Analysis

  • max time kernel
    37s
  • max time network
    39s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-08-2024 15:03

General

  • Target

    DanaBot.exe

  • Size

    2.7MB

  • MD5

    48d8f7bbb500af66baa765279ce58045

  • SHA1

    2cdb5fdeee4e9c7bd2e5f744150521963487eb71

  • SHA256

    db0d72bc7d10209f7fa354ec100d57abbb9fe2e57ce72789f5f88257c5d3ebd1

  • SHA512

    aef8aa8e0d16aab35b5cc19487e53583691e4471064bc556a2ee13e94a0546b54a33995739f0fa3c4de6ff4c6abf02014aef3efb0d93ca6847bad2220c3302bd

  • SSDEEP

    49152:bbevayZlMTWkygVy0nQZfVY2BtZzpPL4PuQ65+6Dv7m0KXTn:bbexZlMQcEVY2BtZzpPL4WQI9U

Malware Config

Extracted

Family

danabot

C2

51.178.195.151

51.222.39.81

149.255.35.125

38.68.50.179

51.77.7.204

rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot x86 payload 1 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 59 IoCs
  • Suspicious use of SendNotifyMessage 55 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DanaBot.exe
    "C:\Users\Admin\AppData\Local\Temp\DanaBot.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\DanaBot.dll f1 C:\Users\Admin\AppData\Local\Temp\DanaBot.exe@2280
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\DanaBot.dll,f0
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2088
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 460
      2⤵
      • Program crash
      PID:1708
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2280 -ip 2280
    1⤵
      PID:2692
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\CopySkip.ADT"
      1⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1872
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffb1845cc40,0x7ffb1845cc4c,0x7ffb1845cc58
        2⤵
          PID:924
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,18335988379435718699,16462263065069160687,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1908 /prefetch:2
          2⤵
            PID:2152
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2196,i,18335988379435718699,16462263065069160687,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2056 /prefetch:3
            2⤵
              PID:2760
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2288,i,18335988379435718699,16462263065069160687,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2484 /prefetch:8
              2⤵
                PID:1156
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,18335988379435718699,16462263065069160687,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:1
                2⤵
                  PID:2768
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,18335988379435718699,16462263065069160687,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3264 /prefetch:1
                  2⤵
                    PID:3640
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3724,i,18335988379435718699,16462263065069160687,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4604 /prefetch:1
                    2⤵
                      PID:880
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4824,i,18335988379435718699,16462263065069160687,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4888 /prefetch:8
                      2⤵
                        PID:4932
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4932,i,18335988379435718699,16462263065069160687,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4888 /prefetch:8
                        2⤵
                          PID:4172
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5096,i,18335988379435718699,16462263065069160687,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4772 /prefetch:1
                          2⤵
                            PID:4340
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5184,i,18335988379435718699,16462263065069160687,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4888 /prefetch:1
                            2⤵
                              PID:1968
                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                            1⤵
                              PID:4376
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                              1⤵
                                PID:2120

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                Filesize

                                649B

                                MD5

                                35c7aabe9b84f2802c6954b9bb9f9602

                                SHA1

                                5504d247a09d079db52c337888b941693c513d7a

                                SHA256

                                d619de395ca0b44e383d96bf629d767454b2e064ee2412860c74808d0402bd98

                                SHA512

                                dd7d1c813674409fc0d46ca39edfacaf21ec5157729dc0b4a0101f414c83ebf90fbd07f5e9006980180380a8fc64b254ed3065c884b522113b4a2712bd7ccd9a

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                768B

                                MD5

                                4a864fed7e80b546f6c1821acce1a45a

                                SHA1

                                41706005cb62c6c30c191e9375e1094ed940f9bf

                                SHA256

                                98ddacf0db1b7960d3c7ab08e5901b8e63f3ef20d7b537686aa84536222c277d

                                SHA512

                                52b3b839719e117e4ab55602ba96877631fccc1009341e418f2f13bb78a061ab3c772341c4e9a919ad657d6fdd1b3ef02062423a0b104f2e9a6ba122fa4e5844

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                Filesize

                                264KB

                                MD5

                                f50f89a0a91564d0b8a211f8921aa7de

                                SHA1

                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                SHA256

                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                SHA512

                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                4KB

                                MD5

                                43d17dddc4705d4f530a98708a3013bf

                                SHA1

                                daed2ed9c7ab3123d7cb3e6e105b427503e6acbd

                                SHA256

                                45e28a39b9f1a674071760b7928979905ed710b1322dd796194c7c729384170e

                                SHA512

                                47a236b9a94a35686c10ace936a80d95ee07acb5537483211d1e39594f98100efb6d6efe1a31e820581ab2c1532d6de4b3b7a98a248a7901e2e6beb216f65099

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                Filesize

                                2B

                                MD5

                                d751713988987e9331980363e24189ce

                                SHA1

                                97d170e1550eee4afc0af065b78cda302a97674c

                                SHA256

                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                SHA512

                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                857B

                                MD5

                                c54822bd78ea2fafad903aaa69f83364

                                SHA1

                                3755af366bed33eef071cf610b1c79d37e0050d2

                                SHA256

                                947731e08072930f44736f1b74c195f2c35b0312f6e3ba1ebee9510cd9737195

                                SHA512

                                7e145888cebb440dd70f90e15600343fc9cac85eab94bf18ff66a45d4c948b271ef2fdc03b67c49c32c0bae62cde79b581464930113cdb798295e90f43f4784d

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                857B

                                MD5

                                f33dc13052c05ea6289946c992ab9a2e

                                SHA1

                                d15089b7570f5056201268e693329907eaf8906c

                                SHA256

                                926506426bb7bb3e7bf062d1814e86879f016746f9b742ecbfc8c3fb686381ab

                                SHA512

                                43dd0be9ab9a6ecbe2f9f818d11651d90218460c2a36d7041a3dcc5f590291b83eba5a938af4b5fcffe2700ab8aca56fce7151a113cd937734547242105a803b

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                64d6f5a54313b62f83ebf12b15820254

                                SHA1

                                44056038f93ea1a756c8f20571ba6b0a9b4288c9

                                SHA256

                                5e174bbf4f6c088c7ce7a0fcfa5ab038d15c83746857103fafbae7322d630fc4

                                SHA512

                                deae5b81a5ebbcb18894e88b4965b23119b5d40181372a1024fc58ef29922f38d12b185c73d1fb4cd43c012935a9b026eb71046b3f5a323d70848b5ceb6cc99e

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                68caf6210c97763a871203321ab3f5e2

                                SHA1

                                e15c967516fe76adb79d2615cb86e28b0a98476c

                                SHA256

                                faa21ff13f27f6f9898141a197c6d4e3916fe4aa2ebb51c14674c0485b3b7887

                                SHA512

                                cf230be96bcb78346027d91c8ec9004ce9fe22bd8efccdfd98388429677e2d460d4e44928dc22a601bad098df52831de96b9678bb5b1cba02a71d9174f5bebcd

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                Filesize

                                15KB

                                MD5

                                61f6c945380f994bfc34397a710fae6e

                                SHA1

                                0c44a7fe53cc78c0eb8c58b05f7315232840d03e

                                SHA256

                                cef1b7294188e3d1106e82ffea9d34f27dd56f5a875feb18e392cca518a58e8a

                                SHA512

                                d6e9f214faeb0d1b54b545d9d2d6a6a71d889f09183763b81c35e15380488f28efb7bc31a850ac9e7cc2b5e5957d601cededaa1ca9d4b27d4cfde8d80fc4506c

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\temp-index

                                Filesize

                                120B

                                MD5

                                1d2222c6e87f9f9475606107f89f66f5

                                SHA1

                                c65df7f2df9611bbb85726215e7864768c1fd9bf

                                SHA256

                                30f1e84e7607e7cdf2ce7072dd23c6236e103d0f311eea18f9655985f283e937

                                SHA512

                                9d778de327e649d40950a2ff7566e3460d14229b5140341754856afbbda9046469c01ca8e4721f7036d3fbffb1c9c8938559eab39d46017cb572218d874e0d05

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                199KB

                                MD5

                                3adbc994cace5cf9fd50b007892017ba

                                SHA1

                                8e0d573cfd39748a59ec3659638c6db1ae5d3d6a

                                SHA256

                                b26b83709d9b2f3cc6b84700a3ea55534cadbb46132fc7af4540c90a78c121b9

                                SHA512

                                e1ef2fb7f4266bc17ea89b5d199aff3650bde2e9436f2c7bd04c170abd72e8c24ba21bb90589b0818d1185df4c1a58b5a26686273f2ca42d776ed5afe5b052c6

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                199KB

                                MD5

                                a18ce6140b95cacbab48e4ee494e93e7

                                SHA1

                                c17a3f5be56a8d7e8170c239906636d209ccad13

                                SHA256

                                f74587d8cd34d9fcd2f49476f5b815c0da21e541da00feda53534c963ca78f5d

                                SHA512

                                8c37340768cb9c8208c3b6f158ba078edb3ca951b3d88be928c44dc3fcc4e360307ba4da5ab687eddfac5622c69088a5afe3fb2cf1d7ff7ff964d296854b3319

                              • C:\Users\Admin\AppData\Local\Temp\DanaBot.dll

                                Filesize

                                2.4MB

                                MD5

                                7e76f7a5c55a5bc5f5e2d7a9e886782b

                                SHA1

                                fc500153dba682e53776bef53123086f00c0e041

                                SHA256

                                abd75572f897cdda88cec22922d15b509ee8c840fa5894b0aecbef6de23908a3

                                SHA512

                                0318e0040f4dbf954f27fb10a69bce2248e785a31d855615a1eaf303a772ad51d47906a113605d7bfd3c2b2265bf83c61538f78b071f85ee3c4948f5cde3fb24

                              • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini

                                Filesize

                                73B

                                MD5

                                6530e4c62cdea9d4aa76c19818856d2d

                                SHA1

                                805f68ab93e7cf550ae096f8a74546656bdb8dc4

                                SHA256

                                b94d09a64e1b0536d9e89a69b3a2a3093589c960d13dcb0c11641b21175e3460

                                SHA512

                                893f57938ef87850e88a3ce6fe4ff2c56b850e3f41a9e30cc0fcdfcc7b6dad3c6af12e4d70e6fcfce6b2c87d9592a90cbd6e7f2b0770d0566e80c4f96237f02b

                              • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini.lock

                                Filesize

                                18B

                                MD5

                                6dee505ea32d445c123fca3d66040f06

                                SHA1

                                4e7b30f28c07308dfef7f6b7d7ce0f996c1edb22

                                SHA256

                                14472c5ce4cc35625361f82adf87c2f68fb2c11de498383ecf26e356af499621

                                SHA512

                                c55f444f906e18a6bbf78f94c65a36d4772dd49f1d5c142f757555067ee4d96f85b03a3caab39c98f0f753c1aa736cc1b1bbf8c77ed1df8a8838a014d4541fe2

                              • memory/1872-54-0x00007FFB16B70000-0x00007FFB16E26000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/1872-53-0x00007FFB26B30000-0x00007FFB26B64000-memory.dmp

                                Filesize

                                208KB

                              • memory/1872-55-0x00007FFB15150000-0x00007FFB16200000-memory.dmp

                                Filesize

                                16.7MB

                              • memory/1872-52-0x00007FF7479D0000-0x00007FF747AC8000-memory.dmp

                                Filesize

                                992KB

                              • memory/2088-10-0x0000000001E90000-0x00000000020FB000-memory.dmp

                                Filesize

                                2.4MB

                              • memory/2088-21-0x0000000001E90000-0x00000000020FB000-memory.dmp

                                Filesize

                                2.4MB

                              • memory/2088-195-0x0000000001E90000-0x00000000020FB000-memory.dmp

                                Filesize

                                2.4MB

                              • memory/2280-11-0x0000000000400000-0x0000000000AAD000-memory.dmp

                                Filesize

                                6.7MB

                              • memory/2280-12-0x0000000002A80000-0x0000000002D0D000-memory.dmp

                                Filesize

                                2.6MB

                              • memory/2280-13-0x0000000000400000-0x000000000069A000-memory.dmp

                                Filesize

                                2.6MB

                              • memory/2280-1-0x00000000027F0000-0x0000000002A71000-memory.dmp

                                Filesize

                                2.5MB

                              • memory/2280-3-0x0000000000400000-0x000000000069A000-memory.dmp

                                Filesize

                                2.6MB

                              • memory/2280-2-0x0000000002A80000-0x0000000002D0D000-memory.dmp

                                Filesize

                                2.6MB

                              • memory/4984-7-0x00000000030B0000-0x00000000030B1000-memory.dmp

                                Filesize

                                4KB