Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17-12-2022 05:35

General

  • Target

    5c2f63b8821678ad4328e01f7b4512febdd8cff2ba762d6577744844514fbc3f.exe

  • Size

    214KB

  • MD5

    e05542960134ab0160c8c7f7a17aca89

  • SHA1

    58ece723af6a27e0125b846ea6b3edd5f64fe241

  • SHA256

    5c2f63b8821678ad4328e01f7b4512febdd8cff2ba762d6577744844514fbc3f

  • SHA512

    dc24e81ea1aee15e756347728914ee49b52ccb335ce1dc5e256d4e14a69ef1eb108aeb5067090edafb2c0fc1a8b8c7ecd8798a0c37721c79c5ea38c508f363e2

  • SSDEEP

    3072:n5j8GLg0XpaaTR2R/5uxsppYxiq8LszNKq/o40zwUzQRKF+:5JLg0XMRY6Ip8gzUQo40M2b

Malware Config

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detect rhadamanthys stealer shellcode 2 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 8 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 43 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • c:\windows\system32\taskhostw.exe
    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
    1⤵
      PID:2500
      • C:\Windows\SYSWOW64\fontview.exe
        "C:\Windows\SYSWOW64\fontview.exe"
        2⤵
          PID:4140
      • C:\Users\Admin\AppData\Local\Temp\5c2f63b8821678ad4328e01f7b4512febdd8cff2ba762d6577744844514fbc3f.exe
        "C:\Users\Admin\AppData\Local\Temp\5c2f63b8821678ad4328e01f7b4512febdd8cff2ba762d6577744844514fbc3f.exe"
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:328
      • C:\Users\Admin\AppData\Local\Temp\21EF.exe
        C:\Users\Admin\AppData\Local\Temp\21EF.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:1212
        • C:\Users\Admin\AppData\Local\Temp\Eewfhetyyyrtfpd.exe
          "C:\Users\Admin\AppData\Local\Temp\Eewfhetyyyrtfpd.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:4536
        • C:\Windows\syswow64\rundll32.exe
          "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
          2⤵
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious use of FindShellTrayWindow
          PID:4192
      • C:\Users\Admin\AppData\Local\Temp\6E5B.exe
        C:\Users\Admin\AppData\Local\Temp\6E5B.exe
        1⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4308
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
          2⤵
            PID:656
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
            2⤵
              PID:3988
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
              2⤵
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Checks SCSI registry key(s)
              • Suspicious use of AdjustPrivilegeToken
              PID:4980

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\21EF.exe

            Filesize

            5.6MB

            MD5

            7bca245090dace95e87bb3d9b230c4d7

            SHA1

            83e13902c00fd1a621dcd96a36c8862ff0b61606

            SHA256

            ba21117d135d43225c06751e0b8ac91522b765442984d097cedcd7386ab81dac

            SHA512

            f306d838e4380c516aed968aaea87524d4ccf6bad9a17d85a3f8f8fa6d90042b8b2d8e67d3aff4bda63ee5759a6369a7d5aca3aaa97e0d5c5f8149c79ecb2abc

          • C:\Users\Admin\AppData\Local\Temp\21EF.exe

            Filesize

            5.6MB

            MD5

            7bca245090dace95e87bb3d9b230c4d7

            SHA1

            83e13902c00fd1a621dcd96a36c8862ff0b61606

            SHA256

            ba21117d135d43225c06751e0b8ac91522b765442984d097cedcd7386ab81dac

            SHA512

            f306d838e4380c516aed968aaea87524d4ccf6bad9a17d85a3f8f8fa6d90042b8b2d8e67d3aff4bda63ee5759a6369a7d5aca3aaa97e0d5c5f8149c79ecb2abc

          • C:\Users\Admin\AppData\Local\Temp\6E5B.exe

            Filesize

            1.4MB

            MD5

            1ea8aaf997bbebac62ec8031d9304100

            SHA1

            e8b7a1aeae449fc28310c8244bc6940d94adabb6

            SHA256

            bf52f8def7e804055268e9f17bd8fc91edea479e7d719f9335035bfc71ef21bd

            SHA512

            04217d1f733e56ce32aa96758941ebd6171242f7ff3f7ed8694247aae61a9b6d1b2fa1d0477612acda5a60a32f47af690dce7fdc4c388d337ddf5fce12335b96

          • C:\Users\Admin\AppData\Local\Temp\6E5B.exe

            Filesize

            1.4MB

            MD5

            1ea8aaf997bbebac62ec8031d9304100

            SHA1

            e8b7a1aeae449fc28310c8244bc6940d94adabb6

            SHA256

            bf52f8def7e804055268e9f17bd8fc91edea479e7d719f9335035bfc71ef21bd

            SHA512

            04217d1f733e56ce32aa96758941ebd6171242f7ff3f7ed8694247aae61a9b6d1b2fa1d0477612acda5a60a32f47af690dce7fdc4c388d337ddf5fce12335b96

          • C:\Users\Admin\AppData\Local\Temp\Eewfhetyyyrtfpd.exe

            Filesize

            2.4MB

            MD5

            e7053575255acd45d4213d866123dbaf

            SHA1

            95fa5a2178eb1dd6a445685b3ab2905c11045d0c

            SHA256

            794be0b98421623959185a060092be697fa695a73268ab8a46c7ab12655df62b

            SHA512

            e934ae1bb4cef1e71cf1905655bcb5979f8f70944817de88204d8bebf3a36300b7b282d0bd711cc41ae5e69f91b6e14576b7a8098ee283d29bdb451d98238401

          • C:\Users\Admin\AppData\Local\Temp\Eewfhetyyyrtfpd.exe

            Filesize

            2.4MB

            MD5

            e7053575255acd45d4213d866123dbaf

            SHA1

            95fa5a2178eb1dd6a445685b3ab2905c11045d0c

            SHA256

            794be0b98421623959185a060092be697fa695a73268ab8a46c7ab12655df62b

            SHA512

            e934ae1bb4cef1e71cf1905655bcb5979f8f70944817de88204d8bebf3a36300b7b282d0bd711cc41ae5e69f91b6e14576b7a8098ee283d29bdb451d98238401

          • \Users\Admin\AppData\Local\Temp\advapi32.dll

            Filesize

            262KB

            MD5

            564c99014ae888f17308f74816badcd6

            SHA1

            2611cec6d45c980cf51d08f0551a8cbdceee415a

            SHA256

            45a3a376d60c8b6fe1f231fd2119d1226d76a5d8682e7129635e67589252e628

            SHA512

            e5843a3e716b9aefebe19b9bda79cec5098f67dffea384b67afa8c13305a92a7b7fb5fd4a4f8664efd2a193fbdee5077f3d6da3789fa75352cf5f8c57e77870f

          • memory/328-145-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-144-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-129-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-130-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-131-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-132-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-133-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-134-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-135-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-136-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-137-0x00000000006B1000-0x00000000006C1000-memory.dmp

            Filesize

            64KB

          • memory/328-138-0x0000000000550000-0x000000000069A000-memory.dmp

            Filesize

            1.3MB

          • memory/328-139-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-140-0x0000000000400000-0x0000000000452000-memory.dmp

            Filesize

            328KB

          • memory/328-141-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-142-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-143-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-121-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-120-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-146-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-147-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-148-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-149-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-150-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-151-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-152-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-153-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-122-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-155-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-156-0x0000000000400000-0x0000000000452000-memory.dmp

            Filesize

            328KB

          • memory/328-127-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-123-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-124-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-125-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-128-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-154-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-126-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-189-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-171-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-163-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-190-0x0000000000D70000-0x00000000012ED000-memory.dmp

            Filesize

            5.5MB

          • memory/1212-169-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-170-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-164-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-172-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-173-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-162-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-161-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-157-0x0000000000000000-mapping.dmp

          • memory/1212-177-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-178-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-179-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-180-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-181-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-182-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-183-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-184-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-185-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-186-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-187-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-188-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-192-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-160-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-168-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-198-0x0000000000400000-0x00000000009BE000-memory.dmp

            Filesize

            5.7MB

          • memory/1212-191-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-165-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-194-0x0000000002B90000-0x000000000314D000-memory.dmp

            Filesize

            5.7MB

          • memory/1212-175-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-159-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-268-0x0000000006BF0000-0x0000000007315000-memory.dmp

            Filesize

            7.1MB

          • memory/1212-450-0x0000000000400000-0x00000000009BE000-memory.dmp

            Filesize

            5.7MB

          • memory/1212-174-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-393-0x0000000006BF0000-0x0000000007315000-memory.dmp

            Filesize

            7.1MB

          • memory/1212-176-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/1212-387-0x0000000000400000-0x00000000009BE000-memory.dmp

            Filesize

            5.7MB

          • memory/1212-386-0x0000000000D70000-0x00000000012ED000-memory.dmp

            Filesize

            5.5MB

          • memory/4140-593-0x0000000002600000-0x0000000002629000-memory.dmp

            Filesize

            164KB

          • memory/4140-594-0x00000000029C0000-0x00000000029DD000-memory.dmp

            Filesize

            116KB

          • memory/4140-555-0x0000000002600000-0x0000000002629000-memory.dmp

            Filesize

            164KB

          • memory/4140-517-0x0000000000000000-mapping.dmp

          • memory/4192-334-0x0000000000400000-0x0000000000A05000-memory.dmp

            Filesize

            6.0MB

          • memory/4192-357-0x0000000004460000-0x0000000004B85000-memory.dmp

            Filesize

            7.1MB

          • memory/4192-384-0x0000000000400000-0x0000000000A05000-memory.dmp

            Filesize

            6.0MB

          • memory/4192-275-0x0000000000A95FB0-mapping.dmp

          • memory/4192-385-0x0000000004460000-0x0000000004B85000-memory.dmp

            Filesize

            7.1MB

          • memory/4308-422-0x0000000002520000-0x0000000002649000-memory.dmp

            Filesize

            1.2MB

          • memory/4308-554-0x000000000FA00000-0x000000000FC6F000-memory.dmp

            Filesize

            2.4MB

          • memory/4308-511-0x0000000002520000-0x0000000002649000-memory.dmp

            Filesize

            1.2MB

          • memory/4308-388-0x0000000000000000-mapping.dmp

          • memory/4308-452-0x000000000FA00000-0x000000000FC6F000-memory.dmp

            Filesize

            2.4MB

          • memory/4536-215-0x0000000000000000-mapping.dmp

          • memory/4980-620-0x0000000000400000-0x0000000000427000-memory.dmp

            Filesize

            156KB

          • memory/4980-512-0x0000000000400000-0x0000000000427000-memory.dmp

            Filesize

            156KB

          • memory/4980-574-0x0000000001100000-0x000000000111D000-memory.dmp

            Filesize

            116KB

          • memory/4980-575-0x00000000032E0000-0x00000000034B0000-memory.dmp

            Filesize

            1.8MB