Analysis

  • max time kernel
    131s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2022 16:34

General

  • Target

    lapov.exe

  • Size

    1.1MB

  • MD5

    8f4070594e2008388c46be164a59d9ae

  • SHA1

    bbbfde91f46f1bbfc8139bdd1d44e7a22e185b69

  • SHA256

    37b5287743c5de46c17952589bdc3632a5083450f799f6c8f314afa613f4ae34

  • SHA512

    2897cdbe665f83cebe00fbffa91a0674c756a12fa8ff2da0dba32fb7076bf286cc0d1e17f8ab50dcbc456365ef85caca56b318d9bf50e32b0ee1e1cb3b7ebfb8

  • SSDEEP

    24576:D4MwERrcsuCg2luv/4QwWU7kTV4t83ZUcwFP:MhMcsBl2whOHUDFP

Malware Config

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 3 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 26 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lapov.exe
    "C:\Users\Admin\AppData\Local\Temp\lapov.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp",Sufeidweoe
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 23973
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1756
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k LocalService
    1⤵
    • Loads dropped DLL
    PID:1536
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windows media player\en-us\adobecollabsync.dll",PxskNDhXQjE=
      2⤵
        PID:1668

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Help_MValidator.Lck

      Filesize

      4B

      MD5

      b485167c5b0e59d47009a16f90fe2659

      SHA1

      891ebccd5baa32daed16fb5a0825ca7a4464931f

      SHA256

      db44b8db4f05d720ef1a57abadeed0c164d47b17416c7dd7d136d8f10fba91c9

      SHA512

      665e3fcbd83b7876dd1dc7f34fadd8669debdfab8962bdce3b72b08139a75ef157c4f4c3b90ea9c1f20637bb4f2a29091d9186987d22c7d23428a2e7ccf80bd4

    • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\MySharePoints.ico

      Filesize

      340KB

      MD5

      1f24dae5e9da4d6e021683d7d03fb528

      SHA1

      c986d8e34f84c7b2e931a7ff61eb307ef8789f0d

      SHA256

      241b42c7911a7c36ae89c45366397384f91145fe39308352f0242c357505e06b

      SHA512

      b1e6e9d4e2ff4cd1b452de1ae14b40e436cc82f22251cbc87788742145000d650b522544bba9085ba36f5cab43d9e4481a7b8ef46acb280da6bd83ab0441b58d

    • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Shpetph.tmp

      Filesize

      2.3MB

      MD5

      86e578167602631e05dac4cc81d321e3

      SHA1

      1a835cc448219b8614fed7b863a9371c725e0269

      SHA256

      b3e22376d29de926c31a02831406a12feb799826d90838d2ef2cc687be51f7da

      SHA512

      bd8ab9ba4c38a65523469cf0d723d3e43ac5c2079eab4fe454c3e3f8480ad24d8b0b01a137cd40a34348d728e5a01db983600b6408a8d8ce63f4dedaf6c980dc

    • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Shpetph.tmp

      Filesize

      2.3MB

      MD5

      5771cd4feb7ff11528817643011f0ebe

      SHA1

      d3f5d49e54fe14c5b694a3c630976fbad3982550

      SHA256

      fc15ee638f73c7a993989083db5c978f8afeb7df57081bc89bb68c83e185b043

      SHA512

      1378cf7d459670d2b54631c9ef9eb75e1b4735342936e91cc350b22911124e720647ffe24426987fd98d0a0af46681267ae831291a488673c1296fc16bc9525d

    • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\VISINTL.DLL.trx_dll

      Filesize

      462KB

      MD5

      13097a116f09601935ab89fdbb604402

      SHA1

      6da82026200b90dde4dd61359cf559e2c3c77863

      SHA256

      bc65e3c6f0ca6ffffcf885836f3b9372a8774c47c2bd260158619804cd8b8c5f

      SHA512

      ff60810d07c76badb62fa074d49addd40ab8fb936c4c2a24bf2d1a78f0e9395bbc4de19e5aa4d8e7e5d0234ec3dbc6cd49788f83fa94e1bdf9d933c8d4ab19fd

    • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\tasks.xml

      Filesize

      11KB

      MD5

      6ab160b8998020e6d4373c003e9879d4

      SHA1

      efa87d3fb95a73a892ed88b08651c44fe03c150f

      SHA256

      faf021b3c06abc41a9fb8e021171fd0ea41684b732a8e77433e447af8e527516

      SHA512

      c923c48b0b5c741777666ca161864879defd50c299ae76d9f093ffb846d144600c99d281d879f9328509061f3ae6784a706f15248e0fed7bfd7a595b389aae1b

    • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\usertile10.bmp

      Filesize

      48KB

      MD5

      3b20f5e18b71fcd1d72cfc04349c721f

      SHA1

      3438a78d3c3b5a9c65a0f5f1d0110adda4d501f3

      SHA256

      8bf0705e02cfee4457efbaef3cc5f5aeb680d20dcbd7c8d893f386da85baafa4

      SHA512

      d7eed3b09ebcd4d9e9dacb4f306d5dea2283ac855242dbb66236547666a0699844a85b3edc21ef0b5313ad050465dd2b7184f8cf0b264b981fc85bdd455cde28

    • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\usertile18.bmp

      Filesize

      48KB

      MD5

      1ef0b094eb051cfc99e3dfa991c669c5

      SHA1

      2534e234cbed0ccd69f53208069686ec5c617ccb

      SHA256

      2e6c724b2aae160291a7df88d394514535171833eba1dd20204f9d5788f0f878

      SHA512

      13d11abccfef086046efa0957156189235bb2df8186ea143278ba557039b285beb55d990096456ad9d67ba700fe8644dd1ffa75d2c64b2a36ee2a9a8d6978342

    • C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp

      Filesize

      726KB

      MD5

      6ea8a6cc5fed6c664df1b3ef7c56b55d

      SHA1

      6b244d708706441095ae97294928967ddf28432b

      SHA256

      2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe

      SHA512

      4a328a66df407e4c9fa230287104771ea3b5dd8265d60314797426101a8be19d13bc57de2388f0f90b20ada82d950e156ef4267c029080a6254b80eefd8b8741

    • \??\c:\program files (x86)\windows media player\en-us\adobecollabsync.dll

      Filesize

      726KB

      MD5

      c8230916ed6b560b98fddb509fa7bf7e

      SHA1

      f96fdc687bf8dd4170f7395b33e8fcde05fbb52e

      SHA256

      c4b239645759f9394f1fa2ec6198ba49ab2b41dd6c338a79047ffdc9a2da332b

      SHA512

      8c60df609d2371dc7ccd878eb2e263b13de3e2e7214150d06ef33f0090d44678b620875106c36a088a90a30a69a1266c04e6b35f13537d3933960c3e75799064

    • \Program Files (x86)\Windows Media Player\en-US\AdobeCollabSync.dll

      Filesize

      726KB

      MD5

      c8230916ed6b560b98fddb509fa7bf7e

      SHA1

      f96fdc687bf8dd4170f7395b33e8fcde05fbb52e

      SHA256

      c4b239645759f9394f1fa2ec6198ba49ab2b41dd6c338a79047ffdc9a2da332b

      SHA512

      8c60df609d2371dc7ccd878eb2e263b13de3e2e7214150d06ef33f0090d44678b620875106c36a088a90a30a69a1266c04e6b35f13537d3933960c3e75799064

    • \Program Files (x86)\Windows Media Player\en-US\AdobeCollabSync.dll

      Filesize

      726KB

      MD5

      c8230916ed6b560b98fddb509fa7bf7e

      SHA1

      f96fdc687bf8dd4170f7395b33e8fcde05fbb52e

      SHA256

      c4b239645759f9394f1fa2ec6198ba49ab2b41dd6c338a79047ffdc9a2da332b

      SHA512

      8c60df609d2371dc7ccd878eb2e263b13de3e2e7214150d06ef33f0090d44678b620875106c36a088a90a30a69a1266c04e6b35f13537d3933960c3e75799064

    • \Program Files (x86)\Windows Media Player\en-US\AdobeCollabSync.dll

      Filesize

      726KB

      MD5

      c8230916ed6b560b98fddb509fa7bf7e

      SHA1

      f96fdc687bf8dd4170f7395b33e8fcde05fbb52e

      SHA256

      c4b239645759f9394f1fa2ec6198ba49ab2b41dd6c338a79047ffdc9a2da332b

      SHA512

      8c60df609d2371dc7ccd878eb2e263b13de3e2e7214150d06ef33f0090d44678b620875106c36a088a90a30a69a1266c04e6b35f13537d3933960c3e75799064

    • \Program Files (x86)\Windows Media Player\en-US\AdobeCollabSync.dll

      Filesize

      726KB

      MD5

      c8230916ed6b560b98fddb509fa7bf7e

      SHA1

      f96fdc687bf8dd4170f7395b33e8fcde05fbb52e

      SHA256

      c4b239645759f9394f1fa2ec6198ba49ab2b41dd6c338a79047ffdc9a2da332b

      SHA512

      8c60df609d2371dc7ccd878eb2e263b13de3e2e7214150d06ef33f0090d44678b620875106c36a088a90a30a69a1266c04e6b35f13537d3933960c3e75799064

    • \Program Files (x86)\Windows Media Player\en-US\AdobeCollabSync.dll

      Filesize

      726KB

      MD5

      c8230916ed6b560b98fddb509fa7bf7e

      SHA1

      f96fdc687bf8dd4170f7395b33e8fcde05fbb52e

      SHA256

      c4b239645759f9394f1fa2ec6198ba49ab2b41dd6c338a79047ffdc9a2da332b

      SHA512

      8c60df609d2371dc7ccd878eb2e263b13de3e2e7214150d06ef33f0090d44678b620875106c36a088a90a30a69a1266c04e6b35f13537d3933960c3e75799064

    • \Program Files\Mozilla Firefox\firefox.exe

      Filesize

      562KB

      MD5

      d388df6ed5ccbf1acdeda5af2d18cb0b

      SHA1

      124d3c2ba93644ac6c2d7253de242b46be836692

      SHA256

      8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

      SHA512

      f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

    • \Program Files\Mozilla Firefox\firefox.exe

      Filesize

      562KB

      MD5

      d388df6ed5ccbf1acdeda5af2d18cb0b

      SHA1

      124d3c2ba93644ac6c2d7253de242b46be836692

      SHA256

      8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

      SHA512

      f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

    • \Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp

      Filesize

      726KB

      MD5

      6ea8a6cc5fed6c664df1b3ef7c56b55d

      SHA1

      6b244d708706441095ae97294928967ddf28432b

      SHA256

      2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe

      SHA512

      4a328a66df407e4c9fa230287104771ea3b5dd8265d60314797426101a8be19d13bc57de2388f0f90b20ada82d950e156ef4267c029080a6254b80eefd8b8741

    • memory/1336-81-0x0000000004690000-0x0000000004DB5000-memory.dmp

      Filesize

      7.1MB

    • memory/1336-68-0x0000000004000000-0x0000000004140000-memory.dmp

      Filesize

      1.2MB

    • memory/1336-56-0x0000000000000000-mapping.dmp

    • memory/1336-63-0x0000000004690000-0x0000000004DB5000-memory.dmp

      Filesize

      7.1MB

    • memory/1336-65-0x0000000004690000-0x0000000004DB5000-memory.dmp

      Filesize

      7.1MB

    • memory/1336-66-0x0000000004690000-0x0000000004DB5000-memory.dmp

      Filesize

      7.1MB

    • memory/1336-67-0x0000000004000000-0x0000000004140000-memory.dmp

      Filesize

      1.2MB

    • memory/1336-69-0x0000000004000000-0x0000000004140000-memory.dmp

      Filesize

      1.2MB

    • memory/1336-74-0x0000000004000000-0x0000000004140000-memory.dmp

      Filesize

      1.2MB

    • memory/1336-73-0x0000000004000000-0x0000000004140000-memory.dmp

      Filesize

      1.2MB

    • memory/1336-72-0x0000000004000000-0x0000000004140000-memory.dmp

      Filesize

      1.2MB

    • memory/1504-57-0x0000000000520000-0x00000000005F6000-memory.dmp

      Filesize

      856KB

    • memory/1504-55-0x0000000075F01000-0x0000000075F03000-memory.dmp

      Filesize

      8KB

    • memory/1504-54-0x0000000000520000-0x00000000005F6000-memory.dmp

      Filesize

      856KB

    • memory/1504-60-0x0000000000400000-0x0000000000517000-memory.dmp

      Filesize

      1.1MB

    • memory/1504-58-0x0000000001E30000-0x0000000001F45000-memory.dmp

      Filesize

      1.1MB

    • memory/1536-86-0x00000000039B0000-0x00000000040D5000-memory.dmp

      Filesize

      7.1MB

    • memory/1536-108-0x00000000039B0000-0x00000000040D5000-memory.dmp

      Filesize

      7.1MB

    • memory/1536-88-0x00000000039B0000-0x00000000040D5000-memory.dmp

      Filesize

      7.1MB

    • memory/1668-105-0x0000000003910000-0x0000000004035000-memory.dmp

      Filesize

      7.1MB

    • memory/1668-95-0x0000000000000000-mapping.dmp

    • memory/1668-104-0x0000000003910000-0x0000000004035000-memory.dmp

      Filesize

      7.1MB

    • memory/1668-102-0x0000000003910000-0x0000000004035000-memory.dmp

      Filesize

      7.1MB

    • memory/1756-77-0x0000000002250000-0x0000000002390000-memory.dmp

      Filesize

      1.2MB

    • memory/1756-78-0x000007FEFBE41000-0x000007FEFBE43000-memory.dmp

      Filesize

      8KB

    • memory/1756-79-0x0000000000280000-0x0000000000499000-memory.dmp

      Filesize

      2.1MB

    • memory/1756-80-0x0000000001EE0000-0x000000000210A000-memory.dmp

      Filesize

      2.2MB

    • memory/1756-76-0x0000000002250000-0x0000000002390000-memory.dmp

      Filesize

      1.2MB

    • memory/1756-70-0x0000000000280000-0x0000000000499000-memory.dmp

      Filesize

      2.1MB

    • memory/1756-75-0x00000000FFC93CEC-mapping.dmp