Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2022, 01:15

General

  • Target

    fccea4f3d6ebae2f1c65af24a68585e8170c3a0e60cfbb0a639f02345c1a3098.exe

  • Size

    217KB

  • MD5

    f771ba77542c6f19cade962fb4543ab6

  • SHA1

    2f8844c1d368bce620a2761b35288498f51bc95e

  • SHA256

    fccea4f3d6ebae2f1c65af24a68585e8170c3a0e60cfbb0a639f02345c1a3098

  • SHA512

    9dfcfe72a5c43ad395b290c04dce71f4b8a27a2cd1bd24b01d5fd5923f5b2dc02702f964b081113a0bc1d9b236340e161f0adc16f947a0968bc9e6ea835ed4fd

  • SSDEEP

    3072:h/EphVY6tjOSazEGm7cgiL7VG6naXkFALxFIPD4Xu0wtabJM9wVTjuJ+EjaL:hMps6xGmQnL7A6nW1aPDWBJM9wVTbr

Malware Config

Extracted

Family

danabot

C2

192.236.233.188:443

192.119.70.159:443

23.106.124.171:443

213.227.155.103:443

49.0.50.0:57

51.0.52.0:0

53.0.54.0:1200

55.0.56.0:65535

Attributes
  • embedded_hash

    56951C922035D696BFCE443750496462

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 39 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 41 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fccea4f3d6ebae2f1c65af24a68585e8170c3a0e60cfbb0a639f02345c1a3098.exe
    "C:\Users\Admin\AppData\Local\Temp\fccea4f3d6ebae2f1c65af24a68585e8170c3a0e60cfbb0a639f02345c1a3098.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1152
  • C:\Users\Admin\AppData\Local\Temp\2FF9.exe
    C:\Users\Admin\AppData\Local\Temp\2FF9.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Windows\SysWOW64\agentactivationruntimestarter.exe
      C:\Windows\system32\agentactivationruntimestarter.exe
      2⤵
        PID:1396
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        PID:2604
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 624
        2⤵
        • Program crash
        PID:4388
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 872
        2⤵
        • Program crash
        PID:2208
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 872
        2⤵
        • Program crash
        PID:1248
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:3548
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 964
        2⤵
        • Program crash
        PID:1864
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:3500
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x470 0x324
      1⤵
        PID:564
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2264 -ip 2264
        1⤵
          PID:5064
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2264 -ip 2264
          1⤵
            PID:3524
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2264 -ip 2264
            1⤵
              PID:3828
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2264 -ip 2264
              1⤵
                PID:2036

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\2FF9.exe

                      Filesize

                      1.3MB

                      MD5

                      179cddd92ff4264dfb456225ce405864

                      SHA1

                      47a6a29d593eaa2a8a2943d31504d977297897a2

                      SHA256

                      5839cefefaf5d29e4874b4d339903efa41f1de1287ae92db63c8868232feb937

                      SHA512

                      2e15900e32700a18880ef410faa4dcaa4798bfcb7f388656b62d7d7ba9ce83871ef123b111ce259fd0cf6fb4423e8cb98984abfdf1042147eb0f5503259ca490

                    • C:\Users\Admin\AppData\Local\Temp\2FF9.exe

                      Filesize

                      1.3MB

                      MD5

                      179cddd92ff4264dfb456225ce405864

                      SHA1

                      47a6a29d593eaa2a8a2943d31504d977297897a2

                      SHA256

                      5839cefefaf5d29e4874b4d339903efa41f1de1287ae92db63c8868232feb937

                      SHA512

                      2e15900e32700a18880ef410faa4dcaa4798bfcb7f388656b62d7d7ba9ce83871ef123b111ce259fd0cf6fb4423e8cb98984abfdf1042147eb0f5503259ca490

                    • C:\Users\Admin\AppData\Local\Temp\Sepawuaopqtypsq.tmp

                      Filesize

                      3.3MB

                      MD5

                      8b9c0f72deaf2ee06e7441209cbe4ffb

                      SHA1

                      34912f3c7f4285d85497c96e95c33e5d6a597c97

                      SHA256

                      1e7242ac7c025b87636e59c07e3601f1bbf5894ce0b23709405b6fefbca4dabe

                      SHA512

                      db8fb980b6331f494fea8dd4adf6d8724c9ad1a7a2048c6d91e49d9e81fc83700c1195854efc5dcbe2b3aef8d94b5f0ddd7ae8910f40b9cdab017e381f855cd7

                    • memory/1152-133-0x00000000001F0000-0x00000000001F9000-memory.dmp

                      Filesize

                      36KB

                    • memory/1152-134-0x0000000000400000-0x0000000000594000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1152-135-0x0000000000400000-0x0000000000594000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1152-132-0x00000000007A2000-0x00000000007B2000-memory.dmp

                      Filesize

                      64KB

                    • memory/2264-168-0x0000000003DD0000-0x0000000003F10000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2264-171-0x0000000003DD0000-0x0000000003F10000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2264-142-0x0000000000400000-0x00000000006CE000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/2264-143-0x0000000000400000-0x00000000006CE000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/2264-144-0x0000000000400000-0x00000000006CE000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/2264-145-0x0000000000400000-0x00000000006CE000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/2264-180-0x00000000031D0000-0x0000000003C93000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/2264-172-0x0000000003DD0000-0x0000000003F10000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2264-141-0x0000000002520000-0x00000000027E2000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/2264-170-0x0000000003DD0000-0x0000000003F10000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2264-169-0x0000000003DD0000-0x0000000003F10000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2264-167-0x0000000003DD0000-0x0000000003F10000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2264-166-0x0000000003DD0000-0x0000000003F10000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2264-165-0x0000000003DD0000-0x0000000003F10000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2264-164-0x00000000031D0000-0x0000000003C93000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/2264-163-0x0000000000400000-0x00000000006CE000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/2264-162-0x00000000031D0000-0x0000000003C93000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/2264-161-0x00000000031D0000-0x0000000003C93000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/2264-140-0x0000000000A5A000-0x0000000000B78000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2604-150-0x00000000008E0000-0x00000000008E3000-memory.dmp

                      Filesize

                      12KB

                    • memory/2604-149-0x00000000008D0000-0x00000000008D3000-memory.dmp

                      Filesize

                      12KB

                    • memory/2604-157-0x0000000000950000-0x0000000000953000-memory.dmp

                      Filesize

                      12KB

                    • memory/2604-156-0x0000000000940000-0x0000000000943000-memory.dmp

                      Filesize

                      12KB

                    • memory/2604-155-0x0000000000930000-0x0000000000933000-memory.dmp

                      Filesize

                      12KB

                    • memory/2604-148-0x00000000008C0000-0x00000000008C3000-memory.dmp

                      Filesize

                      12KB

                    • memory/2604-151-0x00000000008F0000-0x00000000008F3000-memory.dmp

                      Filesize

                      12KB

                    • memory/2604-153-0x0000000000910000-0x0000000000913000-memory.dmp

                      Filesize

                      12KB

                    • memory/2604-154-0x0000000000920000-0x0000000000923000-memory.dmp

                      Filesize

                      12KB

                    • memory/2604-152-0x0000000000900000-0x0000000000903000-memory.dmp

                      Filesize

                      12KB

                    • memory/2604-158-0x0000000000960000-0x0000000000963000-memory.dmp

                      Filesize

                      12KB

                    • memory/2604-147-0x00000000008B0000-0x00000000008B3000-memory.dmp

                      Filesize

                      12KB

                    • memory/2604-159-0x0000000000960000-0x0000000000963000-memory.dmp

                      Filesize

                      12KB

                    • memory/3548-174-0x0000000003630000-0x00000000040F3000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/3548-175-0x0000000004200000-0x0000000004340000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/3548-176-0x0000000004200000-0x0000000004340000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/3548-177-0x0000000001200000-0x0000000001BA4000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/3548-178-0x0000000003630000-0x00000000040F3000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/3548-179-0x0000000003630000-0x00000000040F3000-memory.dmp

                      Filesize

                      10.8MB