Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2022 09:55

General

  • Target

    8f4070594e2008388c46be164a59d9ae.exe

  • Size

    1.1MB

  • MD5

    8f4070594e2008388c46be164a59d9ae

  • SHA1

    bbbfde91f46f1bbfc8139bdd1d44e7a22e185b69

  • SHA256

    37b5287743c5de46c17952589bdc3632a5083450f799f6c8f314afa613f4ae34

  • SHA512

    2897cdbe665f83cebe00fbffa91a0674c756a12fa8ff2da0dba32fb7076bf286cc0d1e17f8ab50dcbc456365ef85caca56b318d9bf50e32b0ee1e1cb3b7ebfb8

  • SSDEEP

    24576:D4MwERrcsuCg2luv/4QwWU7kTV4t83ZUcwFP:MhMcsBl2whOHUDFP

Malware Config

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 2 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 58 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f4070594e2008388c46be164a59d9ae.exe
    "C:\Users\Admin\AppData\Local\Temp\8f4070594e2008388c46be164a59d9ae.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4656
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp",Sufeidweoe
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:4888
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 23958
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:3800
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:1544
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:3080
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 528
          2⤵
          • Program crash
          PID:2324
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4656 -ip 4656
        1⤵
          PID:4884
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:1816
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe -k LocalService
            1⤵
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1224
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windowspowershell\modules\cpdf_full..dll",dkcvOHQ=
              2⤵
              • Loads dropped DLL
              • Checks processor information in registry
              PID:4020

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Registry Run Keys / Startup Folder

          2
          T1060

          Defense Evasion

          Modify Registry

          3
          T1112

          Install Root Certificate

          1
          T1130

          Credential Access

          Credentials in Files

          1
          T1081

          Discovery

          Query Registry

          2
          T1012

          System Information Discovery

          2
          T1082

          Collection

          Data from Local System

          1
          T1005

          Email Collection

          2
          T1114

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\WindowsPowerShell\Modules\CPDF_Full..dll
            Filesize

            726KB

            MD5

            69eb282fa70fa912c5579d1f8c2584c8

            SHA1

            d921dd0a2a6b9691c62f0339e0e2515c8bf45efe

            SHA256

            25b1cee46c487f80713f6c524bbac481b3490d7596007faa6baeca1511ee206a

            SHA512

            59c3f24a216f06c5eab6d6eead0a246b7e58d9f7d1f80313c7d51c6c31adf20376d82548c34ee89fb37a1208bce392b9f97d180be68aa5217ee55e562d48b000

          • C:\Program Files (x86)\WindowsPowerShell\Modules\CPDF_Full..dll
            Filesize

            726KB

            MD5

            69eb282fa70fa912c5579d1f8c2584c8

            SHA1

            d921dd0a2a6b9691c62f0339e0e2515c8bf45efe

            SHA256

            25b1cee46c487f80713f6c524bbac481b3490d7596007faa6baeca1511ee206a

            SHA512

            59c3f24a216f06c5eab6d6eead0a246b7e58d9f7d1f80313c7d51c6c31adf20376d82548c34ee89fb37a1208bce392b9f97d180be68aa5217ee55e562d48b000

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe.xml
            Filesize

            58KB

            MD5

            ca7452f3c00cc3083d549346e3726b1c

            SHA1

            64c6e09bffa49ef36ab0ac3a7a0d98ff944eb89a

            SHA256

            a8736abe4c9f3715f7f737db3437af332373204263e458978f653a1c860f088b

            SHA512

            1a307069368230702b9d397640e4ae16cad64958aea87437b9d0c443a43242d0e72bab932be1a5fa294138c792cdbd0752edb783afe51d253cb7502fa0bc719d

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe.xml
            Filesize

            57KB

            MD5

            f99bb3ad5412bb6ac6a062dbfe3573ca

            SHA1

            2d9df718568e656340832029b100a5d5fd706c34

            SHA256

            3c43fe71e86b7ec70627b894241e3cdbe2be83a863f42c04e96ab58278222495

            SHA512

            e9110973f9cac453386804053db5ef68fa528a50d0c5f2dbe7e2d139ad0f5a49aaee1b0e81e60274525b05896ecbb542774a56fad57174e266d90d2bdbd91311

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\SettingsLocationTemplate.xsd
            Filesize

            9KB

            MD5

            f35965aa615dd128c2b95cfe925145c3

            SHA1

            57346050388048feb8034d5011b105018483b4a0

            SHA256

            ea9674d42081557b34958b2f7085f8d3865e71660d8f36258fa1c088d90d2398

            SHA512

            82767fdf269f813b5d39bb44c481f01678f9eab332ecc42f11d5a4f00a1970a6dd1875d30a98042113d37b04e501414b33e18abf2ab2a7995e5e773489f9cd82

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Shpetph.tmp
            Filesize

            2.3MB

            MD5

            78df4d10f1671f93235789e9a22eeeb4

            SHA1

            0df8333ad4d854eecadff3099eba189ce513a092

            SHA256

            8bdd1beb8c2974d8d5d9edfbc76f5b0791a62e67cf4b0e208f2b86d00ad52ea2

            SHA512

            0112d3ad7fdf0e4125ee77039f33944d4f696dc6fdcb58d085ceabe931c6ffdd639cef5d0556747c1fedc54736f23fc0ae03f8906af8362cdbcf89860e1f00ba

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\TELEMETRY.ASM-WINDOWSSQ.json
            Filesize

            53B

            MD5

            6b5c875287b25d64563bd7c830621b66

            SHA1

            df0c4dcbbf3ce6706cae126955b4fcb88be0694a

            SHA256

            9d45f7e6114d2088ab05423697cafedc0a9926f785358cb2faddc4f1e45b193d

            SHA512

            608b92078a9082b4bfe2b066891127713cfd4329d8b26a3747b672c19e41e25242f60153517227a04a3f2b355805584cd4fe2f2dece45b1cd5dfc814a486d229

          • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\resource.xml
            Filesize

            1KB

            MD5

            66963736ebb1e54dc596701206eaed3f

            SHA1

            18bc8dfc779d407398af193f3d265ff93f253bc2

            SHA256

            fd5f68b59aa2b3e80b1a3d97b1dc5028e0fb512d26003fffce146209fedc814b

            SHA512

            96aef899ecfb48d1df6e8c7655d59fb80b3c65f18857692894598b78c14b5587433d5f58a2d9bbd74d635956a9e6f1948916bd354e6d438450f37ec11cc3b598

          • C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp
            Filesize

            726KB

            MD5

            6ea8a6cc5fed6c664df1b3ef7c56b55d

            SHA1

            6b244d708706441095ae97294928967ddf28432b

            SHA256

            2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe

            SHA512

            4a328a66df407e4c9fa230287104771ea3b5dd8265d60314797426101a8be19d13bc57de2388f0f90b20ada82d950e156ef4267c029080a6254b80eefd8b8741

          • C:\Users\Admin\AppData\Local\Temp\Ipoetwsuqhd.tmp
            Filesize

            726KB

            MD5

            6ea8a6cc5fed6c664df1b3ef7c56b55d

            SHA1

            6b244d708706441095ae97294928967ddf28432b

            SHA256

            2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe

            SHA512

            4a328a66df407e4c9fa230287104771ea3b5dd8265d60314797426101a8be19d13bc57de2388f0f90b20ada82d950e156ef4267c029080a6254b80eefd8b8741

          • \??\c:\program files (x86)\windowspowershell\modules\cpdf_full..dll
            Filesize

            726KB

            MD5

            69eb282fa70fa912c5579d1f8c2584c8

            SHA1

            d921dd0a2a6b9691c62f0339e0e2515c8bf45efe

            SHA256

            25b1cee46c487f80713f6c524bbac481b3490d7596007faa6baeca1511ee206a

            SHA512

            59c3f24a216f06c5eab6d6eead0a246b7e58d9f7d1f80313c7d51c6c31adf20376d82548c34ee89fb37a1208bce392b9f97d180be68aa5217ee55e562d48b000

          • memory/1224-165-0x0000000003460000-0x0000000003B85000-memory.dmp
            Filesize

            7.1MB

          • memory/1224-157-0x0000000003460000-0x0000000003B85000-memory.dmp
            Filesize

            7.1MB

          • memory/1224-170-0x0000000003460000-0x0000000003B85000-memory.dmp
            Filesize

            7.1MB

          • memory/1544-168-0x0000000000000000-mapping.dmp
          • memory/3080-169-0x0000000000000000-mapping.dmp
          • memory/3800-152-0x000001B84D3F0000-0x000001B84D61A000-memory.dmp
            Filesize

            2.2MB

          • memory/3800-148-0x000001B84EC30000-0x000001B84ED70000-memory.dmp
            Filesize

            1.2MB

          • memory/3800-149-0x000001B84EC30000-0x000001B84ED70000-memory.dmp
            Filesize

            1.2MB

          • memory/3800-151-0x0000000000F40000-0x0000000001159000-memory.dmp
            Filesize

            2.1MB

          • memory/3800-147-0x00007FF7181A6890-mapping.dmp
          • memory/4020-163-0x0000000000000000-mapping.dmp
          • memory/4020-171-0x0000000004290000-0x00000000049B5000-memory.dmp
            Filesize

            7.1MB

          • memory/4020-167-0x0000000004290000-0x00000000049B5000-memory.dmp
            Filesize

            7.1MB

          • memory/4020-166-0x0000000004290000-0x00000000049B5000-memory.dmp
            Filesize

            7.1MB

          • memory/4656-138-0x0000000000400000-0x0000000000517000-memory.dmp
            Filesize

            1.1MB

          • memory/4656-132-0x000000000228E000-0x0000000002364000-memory.dmp
            Filesize

            856KB

          • memory/4656-133-0x0000000002370000-0x0000000002485000-memory.dmp
            Filesize

            1.1MB

          • memory/4656-134-0x0000000000400000-0x0000000000517000-memory.dmp
            Filesize

            1.1MB

          • memory/4888-144-0x00000000041F0000-0x0000000004330000-memory.dmp
            Filesize

            1.2MB

          • memory/4888-140-0x0000000005080000-0x00000000057A5000-memory.dmp
            Filesize

            7.1MB

          • memory/4888-139-0x0000000005080000-0x00000000057A5000-memory.dmp
            Filesize

            7.1MB

          • memory/4888-150-0x0000000004269000-0x000000000426B000-memory.dmp
            Filesize

            8KB

          • memory/4888-141-0x00000000041F0000-0x0000000004330000-memory.dmp
            Filesize

            1.2MB

          • memory/4888-142-0x00000000041F0000-0x0000000004330000-memory.dmp
            Filesize

            1.2MB

          • memory/4888-143-0x00000000041F0000-0x0000000004330000-memory.dmp
            Filesize

            1.2MB

          • memory/4888-135-0x0000000000000000-mapping.dmp
          • memory/4888-153-0x0000000005080000-0x00000000057A5000-memory.dmp
            Filesize

            7.1MB

          • memory/4888-145-0x00000000041F0000-0x0000000004330000-memory.dmp
            Filesize

            1.2MB

          • memory/4888-146-0x00000000041F0000-0x0000000004330000-memory.dmp
            Filesize

            1.2MB