Analysis
-
max time kernel
128s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
14/02/2024, 09:53
Static task
static1
General
-
Target
allegato_852.js
-
Size
5KB
-
MD5
5d276660204e680b2fa68c6d7b77813c
-
SHA1
be8d7755d4df6775a628ce60ecd1b5bbfbd35285
-
SHA256
901e017b8d64592006b90698ebf02f818691b4763743a82f2fbbccca669549fe
-
SHA512
eb56478eac14497d567b5289e3ec0b668f2e89cf1d14553e0b459f9c97b0fbd8ce077ba0a1d93f1248eabc8042c07d320faf7bc82f79146d982f61d875d0ca34
-
SSDEEP
96:wtKixrcpUOWYVJ2qQKaYfxAbeDJiqRmArXtJT4fqG3p6DtkXSq1AVBVp5vpf047L:wtKiZcCOWY+74JimjjT4fqG3AtkXSqAp
Malware Config
Extracted
danabot
-
type
loader
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 2 3588 wscript.exe 8 4992 rundll32.exe 10 4992 rundll32.exe -
Downloads MZ/PE file
-
Loads dropped DLL 1 IoCs
pid Process 4992 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts rundll32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 25 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\7AFD11D44F98B7EA7AE2AD6AA71E3C5D11362F8D rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\7AFD11D44F98B7EA7AE2AD6AA71E3C5D11362F8D\Blob = 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 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4992 rundll32.exe 4992 rundll32.exe 4992 rundll32.exe 4992 rundll32.exe 4992 rundll32.exe 4992 rundll32.exe 4992 rundll32.exe 4992 rundll32.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4992 rundll32.exe Token: SeDebugPrivilege 4796 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4992 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3588 wrote to memory of 224 3588 wscript.exe 71 PID 3588 wrote to memory of 224 3588 wscript.exe 71 PID 224 wrote to memory of 4992 224 rundll32.exe 72 PID 224 wrote to memory of 4992 224 rundll32.exe 72 PID 224 wrote to memory of 4992 224 rundll32.exe 72 PID 4992 wrote to memory of 2540 4992 rundll32.exe 74 PID 4992 wrote to memory of 2540 4992 rundll32.exe 74 PID 4992 wrote to memory of 2540 4992 rundll32.exe 74 PID 4992 wrote to memory of 1904 4992 rundll32.exe 76 PID 4992 wrote to memory of 1904 4992 rundll32.exe 76 PID 4992 wrote to memory of 1904 4992 rundll32.exe 76 PID 4992 wrote to memory of 4796 4992 rundll32.exe 78 PID 4992 wrote to memory of 4796 4992 rundll32.exe 78 PID 4992 wrote to memory of 4796 4992 rundll32.exe 78 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\allegato_852.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" /B C:\Users\Admin\AppData\Local\Temp\FxCuheLNAN.dll,start2⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" /B C:\Users\Admin\AppData\Local\Temp\FxCuheLNAN.dll,start3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4992 -
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask4⤵PID:2540
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask4⤵PID:1904
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.4MB
MD51610497f16ec0b905b87c8f6a8ef7867
SHA147f817ddfc48ce3bf55d3aa2cc3ba4c8ad4eefce
SHA2561cc05e6d6573eae9b506a90b58045b9ab2c1b8ff663b790358dc393957463c88
SHA512dac853adae91db8c4e7530bbb6ec69deaa2ea232cf5d96273e405cd4046639b28dbab99d7527d0940c358c51b6cec05094b90f2a94a5b435b27988be915fb4f3
-
Filesize
46KB
MD5b13fcb3223116f6eec60be9143cae98b
SHA19a9eb6da6d8e008a51e6ce6212c49bfbe7cb3c88
SHA256961fc9bf866c5b58401d3c91735f9a7b7b4fc93c94038c504c965491f622b52b
SHA51289d72b893acd2ec537b3c3deffcc71d1ce02211f9f5b931c561625ee7162052b511e46d4b4596c0a715e1c992310f2536ebdd512db400eeab23c8960ec4d312d
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
10.7MB
MD58c00a36d6ebb23dd17e36463750879c5
SHA18dc07134e849ad91a6a1169842ee7ca33cc01032
SHA2562ec6800c5be6f2fcdc65ecb2a36524ac0fc086cbb52006a6bf38c1267ec1ea7d
SHA512c2e97414246388d55b19935a01215d84c02644d58d88e8dd488848078f93eb2ae64135d071a32ead248760b45f0b48a6f532bd403d6f888a6b138bb4de863061