Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2022 17:00

General

  • Target

    30b818c6458a2626eee09c58a2f02f11568c85a3011b4fde5b601cf8972d8a2a.exe

  • Size

    1.0MB

  • MD5

    1a61e55fa3fd1dc5cbf63d91e6c5a93b

  • SHA1

    0f68fc53fafb875aa9150ab4d39b8b5015cac684

  • SHA256

    30b818c6458a2626eee09c58a2f02f11568c85a3011b4fde5b601cf8972d8a2a

  • SHA512

    975c9594a3583bd72d550c57ddd60bec585c87f556aa8118ed4288f0f77e69473a11c0d889692e758363ecdb4c4e9abb6c3d7bb01cc173051bddb9e46ca598d8

  • SSDEEP

    24576:iEGwNZdOMFdGiOlPwFU0yB8zuj+9LJwFP:UwNLKiOlPEjyfOuFP

Malware Config

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 4 IoCs
  • Sets DLL path for service in the registry 2 TTPs 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30b818c6458a2626eee09c58a2f02f11568c85a3011b4fde5b601cf8972d8a2a.exe
    "C:\Users\Admin\AppData\Local\Temp\30b818c6458a2626eee09c58a2f02f11568c85a3011b4fde5b601cf8972d8a2a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5100
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp",Sufeidweoe
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:3000
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 23993
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1600
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:2012
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:4692
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 536
          2⤵
          • Program crash
          PID:956
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5100 -ip 5100
        1⤵
          PID:2548
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:4928
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe -k LocalService
            1⤵
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1532
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windowspowershell\modules\s_filetype_psd.dll",LykGbA==
              2⤵
              • Loads dropped DLL
              • Checks processor information in registry
              PID:1336

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\WindowsPowerShell\Modules\s_filetype_psd.dll
            Filesize

            726KB

            MD5

            07fddc498f43769c00e97d483ff175a3

            SHA1

            292e5f78178ae4b9c02c39c09eda91d460f264c6

            SHA256

            f56a63af4d66086a101a1941d563f16af631c7c0a5066d4b36e88b9af965138d

            SHA512

            7848c156252d9670dd3b78d7384843490ec58717fc3bd37cffc1f034a9749108c39d0b00b35dd2eba33db6cad66c7a9f39d4c387789de2e1fca06154d9e5da3e

          • C:\Program Files (x86)\WindowsPowerShell\Modules\s_filetype_psd.dll
            Filesize

            726KB

            MD5

            07fddc498f43769c00e97d483ff175a3

            SHA1

            292e5f78178ae4b9c02c39c09eda91d460f264c6

            SHA256

            f56a63af4d66086a101a1941d563f16af631c7c0a5066d4b36e88b9af965138d

            SHA512

            7848c156252d9670dd3b78d7384843490ec58717fc3bd37cffc1f034a9749108c39d0b00b35dd2eba33db6cad66c7a9f39d4c387789de2e1fca06154d9e5da3e

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Microsoft.People_10.1902.633.0_neutral_split.scale-125_8wekyb3d8bbwe.xml
            Filesize

            829B

            MD5

            87abe99363b16041e32b8a146eb53617

            SHA1

            b1f3f3c3939f2331dee213e480f4a4d0c753f72a

            SHA256

            7c8df7b34fca6387a15cbc0d6f591624a5a28bf513f71eb1077d55f1b448d856

            SHA512

            091ffae18e7cf41237b1039964cb4c3116275edfa34b198bbb9a0b258a99bf3b62b420fb22d747788a889f2306c30f0dc00566c432d4b2bb2e410a9e7dc69e44

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\MicrosoftOffice2013BackupWin64.xml
            Filesize

            12KB

            MD5

            d24bea7d3b999f28e375d1d061a03d97

            SHA1

            95b207708762aa4752c77728128cbe3033646204

            SHA256

            57184b71b7d7525fbd75b1dda77bd26a5344b5cbd58ec5070fa5e1b4e073aef2

            SHA512

            3d3f06cd59a5bf8e9284ed1972a373ac1c63b0cba997d9559834db748ec41a90e42650d0ba05bf351456c2de12970f79d2d34f7a6c6445d2e55812682a5b406e

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\MicrosoftOutlook2013CAWin32.xml
            Filesize

            1KB

            MD5

            42acdf1f7faad8e138134083a57424bd

            SHA1

            f6b05b2eba7723ed2b61c698377053b05ee8eeb5

            SHA256

            91bcc8d78d76422bf8a162c10d96ce91435470d8601290ddcbe3216c3bb7009c

            SHA512

            ca976b96bb036d2a72a61f5d0da83de6e4deb694353ca57e3016124db4a041c3ba7391bb1f508e3fa010b0f412df2b71b3acbaa5ad99c189beace9fcc5193abb

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Shpetph.tmp
            Filesize

            2.3MB

            MD5

            df088f42962660a3b900da916aef2317

            SHA1

            b0acf3a0cf581e4fa883ca41005cd263c345d87f

            SHA256

            b1f4a5372a2f85f2c6209d5f93637e6cc16b5118366c3f525b915aa7479e4820

            SHA512

            4d3c2e11965f08bf7c467339b0e5bb5303bdcbdff7a9a01bff7acb8953ccb4fdac683e5ab400c8e323cc1f7fd521d527aa9749997f4ab7d9ddaf829f54f561bd

          • C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp
            Filesize

            726KB

            MD5

            6ea8a6cc5fed6c664df1b3ef7c56b55d

            SHA1

            6b244d708706441095ae97294928967ddf28432b

            SHA256

            2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe

            SHA512

            4a328a66df407e4c9fa230287104771ea3b5dd8265d60314797426101a8be19d13bc57de2388f0f90b20ada82d950e156ef4267c029080a6254b80eefd8b8741

          • C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp
            Filesize

            726KB

            MD5

            6ea8a6cc5fed6c664df1b3ef7c56b55d

            SHA1

            6b244d708706441095ae97294928967ddf28432b

            SHA256

            2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe

            SHA512

            4a328a66df407e4c9fa230287104771ea3b5dd8265d60314797426101a8be19d13bc57de2388f0f90b20ada82d950e156ef4267c029080a6254b80eefd8b8741

          • \??\c:\program files (x86)\windowspowershell\modules\s_filetype_psd.dll
            Filesize

            726KB

            MD5

            07fddc498f43769c00e97d483ff175a3

            SHA1

            292e5f78178ae4b9c02c39c09eda91d460f264c6

            SHA256

            f56a63af4d66086a101a1941d563f16af631c7c0a5066d4b36e88b9af965138d

            SHA512

            7848c156252d9670dd3b78d7384843490ec58717fc3bd37cffc1f034a9749108c39d0b00b35dd2eba33db6cad66c7a9f39d4c387789de2e1fca06154d9e5da3e

          • memory/1336-160-0x0000000000000000-mapping.dmp
          • memory/1532-156-0x0000000003CB0000-0x00000000043D5000-memory.dmp
            Filesize

            7.1MB

          • memory/1532-162-0x0000000003CB0000-0x00000000043D5000-memory.dmp
            Filesize

            7.1MB

          • memory/1532-165-0x0000000003CB0000-0x00000000043D5000-memory.dmp
            Filesize

            7.1MB

          • memory/1600-148-0x00000159F2A60000-0x00000159F2BA0000-memory.dmp
            Filesize

            1.2MB

          • memory/1600-151-0x00000159F1220000-0x00000159F144A000-memory.dmp
            Filesize

            2.2MB

          • memory/1600-147-0x00000159F2A60000-0x00000159F2BA0000-memory.dmp
            Filesize

            1.2MB

          • memory/1600-146-0x00007FF6018F6890-mapping.dmp
          • memory/1600-150-0x0000000000CE0000-0x0000000000EF9000-memory.dmp
            Filesize

            2.1MB

          • memory/2012-163-0x0000000000000000-mapping.dmp
          • memory/3000-142-0x0000000004900000-0x0000000004A40000-memory.dmp
            Filesize

            1.2MB

          • memory/3000-141-0x0000000004900000-0x0000000004A40000-memory.dmp
            Filesize

            1.2MB

          • memory/3000-145-0x0000000004900000-0x0000000004A40000-memory.dmp
            Filesize

            1.2MB

          • memory/3000-144-0x0000000004900000-0x0000000004A40000-memory.dmp
            Filesize

            1.2MB

          • memory/3000-143-0x0000000004900000-0x0000000004A40000-memory.dmp
            Filesize

            1.2MB

          • memory/3000-149-0x0000000004979000-0x000000000497B000-memory.dmp
            Filesize

            8KB

          • memory/3000-139-0x0000000004060000-0x0000000004785000-memory.dmp
            Filesize

            7.1MB

          • memory/3000-152-0x0000000004060000-0x0000000004785000-memory.dmp
            Filesize

            7.1MB

          • memory/3000-140-0x0000000004900000-0x0000000004A40000-memory.dmp
            Filesize

            1.2MB

          • memory/3000-138-0x0000000004060000-0x0000000004785000-memory.dmp
            Filesize

            7.1MB

          • memory/3000-132-0x0000000000000000-mapping.dmp
          • memory/4692-164-0x0000000000000000-mapping.dmp
          • memory/5100-136-0x0000000002420000-0x0000000002535000-memory.dmp
            Filesize

            1.1MB

          • memory/5100-137-0x0000000000400000-0x0000000000517000-memory.dmp
            Filesize

            1.1MB

          • memory/5100-135-0x00000000022BC000-0x0000000002392000-memory.dmp
            Filesize

            856KB