Analysis

  • max time kernel
    151s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 17:41

General

  • Target

    file.exe

  • Size

    229KB

  • MD5

    efd81670221815c45ad8f9da43337855

  • SHA1

    ece37b1c448d7015fe1b55f2a8903df34a384b7a

  • SHA256

    687ba3d4b1f5fe4137ccdc7c63260de238c06631685d0679b942b4dd77f65a0c

  • SHA512

    f5d92a241e06b245dbfa57ecab8a617060219a1ce43f2432e8528257bf51e1c2dca761ecf6edd4905bb28bab4b56698a039dfb9d1e9564f83d761a2b3bb3e7d5

  • SSDEEP

    3072:+h2VDwyAQHtrdUvFb4LrcBYxWQ8G6FgZoVI+UA4JEfdnq5QwP5iGUPKk:+hELHv4GLroYxR7oVU/Jwdne5oPK

Malware Config

Extracted

Family

danabot

C2

192.236.233.188:443

192.119.70.159:443

23.106.124.171:443

213.227.155.103:443

49.0.50.0:57

51.0.52.0:0

53.0.54.0:1200

55.0.56.0:65535

Attributes
  • embedded_hash

    56951C922035D696BFCE443750496462

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 39 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 41 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 19 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4880
  • C:\Users\Admin\AppData\Local\Temp\4C3.exe
    C:\Users\Admin\AppData\Local\Temp\4C3.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Windows\SysWOW64\agentactivationruntimestarter.exe
      C:\Windows\system32\agentactivationruntimestarter.exe
      2⤵
        PID:1300
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        PID:5080
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 620
        2⤵
        • Program crash
        PID:1248
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 872
        2⤵
        • Program crash
        PID:4732
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 872
        2⤵
        • Program crash
        PID:1612
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Checks processor information in registry
        • Modifies registry class
        • Modifies system certificate store
        • Suspicious use of FindShellTrayWindow
        PID:1152
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 952
        2⤵
        • Program crash
        PID:3716
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:3988
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x51c 0x514
      1⤵
        PID:948
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4540 -ip 4540
        1⤵
          PID:2176
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4540 -ip 4540
          1⤵
            PID:3356
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4540 -ip 4540
            1⤵
              PID:1512
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4540 -ip 4540
              1⤵
                PID:4288

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\4C3.exe

                Filesize

                1.3MB

                MD5

                9086c7e8a60b530d6fd90743102f2c40

                SHA1

                30ff489ef0285150f10e02b7c0d98ac9eb926e53

                SHA256

                0ea1ab2604f12064822e22e81183f68b671d6dd9ddfac5b8ec537949433db3b0

                SHA512

                a03a76658bf9cf8b897337c1d60baf075d8b28a8748c5b66e3bcea8e84752051b2b6d0761bc4a8efa1152eeaedac115cd529a52d9ad271d470c08f8d5752c396

              • C:\Users\Admin\AppData\Local\Temp\4C3.exe

                Filesize

                1.3MB

                MD5

                9086c7e8a60b530d6fd90743102f2c40

                SHA1

                30ff489ef0285150f10e02b7c0d98ac9eb926e53

                SHA256

                0ea1ab2604f12064822e22e81183f68b671d6dd9ddfac5b8ec537949433db3b0

                SHA512

                a03a76658bf9cf8b897337c1d60baf075d8b28a8748c5b66e3bcea8e84752051b2b6d0761bc4a8efa1152eeaedac115cd529a52d9ad271d470c08f8d5752c396

              • C:\Users\Admin\AppData\Local\Temp\Sepawuaopqtypsq.tmp

                Filesize

                3.3MB

                MD5

                8b9c0f72deaf2ee06e7441209cbe4ffb

                SHA1

                34912f3c7f4285d85497c96e95c33e5d6a597c97

                SHA256

                1e7242ac7c025b87636e59c07e3601f1bbf5894ce0b23709405b6fefbca4dabe

                SHA512

                db8fb980b6331f494fea8dd4adf6d8724c9ad1a7a2048c6d91e49d9e81fc83700c1195854efc5dcbe2b3aef8d94b5f0ddd7ae8910f40b9cdab017e381f855cd7

              • memory/1152-224-0x0000000003140000-0x0000000003C03000-memory.dmp

                Filesize

                10.8MB

              • memory/1152-222-0x0000000003CD0000-0x0000000003E10000-memory.dmp

                Filesize

                1.2MB

              • memory/1152-223-0x0000000003140000-0x0000000003C03000-memory.dmp

                Filesize

                10.8MB

              • memory/1152-221-0x0000000003CD0000-0x0000000003E10000-memory.dmp

                Filesize

                1.2MB

              • memory/1152-219-0x0000000003140000-0x0000000003C03000-memory.dmp

                Filesize

                10.8MB

              • memory/1152-220-0x0000000000CA0000-0x0000000001644000-memory.dmp

                Filesize

                9.6MB

              • memory/2056-182-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-188-0x0000000002DF0000-0x0000000002E00000-memory.dmp

                Filesize

                64KB

              • memory/2056-148-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-149-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-150-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-151-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-152-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-153-0x0000000002DB0000-0x0000000002DC0000-memory.dmp

                Filesize

                64KB

              • memory/2056-154-0x0000000002DD0000-0x0000000002DE0000-memory.dmp

                Filesize

                64KB

              • memory/2056-155-0x0000000002DD0000-0x0000000002DE0000-memory.dmp

                Filesize

                64KB

              • memory/2056-146-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-145-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-136-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-137-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-138-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-139-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-163-0x0000000002DD0000-0x0000000002DE0000-memory.dmp

                Filesize

                64KB

              • memory/2056-164-0x0000000002DD0000-0x0000000002DE0000-memory.dmp

                Filesize

                64KB

              • memory/2056-140-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-166-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-167-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-168-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-169-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-170-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-171-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-172-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-173-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-174-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-175-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-176-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-177-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-178-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-179-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-180-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-181-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-144-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-183-0x0000000002DA0000-0x0000000002DB0000-memory.dmp

                Filesize

                64KB

              • memory/2056-184-0x0000000002DF0000-0x0000000002E00000-memory.dmp

                Filesize

                64KB

              • memory/2056-185-0x0000000002DF0000-0x0000000002E00000-memory.dmp

                Filesize

                64KB

              • memory/2056-186-0x0000000002DA0000-0x0000000002DB0000-memory.dmp

                Filesize

                64KB

              • memory/2056-187-0x0000000002DF0000-0x0000000002E00000-memory.dmp

                Filesize

                64KB

              • memory/2056-147-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-141-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-142-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/2056-143-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/4540-215-0x0000000003B40000-0x0000000003C80000-memory.dmp

                Filesize

                1.2MB

              • memory/4540-217-0x0000000003B40000-0x0000000003C80000-memory.dmp

                Filesize

                1.2MB

              • memory/4540-225-0x0000000002FB0000-0x0000000003A73000-memory.dmp

                Filesize

                10.8MB

              • memory/4540-160-0x00000000009C9000-0x0000000000AE7000-memory.dmp

                Filesize

                1.1MB

              • memory/4540-161-0x0000000002490000-0x0000000002752000-memory.dmp

                Filesize

                2.8MB

              • memory/4540-162-0x0000000000400000-0x00000000006CE000-memory.dmp

                Filesize

                2.8MB

              • memory/4540-165-0x0000000000400000-0x00000000006CE000-memory.dmp

                Filesize

                2.8MB

              • memory/4540-189-0x0000000000400000-0x00000000006CE000-memory.dmp

                Filesize

                2.8MB

              • memory/4540-208-0x0000000000400000-0x00000000006CE000-memory.dmp

                Filesize

                2.8MB

              • memory/4540-216-0x0000000003B40000-0x0000000003C80000-memory.dmp

                Filesize

                1.2MB

              • memory/4540-190-0x0000000000400000-0x00000000006CE000-memory.dmp

                Filesize

                2.8MB

              • memory/4540-206-0x0000000002FB0000-0x0000000003A73000-memory.dmp

                Filesize

                10.8MB

              • memory/4540-214-0x0000000003B40000-0x0000000003C80000-memory.dmp

                Filesize

                1.2MB

              • memory/4540-213-0x0000000003B40000-0x0000000003C80000-memory.dmp

                Filesize

                1.2MB

              • memory/4540-212-0x0000000003B40000-0x0000000003C80000-memory.dmp

                Filesize

                1.2MB

              • memory/4540-211-0x0000000003B40000-0x0000000003C80000-memory.dmp

                Filesize

                1.2MB

              • memory/4540-210-0x0000000003B40000-0x0000000003C80000-memory.dmp

                Filesize

                1.2MB

              • memory/4540-209-0x0000000002FB0000-0x0000000003A73000-memory.dmp

                Filesize

                10.8MB

              • memory/4540-207-0x0000000002FB0000-0x0000000003A73000-memory.dmp

                Filesize

                10.8MB

              • memory/4880-133-0x00000000005E0000-0x00000000005E9000-memory.dmp

                Filesize

                36KB

              • memory/4880-134-0x0000000000400000-0x0000000000597000-memory.dmp

                Filesize

                1.6MB

              • memory/4880-135-0x0000000000400000-0x0000000000597000-memory.dmp

                Filesize

                1.6MB

              • memory/4880-132-0x00000000007B3000-0x00000000007C4000-memory.dmp

                Filesize

                68KB

              • memory/5080-199-0x0000000000D60000-0x0000000000D63000-memory.dmp

                Filesize

                12KB

              • memory/5080-196-0x0000000000D30000-0x0000000000D33000-memory.dmp

                Filesize

                12KB

              • memory/5080-201-0x0000000000D80000-0x0000000000D83000-memory.dmp

                Filesize

                12KB

              • memory/5080-197-0x0000000000D40000-0x0000000000D43000-memory.dmp

                Filesize

                12KB

              • memory/5080-202-0x0000000000D90000-0x0000000000D93000-memory.dmp

                Filesize

                12KB

              • memory/5080-204-0x0000000000DA0000-0x0000000000DA3000-memory.dmp

                Filesize

                12KB

              • memory/5080-198-0x0000000000D50000-0x0000000000D53000-memory.dmp

                Filesize

                12KB

              • memory/5080-203-0x0000000000DA0000-0x0000000000DA3000-memory.dmp

                Filesize

                12KB

              • memory/5080-195-0x0000000000D20000-0x0000000000D23000-memory.dmp

                Filesize

                12KB

              • memory/5080-194-0x0000000000D10000-0x0000000000D13000-memory.dmp

                Filesize

                12KB

              • memory/5080-193-0x0000000000D00000-0x0000000000D03000-memory.dmp

                Filesize

                12KB

              • memory/5080-192-0x0000000000CF0000-0x0000000000CF3000-memory.dmp

                Filesize

                12KB

              • memory/5080-200-0x0000000000D70000-0x0000000000D73000-memory.dmp

                Filesize

                12KB