Analysis

  • max time kernel
    128s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/02/2024, 09:53

General

  • Target

    allegato_852.js

  • Size

    5KB

  • MD5

    5d276660204e680b2fa68c6d7b77813c

  • SHA1

    be8d7755d4df6775a628ce60ecd1b5bbfbd35285

  • SHA256

    901e017b8d64592006b90698ebf02f818691b4763743a82f2fbbccca669549fe

  • SHA512

    eb56478eac14497d567b5289e3ec0b668f2e89cf1d14553e0b459f9c97b0fbd8ce077ba0a1d93f1248eabc8042c07d320faf7bc82f79146d982f61d875d0ca34

  • SSDEEP

    96:wtKixrcpUOWYVJ2qQKaYfxAbeDJiqRmArXtJT4fqG3p6DtkXSq1AVBVp5vpf047L:wtKiZcCOWY+74JimjjT4fqG3AtkXSqAp

Malware Config

Extracted

Family

danabot

Attributes
  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 25 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\allegato_852.js
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" /B C:\Users\Admin\AppData\Local\Temp\FxCuheLNAN.dll,start
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:224
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" /B C:\Users\Admin\AppData\Local\Temp\FxCuheLNAN.dll,start
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Accesses Microsoft Outlook accounts
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        • outlook_win_path
        PID:4992
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
          4⤵
            PID:2540
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
            4⤵
              PID:1904
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4796

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\FxCuheLNAN.dll

        Filesize

        11.4MB

        MD5

        1610497f16ec0b905b87c8f6a8ef7867

        SHA1

        47f817ddfc48ce3bf55d3aa2cc3ba4c8ad4eefce

        SHA256

        1cc05e6d6573eae9b506a90b58045b9ab2c1b8ff663b790358dc393957463c88

        SHA512

        dac853adae91db8c4e7530bbb6ec69deaa2ea232cf5d96273e405cd4046639b28dbab99d7527d0940c358c51b6cec05094b90f2a94a5b435b27988be915fb4f3

      • C:\Users\Admin\AppData\Local\Temp\Suwisapqfe

        Filesize

        46KB

        MD5

        b13fcb3223116f6eec60be9143cae98b

        SHA1

        9a9eb6da6d8e008a51e6ce6212c49bfbe7cb3c88

        SHA256

        961fc9bf866c5b58401d3c91735f9a7b7b4fc93c94038c504c965491f622b52b

        SHA512

        89d72b893acd2ec537b3c3deffcc71d1ce02211f9f5b931c561625ee7162052b511e46d4b4596c0a715e1c992310f2536ebdd512db400eeab23c8960ec4d312d

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fijzsuo0.ivy.ps1

        Filesize

        1B

        MD5

        c4ca4238a0b923820dcc509a6f75849b

        SHA1

        356a192b7913b04c54574d18c28d46e6395428ab

        SHA256

        6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

        SHA512

        4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

      • \Users\Admin\AppData\Local\Temp\FxCuheLNAN.dll

        Filesize

        10.7MB

        MD5

        8c00a36d6ebb23dd17e36463750879c5

        SHA1

        8dc07134e849ad91a6a1169842ee7ca33cc01032

        SHA256

        2ec6800c5be6f2fcdc65ecb2a36524ac0fc086cbb52006a6bf38c1267ec1ea7d

        SHA512

        c2e97414246388d55b19935a01215d84c02644d58d88e8dd488848078f93eb2ae64135d071a32ead248760b45f0b48a6f532bd403d6f888a6b138bb4de863061

      • memory/4796-87-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/4796-58-0x0000000008AB0000-0x0000000008B26000-memory.dmp

        Filesize

        472KB

      • memory/4796-56-0x0000000008660000-0x000000000867C000-memory.dmp

        Filesize

        112KB

      • memory/4796-81-0x0000000009B10000-0x0000000009B2E000-memory.dmp

        Filesize

        120KB

      • memory/4796-86-0x0000000009C70000-0x0000000009D15000-memory.dmp

        Filesize

        660KB

      • memory/4796-79-0x0000000009B30000-0x0000000009B63000-memory.dmp

        Filesize

        204KB

      • memory/4796-281-0x0000000009DF0000-0x0000000009E0A000-memory.dmp

        Filesize

        104KB

      • memory/4796-80-0x000000006CF80000-0x000000006CFCB000-memory.dmp

        Filesize

        300KB

      • memory/4796-286-0x0000000009DE0000-0x0000000009DE8000-memory.dmp

        Filesize

        32KB

      • memory/4796-78-0x000000007F3C0000-0x000000007F3D0000-memory.dmp

        Filesize

        64KB

      • memory/4796-302-0x0000000070230000-0x000000007091E000-memory.dmp

        Filesize

        6.9MB

      • memory/4796-88-0x0000000009E50000-0x0000000009EE4000-memory.dmp

        Filesize

        592KB

      • memory/4796-57-0x0000000008960000-0x00000000089AB000-memory.dmp

        Filesize

        300KB

      • memory/4796-47-0x0000000070230000-0x000000007091E000-memory.dmp

        Filesize

        6.9MB

      • memory/4796-48-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/4796-49-0x0000000004F70000-0x0000000004FA6000-memory.dmp

        Filesize

        216KB

      • memory/4796-50-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/4796-51-0x00000000079A0000-0x0000000007FC8000-memory.dmp

        Filesize

        6.2MB

      • memory/4796-52-0x0000000008000000-0x0000000008022000-memory.dmp

        Filesize

        136KB

      • memory/4796-53-0x0000000008280000-0x00000000082E6000-memory.dmp

        Filesize

        408KB

      • memory/4796-54-0x00000000080A0000-0x0000000008106000-memory.dmp

        Filesize

        408KB

      • memory/4796-55-0x0000000008310000-0x0000000008660000-memory.dmp

        Filesize

        3.3MB

      • memory/4992-13-0x00000000077B0000-0x0000000007FB2000-memory.dmp

        Filesize

        8.0MB

      • memory/4992-44-0x00000000077B0000-0x0000000007FB2000-memory.dmp

        Filesize

        8.0MB

      • memory/4992-42-0x00000000077B0000-0x0000000007FB2000-memory.dmp

        Filesize

        8.0MB

      • memory/4992-41-0x0000000006910000-0x00000000077A1000-memory.dmp

        Filesize

        14.6MB

      • memory/4992-69-0x00000000077B0000-0x0000000007FB2000-memory.dmp

        Filesize

        8.0MB

      • memory/4992-73-0x00000000077B0000-0x0000000007FB2000-memory.dmp

        Filesize

        8.0MB

      • memory/4992-40-0x00000000738C0000-0x0000000074426000-memory.dmp

        Filesize

        11.4MB

      • memory/4992-14-0x00000000077B0000-0x0000000007FB2000-memory.dmp

        Filesize

        8.0MB

      • memory/4992-12-0x00000000077B0000-0x0000000007FB2000-memory.dmp

        Filesize

        8.0MB

      • memory/4992-11-0x00000000077B0000-0x0000000007FB2000-memory.dmp

        Filesize

        8.0MB

      • memory/4992-10-0x00000000077B0000-0x0000000007FB2000-memory.dmp

        Filesize

        8.0MB

      • memory/4992-9-0x00000000077B0000-0x0000000007FB2000-memory.dmp

        Filesize

        8.0MB

      • memory/4992-8-0x00000000077B0000-0x0000000007FB2000-memory.dmp

        Filesize

        8.0MB

      • memory/4992-7-0x00000000077B0000-0x0000000007FB2000-memory.dmp

        Filesize

        8.0MB

      • memory/4992-6-0x0000000006910000-0x00000000077A1000-memory.dmp

        Filesize

        14.6MB

      • memory/4992-5-0x00000000738C0000-0x0000000074426000-memory.dmp

        Filesize

        11.4MB