Analysis

  • max time kernel
    133s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2022 20:20

General

  • Target

    36cfa0e234d289738ca43878f695c4ed58de0e2db30edb6521d96c881ab14c7f.exe

  • Size

    1.1MB

  • MD5

    b37a57c505e70d01d3b135a7a578652d

  • SHA1

    558ff0476094928488e2104c30f7d51526842f98

  • SHA256

    36cfa0e234d289738ca43878f695c4ed58de0e2db30edb6521d96c881ab14c7f

  • SHA512

    62aa6d56c0dec7b43b9c44e60c68b4e56173e4910828f07e9769b2c19621eb1cc7ae6ef76509e56136622c90cd8b8510b28b4c4d5a528100691a1a279c2b1d9d

  • SSDEEP

    24576:F5G1C2Ade8gBYEwNFZhyAPIRO5zruI+OUgjkL2GBWbFHQI:O1C2omSNFq2+I2ISggL2sIH

Malware Config

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 4 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 48 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36cfa0e234d289738ca43878f695c4ed58de0e2db30edb6521d96c881ab14c7f.exe
    "C:\Users\Admin\AppData\Local\Temp\36cfa0e234d289738ca43878f695c4ed58de0e2db30edb6521d96c881ab14c7f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5016
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp",Wufaiiuuye
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4804
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14130
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:2172
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:1980
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:3116
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 528
          2⤵
          • Program crash
          PID:2356
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5016 -ip 5016
        1⤵
          PID:2728
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:2768
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe -k LocalService
            1⤵
            • Loads dropped DLL
            • Checks processor information in registry
            PID:2304
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windowspowershell\modules\forms_distributed.dll",ZBlLcDdzNw==
              2⤵
                PID:1172

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\WindowsPowerShell\Modules\forms_distributed.dll

              Filesize

              797KB

              MD5

              19f5da9be70d40e5391c881cfd2e5e37

              SHA1

              066ca08c2a08b2a58031009d017dd1f96ad18d6d

              SHA256

              d77fc836d12f83e8f9966ebfd96c186060e3260bda7fb22e5f77a06da128cf68

              SHA512

              2e4a79f56529bae259d034ba00641b94866558bd8fd7eeaf21d7d9ba810d014750449aa779d33e834bbc8031e7bd5ef5f0dd906b2ea54a5f9f61557f3db9f867

            • C:\Program Files (x86)\WindowsPowerShell\Modules\forms_distributed.dll

              Filesize

              797KB

              MD5

              19f5da9be70d40e5391c881cfd2e5e37

              SHA1

              066ca08c2a08b2a58031009d017dd1f96ad18d6d

              SHA256

              d77fc836d12f83e8f9966ebfd96c186060e3260bda7fb22e5f77a06da128cf68

              SHA512

              2e4a79f56529bae259d034ba00641b94866558bd8fd7eeaf21d7d9ba810d014750449aa779d33e834bbc8031e7bd5ef5f0dd906b2ea54a5f9f61557f3db9f867

            • C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\EventStore.db

              Filesize

              20KB

              MD5

              3aee4f856582f8548c3c910d1112c8ca

              SHA1

              f7a2af6e15359a0752d4a971a442008ae0f583ed

              SHA256

              61986768c35b97c771b1a9cf2df03055f2cf3099a0c9d11dd657b8ff615d4ccc

              SHA512

              0a80ce18344a09a59d42f615e51a27cbf51c081f2273611bcaad1c73681f8161e94175ecb06d3e16e1283f4a556e239b726013176898039c8160e77f72d8b235

            • C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\Fwroes.tmp

              Filesize

              2.3MB

              MD5

              e8d7bc3d92d84f0520b18a7db8f90a9f

              SHA1

              c8ad5b8bf1467eace5c9f2b2578f4af44207da28

              SHA256

              b7b50cc26cb8a93b4701344ecbe0e4a3bbc1d9daa60dbd3918dfb085fc6500b7

              SHA512

              b4c8d821bed4b154d8df3bbc8ea07dc5e4fd76ae0066c754053d07e0a84c5e1a12741817b4c3e5ba55a4e60b350bada46582570e5444c542082334079ef84b22

            • C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_~_8wekyb3d8bbwe.xml

              Filesize

              27KB

              MD5

              539930de67b99bab23fe2c67000eeddb

              SHA1

              6b0e5ece46ecb0b019ec71caa44facf122647059

              SHA256

              2f578443ca2045e8432f4a39bcd367ae343405e8daf368dff91e9198fa1a658c

              SHA512

              ddddcd7011ad0fb53fc816056a6df2045a7956158c009d8a708eafd0b2eaeccc55a847c96894ee04542315cec373165efc0e331da6316ceb9e5768f8861946ce

            • C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\folder.ico

              Filesize

              52KB

              MD5

              bbf9dbdc079c0cd95f78d728aa3912d4

              SHA1

              051f76cc8c6520768bac9559bb329abeebd70d7c

              SHA256

              bef53904908769ceeb60f8e0976c3194e73534f00f4afb65497c2091121b98b2

              SHA512

              af110c52c983f1cf55b3db7d375e03c8c9308e3cf9ee1c154c2b25cb3f8299f0c0ba87b47445f09f98659eb536184c245887a341733c11af713e9ecc15288b5d

            • C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\sync.ico

              Filesize

              48KB

              MD5

              d1c012ba7049a4525a89b26c846ce0d3

              SHA1

              769fccd1ed39b3b6ce1ec6e44f096107b4375c58

              SHA256

              fce3d2b3ca14bbb41fcb8956ef80af38976f4c32787cc1ac3cc1e465ce0453cc

              SHA512

              538b3c161e3192d3cb8b78f0fb5f863ae84d04a9f236a876e5002a90189cb4b5beea496aefb444de2dd9ea45d1f530359b38d6a45f3260d1d14924bd31918dc9

            • C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\utc.app.json.bk

              Filesize

              97KB

              MD5

              88c043569385c9ae4da32d9b76a36ca7

              SHA1

              8dafc9b176b635ebfa229c0b4c069ebf84a6900d

              SHA256

              c47d2586f5483d5de2fee7784d080d740fe35835af55d3cac26636fd08c18a80

              SHA512

              cef81fd0172d5f988f87734e3acbe7562f555b30359821563b704f167dbf16a8b318a5ffa8a039e6e473b76ef12dc5cf1c65ce1bb9a6ca316fbad0a227092ff8

            • C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\wmp.ico

              Filesize

              110KB

              MD5

              589ff0b7d4d0d3fced65c3eae6559657

              SHA1

              4be3e4221a429b347888bbe3635e377271974c7f

              SHA256

              0e96c027d23a57e95103d1b64e4c5b8a153402f05b756dfcb737459476aaae35

              SHA512

              4a12bac3f61964d6c5608bbb9067d7673cd5e5a22463f6d16f402954045692f43ef1ea32d405f452d415c859c30b217e9d250a1c5c85cfd629bd393824b6523b

            • C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp

              Filesize

              797KB

              MD5

              24925b25552a7d8f1d3292071e545920

              SHA1

              f786e1d40df30f6fed0301d60c823b655f2d6eac

              SHA256

              9931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b

              SHA512

              242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26

            • C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp

              Filesize

              797KB

              MD5

              24925b25552a7d8f1d3292071e545920

              SHA1

              f786e1d40df30f6fed0301d60c823b655f2d6eac

              SHA256

              9931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b

              SHA512

              242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26

            • \??\c:\program files (x86)\windowspowershell\modules\forms_distributed.dll

              Filesize

              797KB

              MD5

              19f5da9be70d40e5391c881cfd2e5e37

              SHA1

              066ca08c2a08b2a58031009d017dd1f96ad18d6d

              SHA256

              d77fc836d12f83e8f9966ebfd96c186060e3260bda7fb22e5f77a06da128cf68

              SHA512

              2e4a79f56529bae259d034ba00641b94866558bd8fd7eeaf21d7d9ba810d014750449aa779d33e834bbc8031e7bd5ef5f0dd906b2ea54a5f9f61557f3db9f867

            • memory/1172-164-0x0000000000000000-mapping.dmp

            • memory/1172-166-0x0000000004260000-0x0000000004985000-memory.dmp

              Filesize

              7.1MB

            • memory/1172-167-0x0000000004260000-0x0000000004985000-memory.dmp

              Filesize

              7.1MB

            • memory/1980-168-0x0000000000000000-mapping.dmp

            • memory/2172-150-0x0000000000430000-0x0000000000649000-memory.dmp

              Filesize

              2.1MB

            • memory/2172-148-0x000001E94C0B0000-0x000001E94C1F0000-memory.dmp

              Filesize

              1.2MB

            • memory/2172-151-0x000001E94A6E0000-0x000001E94A90A000-memory.dmp

              Filesize

              2.2MB

            • memory/2172-149-0x000001E94C0B0000-0x000001E94C1F0000-memory.dmp

              Filesize

              1.2MB

            • memory/2172-147-0x00007FF7D1AC6890-mapping.dmp

            • memory/2304-170-0x0000000003110000-0x0000000003835000-memory.dmp

              Filesize

              7.1MB

            • memory/2304-163-0x0000000003110000-0x0000000003835000-memory.dmp

              Filesize

              7.1MB

            • memory/2304-156-0x0000000003110000-0x0000000003835000-memory.dmp

              Filesize

              7.1MB

            • memory/3116-169-0x0000000000000000-mapping.dmp

            • memory/4804-143-0x00000000045F0000-0x0000000004730000-memory.dmp

              Filesize

              1.2MB

            • memory/4804-139-0x0000000005480000-0x0000000005BA5000-memory.dmp

              Filesize

              7.1MB

            • memory/4804-144-0x00000000045F0000-0x0000000004730000-memory.dmp

              Filesize

              1.2MB

            • memory/4804-142-0x00000000045F0000-0x0000000004730000-memory.dmp

              Filesize

              1.2MB

            • memory/4804-140-0x00000000045F0000-0x0000000004730000-memory.dmp

              Filesize

              1.2MB

            • memory/4804-141-0x00000000045F0000-0x0000000004730000-memory.dmp

              Filesize

              1.2MB

            • memory/4804-146-0x00000000045F0000-0x0000000004730000-memory.dmp

              Filesize

              1.2MB

            • memory/4804-145-0x0000000004669000-0x000000000466B000-memory.dmp

              Filesize

              8KB

            • memory/4804-138-0x0000000005480000-0x0000000005BA5000-memory.dmp

              Filesize

              7.1MB

            • memory/4804-132-0x0000000000000000-mapping.dmp

            • memory/4804-152-0x0000000005480000-0x0000000005BA5000-memory.dmp

              Filesize

              7.1MB

            • memory/5016-133-0x000000000229C000-0x000000000238B000-memory.dmp

              Filesize

              956KB

            • memory/5016-135-0x0000000002390000-0x00000000024C0000-memory.dmp

              Filesize

              1.2MB

            • memory/5016-137-0x0000000000400000-0x0000000000531000-memory.dmp

              Filesize

              1.2MB