Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-12-2022 20:23

General

  • Target

    350bc8a075df7398bf36d979c2bfaa4e91917533b6c9082d291f8fca600d4bdf.exe

  • Size

    304KB

  • MD5

    410a8d5cf7b996f1cc0d7db9714d3e1d

  • SHA1

    19db193da1056e5c93dbc7065f818f2a20ebd7c1

  • SHA256

    350bc8a075df7398bf36d979c2bfaa4e91917533b6c9082d291f8fca600d4bdf

  • SHA512

    e6885f67314a8c84af17c83f2aa77e26e81ec989daee5da1bd883ba86f5a352b4b71d81c724ed84ce54f6e7d14bd922e3f7cf19bb0847427da30464d77eddec4

  • SSDEEP

    6144:DLmDVAGvMT+gggLtT8Tm362df1Jv/63QZImQKG0:D+VALT+gggLtT8Tm36Cf1VgQZW

Score
10/10

Malware Config

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 23 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\350bc8a075df7398bf36d979c2bfaa4e91917533b6c9082d291f8fca600d4bdf.exe
    "C:\Users\Admin\AppData\Local\Temp\350bc8a075df7398bf36d979c2bfaa4e91917533b6c9082d291f8fca600d4bdf.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4036
  • C:\Users\Admin\AppData\Local\Temp\CE9F.exe
    C:\Users\Admin\AppData\Local\Temp\CE9F.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp",Wufaiiuuye
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14106
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4360
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1876

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CE9F.exe

      Filesize

      1.1MB

      MD5

      b37a57c505e70d01d3b135a7a578652d

      SHA1

      558ff0476094928488e2104c30f7d51526842f98

      SHA256

      36cfa0e234d289738ca43878f695c4ed58de0e2db30edb6521d96c881ab14c7f

      SHA512

      62aa6d56c0dec7b43b9c44e60c68b4e56173e4910828f07e9769b2c19621eb1cc7ae6ef76509e56136622c90cd8b8510b28b4c4d5a528100691a1a279c2b1d9d

    • C:\Users\Admin\AppData\Local\Temp\CE9F.exe

      Filesize

      1.1MB

      MD5

      b37a57c505e70d01d3b135a7a578652d

      SHA1

      558ff0476094928488e2104c30f7d51526842f98

      SHA256

      36cfa0e234d289738ca43878f695c4ed58de0e2db30edb6521d96c881ab14c7f

      SHA512

      62aa6d56c0dec7b43b9c44e60c68b4e56173e4910828f07e9769b2c19621eb1cc7ae6ef76509e56136622c90cd8b8510b28b4c4d5a528100691a1a279c2b1d9d

    • C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp

      Filesize

      797KB

      MD5

      24925b25552a7d8f1d3292071e545920

      SHA1

      f786e1d40df30f6fed0301d60c823b655f2d6eac

      SHA256

      9931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b

      SHA512

      242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26

    • \Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp

      Filesize

      797KB

      MD5

      24925b25552a7d8f1d3292071e545920

      SHA1

      f786e1d40df30f6fed0301d60c823b655f2d6eac

      SHA256

      9931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b

      SHA512

      242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26

    • memory/2280-179-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-157-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-204-0x0000000000400000-0x0000000000531000-memory.dmp

      Filesize

      1.2MB

    • memory/2280-190-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-160-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-189-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-187-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-186-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-185-0x0000000000400000-0x0000000000531000-memory.dmp

      Filesize

      1.2MB

    • memory/2280-183-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-184-0x0000000002360000-0x0000000002490000-memory.dmp

      Filesize

      1.2MB

    • memory/2280-159-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-182-0x0000000002190000-0x0000000002288000-memory.dmp

      Filesize

      992KB

    • memory/2280-181-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-178-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-180-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-176-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-177-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-175-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-174-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-173-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-172-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-170-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-169-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-168-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-167-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-166-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-165-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-164-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-163-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-188-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-158-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-153-0x0000000000000000-mapping.dmp

    • memory/2280-161-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-155-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2280-156-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-139-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-136-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-132-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-144-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-120-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-151-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-150-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-149-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-119-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-148-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-147-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-146-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-145-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-142-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-143-0x0000000000400000-0x0000000000452000-memory.dmp

      Filesize

      328KB

    • memory/4036-121-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-141-0x0000000000460000-0x000000000050E000-memory.dmp

      Filesize

      696KB

    • memory/4036-140-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-138-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-137-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-116-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-152-0x0000000000400000-0x0000000000452000-memory.dmp

      Filesize

      328KB

    • memory/4036-135-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-134-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-133-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-129-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-130-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-128-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-127-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-126-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-125-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-124-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-123-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-117-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-122-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-118-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4248-201-0x0000000000000000-mapping.dmp

    • memory/4248-302-0x00000000068A0000-0x0000000006FC5000-memory.dmp

      Filesize

      7.1MB

    • memory/4248-317-0x0000000006539000-0x000000000653B000-memory.dmp

      Filesize

      8KB

    • memory/4248-320-0x00000000068A0000-0x0000000006FC5000-memory.dmp

      Filesize

      7.1MB

    • memory/4360-312-0x00007FF620175FD0-mapping.dmp

    • memory/4360-318-0x0000000000020000-0x0000000000239000-memory.dmp

      Filesize

      2.1MB

    • memory/4360-319-0x000002BBCF390000-0x000002BBCF5BA000-memory.dmp

      Filesize

      2.2MB