1684 wrote to memory of 3640 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 69 PID 1684 wrote to memory of 3640 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 69 PID 1684 wrote to memory of 3640 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 69 PID 1684 wrote to memory of 3640 1684 35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe"C:\Users\Admin\AppData\Local\Temp\35a94432b93bb87859ce8dec9a6f0725119f38d4bf0678bf645ba8b2605d9f92.exe"1⤵
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\appidtel.exeC:\Windows\system32\appidtel.exe2⤵PID:2760
-
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:1964
-
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3640
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD52650634b147c287fe1040f3efb6e9a15
SHA10a4aea004ebc7d42249909cab658b09f87e4cd16
SHA25639668f3125e1fb7e220f6f3566783eb6b3126c39d3b63be287172d16018accbf
SHA512d7634b9f01a6b055433643a04f89ce5c623879c5a8acac52beea9b0918388e7d291db541f4ce7f8b2dfb83ddbd5780b3a6fbf97579b4441e59142c812b62dc50