Analysis

  • max time kernel
    154s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 01:51

General

  • Target

    db4ac7ce88831a31b4a8ba82b813569af1c81c1192a9e993686ce4e7c526f33a.exe

  • Size

    229KB

  • MD5

    ae38c8b118d149c7efb0b158b9f08fb5

  • SHA1

    cc22af8e5f2f101ffd0edea3da066bb4a5eefd70

  • SHA256

    db4ac7ce88831a31b4a8ba82b813569af1c81c1192a9e993686ce4e7c526f33a

  • SHA512

    3c9b0a711c2d136ed4734d8f334986658d6193436fb585c3e096b22fa8c32dcfd99f0714e9e9c55b39b85e525d6a431faac42951d4a3e6c2ad07c29abb2d2e03

  • SSDEEP

    3072:SGnEVZpZPthyZLma0XWOim9ytVyH/S8eCrzMziNeg6lTsSR:SGWppsLZ0XjpKtUM+6lX

Malware Config

Extracted

Family

danabot

C2

192.236.233.188:443

192.119.70.159:443

23.106.124.171:443

213.227.155.103:443

49.0.50.0:57

51.0.52.0:0

53.0.54.0:1200

55.0.56.0:65535

Attributes
  • embedded_hash

    56951C922035D696BFCE443750496462

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 39 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 47 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db4ac7ce88831a31b4a8ba82b813569af1c81c1192a9e993686ce4e7c526f33a.exe
    "C:\Users\Admin\AppData\Local\Temp\db4ac7ce88831a31b4a8ba82b813569af1c81c1192a9e993686ce4e7c526f33a.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3172
  • C:\Users\Admin\AppData\Local\Temp\3A1B.exe
    C:\Users\Admin\AppData\Local\Temp\3A1B.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Windows\SysWOW64\agentactivationruntimestarter.exe
      C:\Windows\system32\agentactivationruntimestarter.exe
      2⤵
        PID:1424
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        PID:1896
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 592
        2⤵
        • Program crash
        PID:3988
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 872
        2⤵
        • Program crash
        PID:4760
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 928
        2⤵
        • Program crash
        PID:3672
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        • Enumerates connected drives
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:2680
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 1012
        2⤵
        • Program crash
        PID:2040
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:4684
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4f4 0x2ec
      1⤵
        PID:912
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3052 -ip 3052
        1⤵
          PID:1132
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3052 -ip 3052
          1⤵
            PID:3260
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3052 -ip 3052
            1⤵
              PID:1048
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3052 -ip 3052
              1⤵
                PID:1144

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\3A1B.exe

                Filesize

                1.3MB

                MD5

                e0fbd6d4aa7ec438dbe1566b76b0e98c

                SHA1

                09e940c297496e77eb08f7fe7c44e2705a7014fd

                SHA256

                da7c53b9af5c4dbb4794820f763043726d0d092c046f27eec81c44dd547ca88e

                SHA512

                7c23c04c38f4106ef4426f5c77c305a8be8a1257b79794617594e267d09718248c7eb0ff463a0cf368ead45a04a11e0d20300b328a7c85a221a80f25b22c68a6

              • C:\Users\Admin\AppData\Local\Temp\3A1B.exe

                Filesize

                1.3MB

                MD5

                e0fbd6d4aa7ec438dbe1566b76b0e98c

                SHA1

                09e940c297496e77eb08f7fe7c44e2705a7014fd

                SHA256

                da7c53b9af5c4dbb4794820f763043726d0d092c046f27eec81c44dd547ca88e

                SHA512

                7c23c04c38f4106ef4426f5c77c305a8be8a1257b79794617594e267d09718248c7eb0ff463a0cf368ead45a04a11e0d20300b328a7c85a221a80f25b22c68a6

              • C:\Users\Admin\AppData\Local\Temp\Sepawuaopqtypsq.tmp

                Filesize

                3.3MB

                MD5

                8b9c0f72deaf2ee06e7441209cbe4ffb

                SHA1

                34912f3c7f4285d85497c96e95c33e5d6a597c97

                SHA256

                1e7242ac7c025b87636e59c07e3601f1bbf5894ce0b23709405b6fefbca4dabe

                SHA512

                db8fb980b6331f494fea8dd4adf6d8724c9ad1a7a2048c6d91e49d9e81fc83700c1195854efc5dcbe2b3aef8d94b5f0ddd7ae8910f40b9cdab017e381f855cd7

              • memory/1424-143-0x0000000000000000-mapping.dmp

              • memory/1896-153-0x00000000001D0000-0x00000000001D3000-memory.dmp

                Filesize

                12KB

              • memory/1896-151-0x00000000001B0000-0x00000000001B3000-memory.dmp

                Filesize

                12KB

              • memory/1896-155-0x00000000001E0000-0x00000000001E3000-memory.dmp

                Filesize

                12KB

              • memory/1896-152-0x00000000001C0000-0x00000000001C3000-memory.dmp

                Filesize

                12KB

              • memory/1896-149-0x0000000000000000-mapping.dmp

              • memory/1896-154-0x00000000001E0000-0x00000000001E3000-memory.dmp

                Filesize

                12KB

              • memory/1896-150-0x00000000001A0000-0x00000000001A3000-memory.dmp

                Filesize

                12KB

              • memory/2680-168-0x0000000000000000-mapping.dmp

              • memory/2680-169-0x0000000003760000-0x0000000004223000-memory.dmp

                Filesize

                10.8MB

              • memory/2680-170-0x00000000043A0000-0x00000000044E0000-memory.dmp

                Filesize

                1.2MB

              • memory/2680-174-0x0000000003760000-0x0000000004223000-memory.dmp

                Filesize

                10.8MB

              • memory/2680-171-0x00000000043A0000-0x00000000044E0000-memory.dmp

                Filesize

                1.2MB

              • memory/2680-172-0x00000000012F0000-0x0000000001C94000-memory.dmp

                Filesize

                9.6MB

              • memory/2680-173-0x0000000003760000-0x0000000004223000-memory.dmp

                Filesize

                10.8MB

              • memory/3052-147-0x0000000000400000-0x00000000006CE000-memory.dmp

                Filesize

                2.8MB

              • memory/3052-164-0x0000000003DA0000-0x0000000003EE0000-memory.dmp

                Filesize

                1.2MB

              • memory/3052-175-0x0000000003050000-0x0000000003B13000-memory.dmp

                Filesize

                10.8MB

              • memory/3052-148-0x0000000000400000-0x00000000006CE000-memory.dmp

                Filesize

                2.8MB

              • memory/3052-137-0x0000000000000000-mapping.dmp

              • memory/3052-146-0x0000000000400000-0x00000000006CE000-memory.dmp

                Filesize

                2.8MB

              • memory/3052-145-0x0000000000400000-0x00000000006CE000-memory.dmp

                Filesize

                2.8MB

              • memory/3052-158-0x0000000003050000-0x0000000003B13000-memory.dmp

                Filesize

                10.8MB

              • memory/3052-159-0x0000000003050000-0x0000000003B13000-memory.dmp

                Filesize

                10.8MB

              • memory/3052-160-0x0000000003DA0000-0x0000000003EE0000-memory.dmp

                Filesize

                1.2MB

              • memory/3052-161-0x0000000003DA0000-0x0000000003EE0000-memory.dmp

                Filesize

                1.2MB

              • memory/3052-162-0x0000000003DA0000-0x0000000003EE0000-memory.dmp

                Filesize

                1.2MB

              • memory/3052-163-0x0000000003DA0000-0x0000000003EE0000-memory.dmp

                Filesize

                1.2MB

              • memory/3052-157-0x0000000003050000-0x0000000003B13000-memory.dmp

                Filesize

                10.8MB

              • memory/3052-165-0x0000000003DA0000-0x0000000003EE0000-memory.dmp

                Filesize

                1.2MB

              • memory/3052-166-0x0000000003DA0000-0x0000000003EE0000-memory.dmp

                Filesize

                1.2MB

              • memory/3052-167-0x0000000003DA0000-0x0000000003EE0000-memory.dmp

                Filesize

                1.2MB

              • memory/3052-144-0x0000000002500000-0x00000000027C2000-memory.dmp

                Filesize

                2.8MB

              • memory/3052-140-0x000000000098C000-0x0000000000AAA000-memory.dmp

                Filesize

                1.1MB

              • memory/3052-141-0x0000000002500000-0x00000000027C2000-memory.dmp

                Filesize

                2.8MB

              • memory/3052-142-0x0000000000400000-0x00000000006CE000-memory.dmp

                Filesize

                2.8MB

              • memory/3172-134-0x00000000001F0000-0x00000000001F9000-memory.dmp

                Filesize

                36KB

              • memory/3172-135-0x0000000000400000-0x0000000000597000-memory.dmp

                Filesize

                1.6MB

              • memory/3172-136-0x0000000000400000-0x0000000000597000-memory.dmp

                Filesize

                1.6MB

              • memory/3172-133-0x0000000000670000-0x0000000000770000-memory.dmp

                Filesize

                1024KB