Analysis

  • max time kernel
    148s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2022 17:21

General

  • Target

    tmp.exe

  • Size

    1.0MB

  • MD5

    1a61e55fa3fd1dc5cbf63d91e6c5a93b

  • SHA1

    0f68fc53fafb875aa9150ab4d39b8b5015cac684

  • SHA256

    30b818c6458a2626eee09c58a2f02f11568c85a3011b4fde5b601cf8972d8a2a

  • SHA512

    975c9594a3583bd72d550c57ddd60bec585c87f556aa8118ed4288f0f77e69473a11c0d889692e758363ecdb4c4e9abb6c3d7bb01cc173051bddb9e46ca598d8

  • SSDEEP

    24576:iEGwNZdOMFdGiOlPwFU0yB8zuj+9LJwFP:UwNLKiOlPEjyfOuFP

Malware Config

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 4 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 46 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp",Sufeidweoe
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:1592
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 23979
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:5040
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:4936
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:452
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 536
          2⤵
          • Program crash
          PID:1044
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3464 -ip 3464
        1⤵
          PID:4212
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:3056
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe -k LocalService
            1⤵
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3120
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windowspowershell\modules\bibutils.dll",awhjQQ==
              2⤵
              • Loads dropped DLL
              • Checks processor information in registry
              PID:4060

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\WindowsPowerShell\Modules\BIBUtils.dll

            Filesize

            726KB

            MD5

            2ed0ae21663cd33729c7b4a622c0ad29

            SHA1

            50ba3d0df795e8f3380213e0b7c8bc5c7a812f7c

            SHA256

            0aea91179f12f27a4487c4afff0fc4b0b449965a396dacd9527ff46a815ce871

            SHA512

            51bf6e4359ff7e10658a45560cb21d8753747d363504f4d36446559050d530a4037a47ecc3b417c2de8b53ebc3010754f45a693d3ea51cad62412779ebbea83c

          • C:\Program Files (x86)\WindowsPowerShell\Modules\BIBUtils.dll

            Filesize

            726KB

            MD5

            2ed0ae21663cd33729c7b4a622c0ad29

            SHA1

            50ba3d0df795e8f3380213e0b7c8bc5c7a812f7c

            SHA256

            0aea91179f12f27a4487c4afff0fc4b0b449965a396dacd9527ff46a815ce871

            SHA512

            51bf6e4359ff7e10658a45560cb21d8753747d363504f4d36446559050d530a4037a47ecc3b417c2de8b53ebc3010754f45a693d3ea51cad62412779ebbea83c

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\C2RManifest.excelmui.msi.16.en-us.xml

            Filesize

            39KB

            MD5

            93b791b81e660e839ef91e881d0d40ba

            SHA1

            f28bf43cb01d5d6f0714b40c0183c0f920704b7a

            SHA256

            94e7e8449e52aa41decd74e1fa8bc6d688a1fc1e6dcbd015ff19ece64dedfe32

            SHA512

            3bfff8518d32d599f29c254b9f1de7337d49aa027ff0c0c3345698695a87ddc145c13855e7a7a434f7d29eaa60ce44161b47e40a95df8c54c686dadaf894ec63

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\DeploymentConfig.2.xml

            Filesize

            1KB

            MD5

            3793544370ec1fddcf5ba6ae099f2538

            SHA1

            c784c5d8d1c496ab7ba1150782d20cba67b76321

            SHA256

            87975551187040cc2505a12ac285c042b8e70921a55808ecf982c7cd37df0ae2

            SHA512

            debdde56e6e087ff04863490223229d37828e348f7630d6c33aae1f113cce4be75f1420c593268ef5f5bd3026dccb062015781ba83dcaffa2b9bb37b55efc319

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Microsoft.AccountsControl_10.0.19041.1023_neutral__cw5n1h2txyewy.xml

            Filesize

            13KB

            MD5

            c7405e2e68aec89e44862595ccc0d186

            SHA1

            2cc8d73f93dd875134917795633bb606911f1069

            SHA256

            9a9adc35b9debbd0ded2aa1684769afd7fbb09b2e1afa20b19893de5fdbabe37

            SHA512

            0cb3190812b404ff0cc32bc0442c8e0cc26ee989fbcab7284b21dbd134664f1b38fd3cb7e9a98898dd64b445ace1a117bd00cac793336fb25a819e17c60cab22

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe.xml

            Filesize

            7KB

            MD5

            cc4cc0e085cfafe9c540f7a6a4cad93e

            SHA1

            8982a1b3d8f3d8bc37b1c12f9a7f594723d03247

            SHA256

            fa0819943729b9c38d89e92fcbc31ba393b49baa524bfa4ee9f2f471f8fcf756

            SHA512

            b8f591ee4b5b241025a0d583efed50fb548a180599bc4dab2f7b978da4daf08ca917e539354e2510aaca35257854034de3e3f3a8242eaa71f5ec9c4b3dc289d5

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-125_8wekyb3d8bbwe.xml

            Filesize

            839B

            MD5

            5ddffd275e173019cb301fe2c96a2f3f

            SHA1

            0303cebf14f4304d93733426aee485e4bf7efe29

            SHA256

            d1e768a7bb7a5851697a2a5bec63670c9d90b72d1f77169ef231c265b9cb8272

            SHA512

            e92f31f56dc2f5dfa0963978239303d2c5755b5bfa363910f18e5168703d3ddfc506ad522915b90f9d489997a66a3db780762e750a658ac7835b75d8d299684a

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Shpetph.tmp

            Filesize

            2.3MB

            MD5

            1bcfaa6dd7a5e1ee78e74066e350dc5e

            SHA1

            72fe0dd30e9733836c08c7013b74905c4933ada6

            SHA256

            65e89b599a212a9b191546b53c30f1928742bbb0a11de9bc2b7794b08ff61b00

            SHA512

            aba8b333f23220c6f432335a13818d4d737cbd3e0a8c671d7086bae25a379ac7d79f94e741240cbc2749368132cb5838143275e06dd2a583a76795d029225dc1

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\background.png

            Filesize

            126KB

            MD5

            9adaf3a844ce0ce36bfed07fa2d7ef66

            SHA1

            3a804355d5062a6d2ed9653d66e9e4aebaf90bc0

            SHA256

            d3e8d47e8c1622ec10adef672ca7a8992748c4f0a4e75f877462e7e661069698

            SHA512

            e6988737153a0996b14e6baa45e8010ff46714fe7679d05a2676cc18e1c653e99227e7507cdae4f2b6a99b3c31478630e7e1ae13d0f7c12525406d8cf9867ca5

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\qmgr.db

            Filesize

            768KB

            MD5

            28162e7b1ec7202327a487f83d38a873

            SHA1

            ae1052802005d2f0e1aaf378bbba3a7c80176896

            SHA256

            53a3d757852db77bf8fda088c34d7759508f1c6af57e998aa1be96cba8557a17

            SHA512

            345cbbbb1a62ff1f340bd66b5afafa8de10eecbf1a5126eb0fae080914c4d1a09e69c93f3f84a70ac0443d0aeff530fbc187db4c3078ebb1443e36b527b6800b

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\resource.xml

            Filesize

            1KB

            MD5

            93a100713ff56b66e15f984d3100aab7

            SHA1

            4ffb9e5c0d7687a38cc9b9f767bd4b9d4a325656

            SHA256

            0c80edf0d6699061728f917d731ea29e7ad3c7f2ea067d4510a01369255cbd26

            SHA512

            df8b5e56e9dcf0c3e4737e8ab878a4182c757d731f8e893c0285fa5e5d89faec75f4f1f0e8fbf2d502a28632410198ae6dfed82ac5a593d23cf5c2bd59c3c4fc

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\user-192.png

            Filesize

            2KB

            MD5

            00974aab6b9832933e8ac609e50e5dce

            SHA1

            6fa57587c15d3de9c9ace6da93ab80830bd87771

            SHA256

            7e9997f40d13b32c724ca4ecef283f377ce9965d31534167994e654d6e6623b6

            SHA512

            c104286c58629920fa51b5f764c409b87ce9cbff3ea33d634cfa5d7804294a345c5e4150780f84d85c8a7a0aea7d6089eb4f31494096a4c5e9982364f9ad2e47

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\user-48.png

            Filesize

            617B

            MD5

            e738274439f0bcf555425a00af9a2f75

            SHA1

            cf0d5425bda34e865bc73601ac299d425d9064ef

            SHA256

            191e237f5a862cdbafa4562bebf080680a051d2c07b4f256c9b856f10d63d010

            SHA512

            2c2c1ccb38d14150dcb89249c3a2ee995e9467fb99ea20cc4819c4a683b50be0753b04264048084ae2611399b56736ca50d7a94dd98bd3dd055f430471188c8d

          • C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp

            Filesize

            726KB

            MD5

            6ea8a6cc5fed6c664df1b3ef7c56b55d

            SHA1

            6b244d708706441095ae97294928967ddf28432b

            SHA256

            2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe

            SHA512

            4a328a66df407e4c9fa230287104771ea3b5dd8265d60314797426101a8be19d13bc57de2388f0f90b20ada82d950e156ef4267c029080a6254b80eefd8b8741

          • C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp

            Filesize

            726KB

            MD5

            6ea8a6cc5fed6c664df1b3ef7c56b55d

            SHA1

            6b244d708706441095ae97294928967ddf28432b

            SHA256

            2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe

            SHA512

            4a328a66df407e4c9fa230287104771ea3b5dd8265d60314797426101a8be19d13bc57de2388f0f90b20ada82d950e156ef4267c029080a6254b80eefd8b8741

          • \??\c:\program files (x86)\windowspowershell\modules\bibutils.dll

            Filesize

            726KB

            MD5

            2ed0ae21663cd33729c7b4a622c0ad29

            SHA1

            50ba3d0df795e8f3380213e0b7c8bc5c7a812f7c

            SHA256

            0aea91179f12f27a4487c4afff0fc4b0b449965a396dacd9527ff46a815ce871

            SHA512

            51bf6e4359ff7e10658a45560cb21d8753747d363504f4d36446559050d530a4037a47ecc3b417c2de8b53ebc3010754f45a693d3ea51cad62412779ebbea83c

          • memory/452-174-0x0000000000000000-mapping.dmp

          • memory/1592-135-0x0000000000000000-mapping.dmp

          • memory/1592-139-0x0000000004890000-0x0000000004FB5000-memory.dmp

            Filesize

            7.1MB

          • memory/1592-149-0x0000000004529000-0x000000000452B000-memory.dmp

            Filesize

            8KB

          • memory/1592-140-0x0000000004890000-0x0000000004FB5000-memory.dmp

            Filesize

            7.1MB

          • memory/1592-153-0x0000000004890000-0x0000000004FB5000-memory.dmp

            Filesize

            7.1MB

          • memory/1592-141-0x00000000044B0000-0x00000000045F0000-memory.dmp

            Filesize

            1.2MB

          • memory/1592-145-0x00000000044B0000-0x00000000045F0000-memory.dmp

            Filesize

            1.2MB

          • memory/1592-142-0x00000000044B0000-0x00000000045F0000-memory.dmp

            Filesize

            1.2MB

          • memory/1592-143-0x00000000044B0000-0x00000000045F0000-memory.dmp

            Filesize

            1.2MB

          • memory/1592-146-0x00000000044B0000-0x00000000045F0000-memory.dmp

            Filesize

            1.2MB

          • memory/1592-144-0x00000000044B0000-0x00000000045F0000-memory.dmp

            Filesize

            1.2MB

          • memory/3120-157-0x0000000003170000-0x0000000003895000-memory.dmp

            Filesize

            7.1MB

          • memory/3120-175-0x0000000003170000-0x0000000003895000-memory.dmp

            Filesize

            7.1MB

          • memory/3120-171-0x0000000003170000-0x0000000003895000-memory.dmp

            Filesize

            7.1MB

          • memory/3464-133-0x00000000024E0000-0x00000000025F5000-memory.dmp

            Filesize

            1.1MB

          • memory/3464-132-0x00000000023FD000-0x00000000024D3000-memory.dmp

            Filesize

            856KB

          • memory/3464-134-0x0000000000400000-0x0000000000517000-memory.dmp

            Filesize

            1.1MB

          • memory/3464-138-0x0000000000400000-0x0000000000517000-memory.dmp

            Filesize

            1.1MB

          • memory/4060-170-0x0000000004920000-0x0000000005045000-memory.dmp

            Filesize

            7.1MB

          • memory/4060-168-0x0000000000000000-mapping.dmp

          • memory/4060-172-0x0000000004920000-0x0000000005045000-memory.dmp

            Filesize

            7.1MB

          • memory/4060-176-0x0000000004920000-0x0000000005045000-memory.dmp

            Filesize

            7.1MB

          • memory/4936-173-0x0000000000000000-mapping.dmp

          • memory/5040-147-0x00007FF619046890-mapping.dmp

          • memory/5040-148-0x000002AF09EE0000-0x000002AF0A020000-memory.dmp

            Filesize

            1.2MB

          • memory/5040-152-0x000002AF0A030000-0x000002AF0A25A000-memory.dmp

            Filesize

            2.2MB

          • memory/5040-151-0x0000000000C40000-0x0000000000E59000-memory.dmp

            Filesize

            2.1MB

          • memory/5040-150-0x000002AF09EE0000-0x000002AF0A020000-memory.dmp

            Filesize

            1.2MB