Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2022 14:33

General

  • Target

    2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe.dll

  • Size

    726KB

  • MD5

    6ea8a6cc5fed6c664df1b3ef7c56b55d

  • SHA1

    6b244d708706441095ae97294928967ddf28432b

  • SHA256

    2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe

  • SHA512

    4a328a66df407e4c9fa230287104771ea3b5dd8265d60314797426101a8be19d13bc57de2388f0f90b20ada82d950e156ef4267c029080a6254b80eefd8b8741

  • SSDEEP

    12288:UYc6zyKflM0Xtlu1C4M8Vwd5rt/m3LIaJU+SUCxDot:LcFQlM0X3ugaOrw3LLJjXCxst

Malware Config

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 4 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4056
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\2c7500ac5ebb0116e640747b8a5f0a2648f7d2f5f516ebb398b864cccc626fbe.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:4648
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 23993
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:5096
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:4004
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:4556
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:4136
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\SysWOW64\svchost.exe -k LocalService
          1⤵
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3624
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windowspowershell\modules\2d.dll",GwwPVklmVDE=
            2⤵
            • Loads dropped DLL
            • Checks processor information in registry
            PID:3364

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\WindowsPowerShell\Modules\2d.dll

          Filesize

          726KB

          MD5

          4636c27001b3f39b88ce99df41f77c81

          SHA1

          f02809981fb8b6680c654ecc18aaac7eae3c7092

          SHA256

          1a363ccbd827d022271c9f618a57585299cf796ab8c6ffe4619b40c3097b4828

          SHA512

          86bddf28f4363604a9ab79464389865aa4743ddd9e16d6b8fa9d117cb455a91bda37834aaac55f5a87afcdf7b33ad1689d9a046a4251f8ca0df5bac6aa658289

        • C:\Program Files (x86)\WindowsPowerShell\Modules\2d.dll

          Filesize

          726KB

          MD5

          4636c27001b3f39b88ce99df41f77c81

          SHA1

          f02809981fb8b6680c654ecc18aaac7eae3c7092

          SHA256

          1a363ccbd827d022271c9f618a57585299cf796ab8c6ffe4619b40c3097b4828

          SHA512

          86bddf28f4363604a9ab79464389865aa4743ddd9e16d6b8fa9d117cb455a91bda37834aaac55f5a87afcdf7b33ad1689d9a046a4251f8ca0df5bac6aa658289

        • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\C2RManifest.Proof.Culture.msi.16.en-us.xml

          Filesize

          25KB

          MD5

          c61439f60c39268b94a18e5d51f0b26e

          SHA1

          4ee213d4f4438b2fd8841bcb7ee07ca0f4742b3a

          SHA256

          06bc78753a1130463805f6ee03e1c2fe991e04d14e02ad852e8f857c43e24213

          SHA512

          88310fcea8cfa7fa1f028d4af3d529ef92cad0002705a5c720e5779cf465555917ac63042d999c575c22889b229e624f3da01525797dd262309d95461b75b45c

        • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\MicrosoftOutlook2013CAWin32.xml

          Filesize

          1KB

          MD5

          42acdf1f7faad8e138134083a57424bd

          SHA1

          f6b05b2eba7723ed2b61c698377053b05ee8eeb5

          SHA256

          91bcc8d78d76422bf8a162c10d96ce91435470d8601290ddcbe3216c3bb7009c

          SHA512

          ca976b96bb036d2a72a61f5d0da83de6e4deb694353ca57e3016124db4a041c3ba7391bb1f508e3fa010b0f412df2b71b3acbaa5ad99c189beace9fcc5193abb

        • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Microsoft_Office_OfficeTelemetryAgentFallBack2016.xml

          Filesize

          3KB

          MD5

          1a3168a15983b890b16390a23a89a02e

          SHA1

          d56ce16d88d79159a27c2d1cd3770dc56d897ebe

          SHA256

          334782208e9520975f597b19a273fcc6f3a8a7caffd2e4fb22213f6b957f4946

          SHA512

          f2be33992fd70d90eb94973c19924229bb70da4ce21c9777cfccbf56b0635452b382d2846afe2b0cc80a83d3b6a2c855557855cfb22fc681d182b2b605daa668

        • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\Shpetph.tmp

          Filesize

          2.3MB

          MD5

          0e1ea6b0f628091f3d36f03498c88d90

          SHA1

          da771da8cad3806f491c03b11974867f78c71393

          SHA256

          ecf234853929289b64a2fefa48667c263ab0d4fde3fc2e3b85783b778860410f

          SHA512

          a545446cd692b9afa7274e7544340e1c2270d5363ae54de7d3d3604f79b4202db879e969b7ea7fc788d3c7b1eb0b5d4e59c3bca3d4ca857f99a579b49a28b394

        • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\device.png

          Filesize

          43KB

          MD5

          7051c15362866f6411ff4906403f2c54

          SHA1

          768b062b336675ff9a2b9fcff0ce1057234a5399

          SHA256

          609824cc9c4f6c26c529ea3eb6f112c1a7c74d5ed58e25b6f9d88dce5944626a

          SHA512

          5fcbb98b9f421ee9884b8e927774de3d60043401b2f746f7af6aa059fa8a7c48f00ec3c2437f8e6687e0c328d0d2c79427d5ab5eed0805aa9e2a8b12a6418f08

        • C:\ProgramData\{F21FF8C2-A136-6557-C5DD-F59D9999C8E7}\s640.hash

          Filesize

          106B

          MD5

          bef40d5a19278ca19b56fbcdde7e26ef

          SHA1

          4f01d5b8de038e120c64bd7cc22cf150af1452fb

          SHA256

          7f9c7cc5b265e312fc587d98c7c31218b7a46f1efb8c397dcc329354b4e5831d

          SHA512

          5a361b1378c7b9f635e72ffdfba4d59acd17341caba480a5271237a37d40d8eb03a6ca7f3c38e73ce87a15b682d434ffa0a7f96dd6355e286d8213a80518c493

        • \??\c:\program files (x86)\windowspowershell\modules\2d.dll

          Filesize

          726KB

          MD5

          4636c27001b3f39b88ce99df41f77c81

          SHA1

          f02809981fb8b6680c654ecc18aaac7eae3c7092

          SHA256

          1a363ccbd827d022271c9f618a57585299cf796ab8c6ffe4619b40c3097b4828

          SHA512

          86bddf28f4363604a9ab79464389865aa4743ddd9e16d6b8fa9d117cb455a91bda37834aaac55f5a87afcdf7b33ad1689d9a046a4251f8ca0df5bac6aa658289

        • memory/3364-160-0x0000000004400000-0x0000000004B25000-memory.dmp

          Filesize

          7.1MB

        • memory/3364-159-0x0000000004400000-0x0000000004B25000-memory.dmp

          Filesize

          7.1MB

        • memory/3364-156-0x0000000000000000-mapping.dmp

        • memory/3624-163-0x00000000037C0000-0x0000000003EE5000-memory.dmp

          Filesize

          7.1MB

        • memory/3624-158-0x00000000037C0000-0x0000000003EE5000-memory.dmp

          Filesize

          7.1MB

        • memory/3624-150-0x00000000037C0000-0x0000000003EE5000-memory.dmp

          Filesize

          7.1MB

        • memory/4004-161-0x0000000000000000-mapping.dmp

        • memory/4556-162-0x0000000000000000-mapping.dmp

        • memory/4648-146-0x0000000004500000-0x0000000004C25000-memory.dmp

          Filesize

          7.1MB

        • memory/4648-132-0x0000000000000000-mapping.dmp

        • memory/4648-137-0x0000000004120000-0x0000000004260000-memory.dmp

          Filesize

          1.2MB

        • memory/4648-136-0x0000000004120000-0x0000000004260000-memory.dmp

          Filesize

          1.2MB

        • memory/4648-135-0x0000000004120000-0x0000000004260000-memory.dmp

          Filesize

          1.2MB

        • memory/4648-134-0x0000000004500000-0x0000000004C25000-memory.dmp

          Filesize

          7.1MB

        • memory/4648-140-0x0000000004120000-0x0000000004260000-memory.dmp

          Filesize

          1.2MB

        • memory/4648-138-0x0000000004120000-0x0000000004260000-memory.dmp

          Filesize

          1.2MB

        • memory/4648-133-0x0000000004500000-0x0000000004C25000-memory.dmp

          Filesize

          7.1MB

        • memory/4648-139-0x0000000004120000-0x0000000004260000-memory.dmp

          Filesize

          1.2MB

        • memory/5096-145-0x000002BD677F0000-0x000002BD67A1A000-memory.dmp

          Filesize

          2.2MB

        • memory/5096-144-0x00000000003A0000-0x00000000005B9000-memory.dmp

          Filesize

          2.1MB

        • memory/5096-143-0x000002BD67680000-0x000002BD677C0000-memory.dmp

          Filesize

          1.2MB

        • memory/5096-142-0x000002BD67680000-0x000002BD677C0000-memory.dmp

          Filesize

          1.2MB

        • memory/5096-141-0x00007FF7CB396890-mapping.dmp