Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-06-2024 10:26
Behavioral task
behavioral1
Sample
337d48261da1a0b48edd2c66991d1ac2.exe
Resource
win7-20240611-en
General
-
Target
337d48261da1a0b48edd2c66991d1ac2.exe
-
Size
6.1MB
-
MD5
337d48261da1a0b48edd2c66991d1ac2
-
SHA1
b04bef931efdc0ff889d84461ad97dac48fee4fc
-
SHA256
5225d9f8fde5e11240a7035a6988b7ee3ffca419eea8ca473e845ba0502bad3b
-
SHA512
aeb55d66a63fc57c04644c8ff33fe640ebe4ed9245677b653c2319bd1d94de86e3623d742591301f0ba712614dd1ac42a6a238360c94b36f56e981d4821ed59a
-
SSDEEP
196608:rKppFEfoHJbI9Q0mOOZJYi3SGilZfjadonLE:rK7FtbIfQD9MfGdonL
Malware Config
Extracted
danabot
-
type
loader
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1784-0-0x0000000000400000-0x0000000001741000-memory.dmp upx behavioral2/memory/1784-76-0x0000000000400000-0x0000000001741000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts rundll32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1784 set thread context of 4368 1784 337d48261da1a0b48edd2c66991d1ac2.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 22 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1784 337d48261da1a0b48edd2c66991d1ac2.exe 1784 337d48261da1a0b48edd2c66991d1ac2.exe 4368 rundll32.exe 4368 rundll32.exe 1784 337d48261da1a0b48edd2c66991d1ac2.exe 1784 337d48261da1a0b48edd2c66991d1ac2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe Token: SeDebugPrivilege 1784 337d48261da1a0b48edd2c66991d1ac2.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4368 rundll32.exe 4368 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1784 wrote to memory of 4368 1784 337d48261da1a0b48edd2c66991d1ac2.exe 85 PID 1784 wrote to memory of 4368 1784 337d48261da1a0b48edd2c66991d1ac2.exe 85 PID 1784 wrote to memory of 4368 1784 337d48261da1a0b48edd2c66991d1ac2.exe 85 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\337d48261da1a0b48edd2c66991d1ac2.exe"C:\Users\Admin\AppData\Local\Temp\337d48261da1a0b48edd2c66991d1ac2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 C:\Users\Admin\AppData\Local\Temp\337d48261da1a0b48edd2c66991d1ac2.exe2⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- outlook_office_path
- outlook_win_path
PID:4368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5e7e888fa51dbfe260253159cdd807632
SHA11de4cc864603051dcea0bf7b438df8f78ab8ada6
SHA256a16929ae8e2ac96e14976da8bf7884cdd6dd66833fbea2a156fb157a1b657731
SHA512990c4e5061b186d5bcbb37fd8f7a4a776e6d2b715b7d60df384d9f6101a12e933cf662c306d9443724896262a99d617f63aefdc3dc6c8e70c23c9c737d9081d0
-
Filesize
116KB
MD5b6f9fbb39009ed9a13d4be04a49fea98
SHA1c5f93f13a9569c987c2b2a3055f601e1de772938
SHA2563645a04b3f853f324732ffb9779ee1c95b01f6e5f68c6a07968ecbedaad552c1
SHA5124c6c7eced3d1e25f86dc49eadc2fe2e9ec3dcc0d869604d8ee7aad77d4f2b4ebf4159e4222a54020d95475149e3c8652489a18a3ebd2adbb7ccc502f955603ab