Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
21-06-2024 10:26
Behavioral task
behavioral1
Sample
337d48261da1a0b48edd2c66991d1ac2.exe
Resource
win7-20240611-en
General
-
Target
337d48261da1a0b48edd2c66991d1ac2.exe
-
Size
6.1MB
-
MD5
337d48261da1a0b48edd2c66991d1ac2
-
SHA1
b04bef931efdc0ff889d84461ad97dac48fee4fc
-
SHA256
5225d9f8fde5e11240a7035a6988b7ee3ffca419eea8ca473e845ba0502bad3b
-
SHA512
aeb55d66a63fc57c04644c8ff33fe640ebe4ed9245677b653c2319bd1d94de86e3623d742591301f0ba712614dd1ac42a6a238360c94b36f56e981d4821ed59a
-
SSDEEP
196608:rKppFEfoHJbI9Q0mOOZJYi3SGilZfjadonLE:rK7FtbIfQD9MfGdonL
Malware Config
Extracted
danabot
-
type
loader
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2072-0-0x0000000000400000-0x0000000001741000-memory.dmp upx behavioral1/memory/2072-2-0x0000000000400000-0x0000000001741000-memory.dmp upx behavioral1/memory/2072-22-0x0000000000400000-0x0000000001741000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2072 set thread context of 1696 2072 337d48261da1a0b48edd2c66991d1ac2.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2072 337d48261da1a0b48edd2c66991d1ac2.exe 2072 337d48261da1a0b48edd2c66991d1ac2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 2072 337d48261da1a0b48edd2c66991d1ac2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1696 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1696 2072 337d48261da1a0b48edd2c66991d1ac2.exe 28 PID 2072 wrote to memory of 1696 2072 337d48261da1a0b48edd2c66991d1ac2.exe 28 PID 2072 wrote to memory of 1696 2072 337d48261da1a0b48edd2c66991d1ac2.exe 28 PID 2072 wrote to memory of 1696 2072 337d48261da1a0b48edd2c66991d1ac2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\337d48261da1a0b48edd2c66991d1ac2.exe"C:\Users\Admin\AppData\Local\Temp\337d48261da1a0b48edd2c66991d1ac2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 C:\Users\Admin\AppData\Local\Temp\337d48261da1a0b48edd2c66991d1ac2.exe2⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
PID:1696
-