Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2022 19:40

General

  • Target

    b3a1633cf2b87e4084d7c61a92a36c8c5fca4c926a7eed0916653712618033b1.exe

  • Size

    1.1MB

  • MD5

    0632c99ab43231f1f8b7c7f6bc8e30d8

  • SHA1

    ea284fc244536dd7f1ef4990879a554cd1375671

  • SHA256

    b3a1633cf2b87e4084d7c61a92a36c8c5fca4c926a7eed0916653712618033b1

  • SHA512

    56dc4e12f80d175901acf8be0d3fa9512ce581774caaa6593a49b1369219022ebfa098e1ba47930f7619174f7afa4b0155bcac4d83162841b40899458cd1c643

  • SSDEEP

    24576:hqWuDPN+TiDuI5YjWNLsWU+ZeUCzhaaaQpGwFP:Ici0jaLelVEnQpxFP

Malware Config

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 4 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3a1633cf2b87e4084d7c61a92a36c8c5fca4c926a7eed0916653712618033b1.exe
    "C:\Users\Admin\AppData\Local\Temp\b3a1633cf2b87e4084d7c61a92a36c8c5fca4c926a7eed0916653712618033b1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4816
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp",Wufaiiuuye
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:4716
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14100
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:2168
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:456
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:3276
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 532
          2⤵
          • Program crash
          PID:1652
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4816 -ip 4816
        1⤵
          PID:2000
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:4240
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe -k LocalService
            1⤵
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4684
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windowspowershell\modules\aiodlite.dll",jERIVQ==
              2⤵
              • Loads dropped DLL
              • Checks processor information in registry
              PID:2252

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\WindowsPowerShell\Modules\AiodLite.dll

            Filesize

            797KB

            MD5

            5e580baa9ac7d2dc073b06731c20e221

            SHA1

            81801f2b36c5773e10a483ed238afe3f17aba6b8

            SHA256

            aee09601d5a6327caabcd1ec8911373e7ef0c74fcae2153a46b392aba86ef41d

            SHA512

            346a8caf6d940da8a116592ea22a94da09573d36369f1eb91753bda30ef370250b70b03768d744b8366493f41015b119909e794e2d6e5adcef947b5a9aa8f0f8

          • C:\Program Files (x86)\WindowsPowerShell\Modules\AiodLite.dll

            Filesize

            797KB

            MD5

            5e580baa9ac7d2dc073b06731c20e221

            SHA1

            81801f2b36c5773e10a483ed238afe3f17aba6b8

            SHA256

            aee09601d5a6327caabcd1ec8911373e7ef0c74fcae2153a46b392aba86ef41d

            SHA512

            346a8caf6d940da8a116592ea22a94da09573d36369f1eb91753bda30ef370250b70b03768d744b8366493f41015b119909e794e2d6e5adcef947b5a9aa8f0f8

          • C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\154E23D0-C644-4E6F-8CE6-5069272F999F.vsch

            Filesize

            158B

            MD5

            dd8778eda0b96d5d71716fbb50300293

            SHA1

            17b3a49fe039ef5c930801c3a77922b30a61ee69

            SHA256

            61e06f4deff92e80d1605cb17a0c83604ac6cdb72fb3d4b1e3d0eb7e7bbbf4a0

            SHA512

            4efee799ddfb3d98a6b402aebed2ec79cfbd1cab200bfad1f95af432b91ce11e0404cd1cdf9f5a46324757c135928cb0ce42197c3021ae506ac6dd047127491b

          • C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\C2RManifest.osmmui.msi.16.en-us.xml

            Filesize

            10KB

            MD5

            3ef69b2c0f15e6b97fca1141bc9beb9a

            SHA1

            421916704e31978eb77421161bb170003a83c1a2

            SHA256

            f3e25cf6f3fdd2017b76701290ba9599384dd2084111545f6da078502cae29cc

            SHA512

            cec4a92eb852d731571a4e1098f195b2f3d84a5fde17c5e6ba5d3e7464f2352fe25cb67b051078f0742696b0aa862960e0203c2231df1552534c06539149427d

          • C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\Fwroes.tmp

            Filesize

            2.3MB

            MD5

            dc6cb0613948a2e9f1d62b1b509c0b1b

            SHA1

            a336cef6589cdf6630fdc3dc07566ac70dcae8a5

            SHA256

            5b1f4db87a730d82fda4a6878fe362a71be9b4e86a610a478182e1b5f2d723f8

            SHA512

            7c261aa6ca11cc87f633e3a308e881d0abfa85132916a028687ad5d1f8e30e3825d2514478efbfdef3b624da7936b6d112702cc76b312b04289630cc57f1846d

          • C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\Microsoft.People_2019.305.632.0_neutral_~_8wekyb3d8bbwe.xml

            Filesize

            15KB

            MD5

            c73eeb9dedd94a612969e003260e6341

            SHA1

            0451277183bad12e3179c12c0a14694fab52bc8d

            SHA256

            1ee54a9294af6727770aff79f2c901cd40ca23dfb4803788042aada54146e355

            SHA512

            d78542d9c74efeac1d925d9d05c691c5543d04e6b671a5ef160f0fafc3b4444d327cf37206d78f43b607f817b6545cb9673b85d713b8c59d0c97103aee55245a

          • C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp

            Filesize

            797KB

            MD5

            24925b25552a7d8f1d3292071e545920

            SHA1

            f786e1d40df30f6fed0301d60c823b655f2d6eac

            SHA256

            9931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b

            SHA512

            242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26

          • C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp

            Filesize

            797KB

            MD5

            24925b25552a7d8f1d3292071e545920

            SHA1

            f786e1d40df30f6fed0301d60c823b655f2d6eac

            SHA256

            9931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b

            SHA512

            242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26

          • \??\c:\program files (x86)\windowspowershell\modules\aiodlite.dll

            Filesize

            797KB

            MD5

            5e580baa9ac7d2dc073b06731c20e221

            SHA1

            81801f2b36c5773e10a483ed238afe3f17aba6b8

            SHA256

            aee09601d5a6327caabcd1ec8911373e7ef0c74fcae2153a46b392aba86ef41d

            SHA512

            346a8caf6d940da8a116592ea22a94da09573d36369f1eb91753bda30ef370250b70b03768d744b8366493f41015b119909e794e2d6e5adcef947b5a9aa8f0f8

          • memory/456-164-0x0000000000000000-mapping.dmp

          • memory/2168-148-0x000002719BB40000-0x000002719BC80000-memory.dmp

            Filesize

            1.2MB

          • memory/2168-146-0x00007FF662C46890-mapping.dmp

          • memory/2168-147-0x000002719BB40000-0x000002719BC80000-memory.dmp

            Filesize

            1.2MB

          • memory/2168-149-0x0000000000EC0000-0x00000000010D9000-memory.dmp

            Filesize

            2.1MB

          • memory/2168-150-0x000002719A150000-0x000002719A37A000-memory.dmp

            Filesize

            2.2MB

          • memory/2252-159-0x0000000000000000-mapping.dmp

          • memory/2252-163-0x0000000004620000-0x0000000004D45000-memory.dmp

            Filesize

            7.1MB

          • memory/2252-162-0x0000000004620000-0x0000000004D45000-memory.dmp

            Filesize

            7.1MB

          • memory/3276-165-0x0000000000000000-mapping.dmp

          • memory/4684-155-0x0000000003B40000-0x0000000004265000-memory.dmp

            Filesize

            7.1MB

          • memory/4684-161-0x0000000003B40000-0x0000000004265000-memory.dmp

            Filesize

            7.1MB

          • memory/4684-166-0x0000000003B40000-0x0000000004265000-memory.dmp

            Filesize

            7.1MB

          • memory/4716-143-0x0000000004D80000-0x0000000004EC0000-memory.dmp

            Filesize

            1.2MB

          • memory/4716-142-0x0000000004D80000-0x0000000004EC0000-memory.dmp

            Filesize

            1.2MB

          • memory/4716-139-0x0000000005140000-0x0000000005865000-memory.dmp

            Filesize

            7.1MB

          • memory/4716-138-0x0000000005140000-0x0000000005865000-memory.dmp

            Filesize

            7.1MB

          • memory/4716-151-0x0000000005140000-0x0000000005865000-memory.dmp

            Filesize

            7.1MB

          • memory/4716-140-0x0000000004D80000-0x0000000004EC0000-memory.dmp

            Filesize

            1.2MB

          • memory/4716-132-0x0000000000000000-mapping.dmp

          • memory/4716-145-0x0000000004D80000-0x0000000004EC0000-memory.dmp

            Filesize

            1.2MB

          • memory/4716-144-0x0000000004D80000-0x0000000004EC0000-memory.dmp

            Filesize

            1.2MB

          • memory/4716-141-0x0000000004D80000-0x0000000004EC0000-memory.dmp

            Filesize

            1.2MB

          • memory/4816-136-0x0000000002400000-0x0000000002530000-memory.dmp

            Filesize

            1.2MB

          • memory/4816-137-0x0000000000400000-0x0000000000531000-memory.dmp

            Filesize

            1.2MB

          • memory/4816-135-0x000000000230B000-0x00000000023F9000-memory.dmp

            Filesize

            952KB