2179
Detailed Technical Analysis Report of Danse Bank Phishing Campaign Detailed Technical Analysis Report of Danse Bank Phishing Campaign
Trojan,Malware Analysis | 07/16/2018

Detailed Technical Analysis Report of Danse Bank Phishing Campaign


When was the last time you checked your PC health? Do you know your PC requires a regular Check Up!!!

Danse Bank Phishing Campaign Overview

Recently a new malware campaign has been seen, in which an attacker is sending phishing emails to Danse bank client with an attachment of Office Document in the Email.

An attachment contains a malicious document contains an obfuscated malicious macro script that attempts to connect their C&C server to automatically downloads the Trickbot malware in background on the user’s machine with the help of PowerShell.

 

Flow Chart:

Flow Chart

Get peace of mind! Get rid of malicious programs instantly

Free Malware Scan Compatible with Win 10,8.1,8 & 7

Technical Analysis of TRICKBOT Malware Campaign

See Also: Detailed Technical Analysis Report of PoisonFang Ransomware

File Name: DNSKE21393.doc

MD5: 1C9F56281F296FADDF05EFDF34423078

File Type: DOC

Spread Via:  E-mail

Detail Description TRICKBOT Malware Campaign with Screenshots

During execution of DNSKE21393.doc, it’s launch Microsoft Word application in Protected View Mode.

Macro Protection

Figure 1 Enable Content (Macros Disabled)

By default, Microsoft Office Application has turned on the Protected Mode Feature & Also Disabled the Macro’s for security purposes.

In case, if the user disabled the protection mechanism & enabled the macro’s feature then the warning message notification didn’t popup. And it will harm your system.

So, it’s always recommended to never disable the protection mode.

Are you worried about your PC health?

Check your PC Health for Free!

Powered By:howtoremoveit.info Run Free Scan

In case, if the user clicks on the Enable Content button or doesn’t using Microsoft Default Protected View Mode, Malicious macro will automatically download the payload into %temp% location with the help of Powershell.exe

%temp%\{Random name}.exe

As shown below, WINWORD.exe creates several processes

Process Tree

Figure 2 Process Tree

As shown below, DNSKE21393.doc contain obfuscated malicious macro which is not clearly visible and understandable by the normal user.

 

Macro Protection

Figure 3 Obfuscated Macro Code

To understand the obfuscated code, a person needs to be expertise or having skillset to debobfuscate this kind of obfuscated code.

By analyzing the above obfuscated macro code, we came to know that it’s runs the malicious PowerShell script in the background.

PowerShell script:

PowerShell Script

Figure 2 PS Script

As shown above, PowerShell script attempts to connect 1 URL’s, whichever URL is active it downloads the payload into %temp%\{Random-Name}.exe

Thereupon, it automatically starts the downloaded payload process (Random-Name.exe) on the victim’s machine.

Once the Trickbot malware is downloaded (HASH: 6124C863C08F92732DA180D4CF7CBF38), it automatically initiated by the powershell.exe as shown in the above PowerShell script.

Following is the process tree of the trickbot malware

Trickbot Process Tree

Figure 3 Trickbot Process Tree

As shown above,Once the trickbot malware is activated then it deletes the windows defender service with the help of cmd.exe and sc.exe command. First they stop the windows defender service and thereafter it deletes the windows defender service so, that windows defender didn’t detect their malicious behavior.

Service Deleted

Figure 4 Service Deleted

As shown above, in the trickbot process tree after deleting the service it also attempts to disable the real time monitoring through PowerShell command.

Thereafter, it copies itself into %appdata%\roaming\msnet\awdtgtdfa.exe

While the malware is running in the background it creates a task scheduler service with the name of MsSystemWatcher in C:\Windows\System32\Tasks

Trickbot malware drops the the module and config files at following location C:\Users\admin.admin-PC\AppData\Roaming\msnet\Modules as you can see in the following screenshot:

 

Tricbot Files Original

 Trickbot Module1

 Tricbot Modules_Config

Tricbot Modules Original1

Figure 5 Trickbot Modules & Config Files

 As shown below trickbot malware injects the svchost.exe and initiated several processes of svchost.exe

Svchost Process

Figure 6 Svchost.exe Process Tree

As shown below, it also creates the several files at following location C:\ProgramData\Microsoft\Vault\AC658CB4-9126-49BD-B877-31EEDAB3F204

Vault Files

Figure 7 Vault Files

 

As shown below, 3CCD5499-87A8-4B10-A215-608888DD3B55.vsch contains the Windows & Web Password Credential in encrypted format

 

 Windows Web Credentials

Figure 8 Credentials

As shown below, trickbot malware attempts to connect their C&C Server on following IP’s & URL to exchange the data.

 

1bzt263zopuc.ru:447

vdsina.ru:447

138.34.32.218:443

178.78.202.189:443

85.9.212.117:443

93.109.242.134:443

118.91.178.101:443

158.58.131.54:443

 

As shown below it creates the user folder on their server

hxxp://188[.]124[.]167[.]132:8082/ser0712/ADMIN-PC_W617601.ADB2FE527xxxxx/90

 

Trickbot malware contains the list of banks for their targets following are the few names of them:

https://netbanking.ubluk.com/Login/Index

https://my.sjpbank.co.uk/Security/Auth/Logon

https://ebaer.juliusbaer.com

https://ibb.firsttrustbank1.co.uk

https://bureau.bottomline.co.uk

https://online.duncanlawrie.com

https://ibank.reliancebankltd.com/logon.aspx

https://www.kbinternetbanking.com

https://banking.ireland-bank.com

 

IOC’s

Associated Hash

Filename:DNSKE21393_doc

MD5:1C9F56281F296FADDF05EFDF34423078

SHA1:12415CF830B1582A7A8A8BB0F0B9318C4270531C

CRC32:E637B9BA

SHA-256:5D15E68590DF3537CB041964CECCC1BE9C6F93C47BB4371EF7402D3CB6DF55D9

 

Filename:55.66

MD5:6124C863C08F92732DA180D4CF7CBF38

SHA1:D4FE6FF566B4DD76B7DE5489179272074387B172

CRC32:7F37D4FF

SHA-256:12153C02D2632F80C1F6252F6A6D3BD55EA1AB6E2593CCEC1D791CFA5326964D

 

Filename:importDll32

MD5:3C0A14D3E4E5F1968434ECB017A4689B

SHA1:F98CA6A41521EC9655F750578111D6E2D08D43A9

CRC32:FA2B7317

SHA-256:1FE6468953FD707838B8D7B212C6CCCC414CF256CD73B4D8C7EBC30AF740A5BE

 

Filename:injectDll32

MD5:5DFEA92F65755CF314180DB40596B9FE

SHA1:554D0C31FDB63BA662C61F4C21F269BD69B1012B

CRC32:34572B1E

SHA-256:2B3E39A3B703C8E3333FDFB4694B756873391A2415061AF69006127301FFFB20

 

Filename:mailsearcher32

MD5:F877C696C4082654FE64E135966FFCC6

SHA1:34D44FFB9F57FAABF77528DD81F4D9990D2ED983

CRC32:622D8C91

SHA-256:CB30504AFE789B23717CF3F7DAB66C3B1677FE7B78F31582ADBC2A3DB76873D9

 

Filename:networkDll32

MD5:30562B6FE4D8EFDCE3783CDD0909FFE6

SHA1:05B8E3B60512EC12372B817814E436F39E2C801B

CRC32:CAED28C5

SHA-256:2BAB8BA30719A42213DB0087572E481F14DE7CDF7BFFE1A1BE17DB9F09D70525

 

Filename:NewBCtestDll32

MD5:B45E65CAF681F1E0CBE416434FFC8F44

SHA1:E3C2E9C316CE3F3544BDEE20C5C2A030071C9DD2

CRC32:CFC5B0A4

SHA-256:E2FA0A720E73BEBA0F5CF4D310C5F5504B8D0D776025686C1A460A72E8A7A5F8

 

Filename:systeminfo32

MD5:B3A9D059584418A2A0803FB0C6753EA9

SHA1:D19EF63CCEF78C785CBDE5008FBFE7721625D02F

CRC32:AE0D7F34

SHA-256:70DCCAA8296D3101E33F952EB2A927A21F428786F1F8DB724EAF918408E348CF

 

Filename:sinj

MD5:BC809301EDB66C38907B9DED1AE696E6

SHA1:D56EA32EF6937462C12624A98CDD69C2C6BCD140

CRC32:C5109181

SHA-256:DCA18E4109CEB523EF9442A53E0D37F763A10BCB112F707BD7ED2A65D7786520

 

Filename:dinj

MD5:8436DAD1E38D28A5501E6621FF402AFD

SHA1:C072D0C5757B8E66C7D1A3D5548A724CEA361FA3

CRC32:1D2F9426

SHA-256:AF993706474253E33A75A83C5615712C46B26B2D447D3F2CB8C55D2C1026E0E7

 

Filename:mailconf

MD5:77F882C3A84FBEE808A31CEA998D9E63

SHA1:3354E30E759F2D52C2B6F0495948DCE1DFA3F525

CRC32:C963DE45

SHA-256:81822FBD2FFC45C6573961CDC38DEDE20BE23529E932A3DB43DA6CB4BFF34D89

 

Filename:dpost

MD5:8167D861D9C9410E9E9B77DC324E715C

SHA1:B6C75BC64BB68676570E96FD6312CD55888FC254

CRC32:A6F88913

SHA-256:3C95E152CAE6D7B6C88D1A613CEAFA51F7FE6D7B4B8C3B7DAADC2F4B503C5813

 

Filename:bcconfig

MD5:0DD1F8E7F789124335A2983FA5AAC1FE

SHA1:74C9BCF26A03E0DBC67465F42EAF1976DA0E5E90

CRC32:78C3904C

SHA-256:CF28FF1F7930E29351C8D063D4BC903A920BDDE47C15B6DA7A26543A74FC513A

 

Filename:FAQ

MD5:0F33F72293B04E24B36F2AD56A25A4D7

SHA1:01D2CC41834A495039D33B7C659B95BF2C9285C8

CRC32:685382E6

SHA-256:4DD84B235F15D8C8206EFC8DAB48779DD5B304923E78CD07D2605A341C63379D

 

Filename:README.md

MD5:71DEEEED5D16DBEBF67FEE8CDF82938F

SHA1:78CC35B62D19FDCD3D82B16DE57C9AFBE9BEFE9F

CRC32:A8E58EEF

SHA-256:5DC3791D92DEC1367CC8C77935BBC95E49D969DEFFE99ACE3D6934F2596D1324

 

Filename:info.dat

MD5:56807C160C8835BC880998B1183D34FB

SHA1:4D681F6E9ABD90934B55A8B140C749E21A2DA4BD

CRC32:D3CAD33D

SHA-256:F0C1D4E52360CD14CF9F57B0A391E08499C2E89D943628590312C95FEC8903F3

 

Filename:awdtgtdfa.exe

MD5:6124C863C08F92732DA180D4CF7CBF38

SHA1:D4FE6FF566B4DD76B7DE5489179272074387B172

CRC32:7F37D4FF

SHA-256:12153C02D2632F80C1F6252F6A6D3BD55EA1AB6E2593CCEC1D791CFA5326964D

Associated URL

hxxp://188[.]124[.]167[.]132:8082/ser0712/ADMIN-PC_W617601.ADB2FE527xxxxx/90

 

Associated Path

C:\Users\admin.admin-PC\AppData\Roaming\msnet\awdtgtdfa.exe

C:\Users\admin.admin-PC\AppData\Roaming\msnet\FAQ

C:\Users\admin.admin-PC\AppData\Roaming\msnet\README.md

C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

C:\Windows\Temp\Cab7446.tmp

C:\Windows\Temp\Tar7447.tmp

C:\Users\admin.admin-PC\AppData\Roaming\msnet\Modules\systeminfo32

C:\Users\admin.admin-PC\AppData\Roaming\msnet\Modules\injectDll32

C:\Users\admin.admin-PC\AppData\Roaming\msnet\Modules\injectDll32_configs\dinj

C:\Users\admin.admin-PC\AppData\Roaming\msnet\Modules\injectDll32_configs\sinj

C:\Users\admin.admin-PC\AppData\Roaming\msnet\Modules\injectDll32_configs\dpost

C:\Users\admin.admin-PC\AppData\Roaming\msnet\info.dat

C:\Users\admin.admin-PC\AppData\Roaming\msnet\Modules\networkDll32_configs\dpost

C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\6d14e4b1d8ca773bab785d1be032546e_750a5d32-5991-4402-94e4-2511c15222f5

 

Associated IP

 

1bzt263zopuc.ru:447

vdsina.ru:447

138.34.32.218:443

178.78.202.189:443

85.9.212.117:443

93.109.242.134:443

118.91.178.101:443

158.58.131.54:443

70.114.186.116:443

118.200.151.113:443

89.117.107.13:443

109.86.227.152:443

178.78.202.189:443

200.2.126.98:443

96.31.109.51:443

90.69.224.122:443

194.68.23.182:443

182.253.210.130:449

77.89.86.93:443

89.117.107.13:443

70.79.178.120:449

138.34.32.74:443

185.129.193.221:443

184.68.167.42:443

200.46.121.130:443

82.202.221.78:443

195.133.48.175:443

82.202.236.5:443

82.146.58.216:443

109.234.35.87:443

95.213.200.239:443

185.143.172.110:443

Get peace of mind! Get rid of malicious programs instantly

Free Malware Scan Compatible with Win 10,8.1,8 & 7

See Also: Detailed Technical Analysis Report of New Macro Technique Delivers Backdoor

Associated Registry Entry

HKLM\System\CurrentControlSet\Services\Tcpip\Parameters

HKLM\System\CurrentControlSet\Control\SecurityProviders\Schannel

HKLM\SOFTWARE\Microsoft\EnterpriseCertificates\CA\Certificate

HKU\.DEFAULT\Software\Classes\Local Settings\MuiCache\10B\52C64B7E\LanguageList

HKU\.DEFAULT\Software\Classes\Local Settings\MuiCache\10B\52C64B7E\@%SystemRoot%\system32\p2pcollab.dll,-8042

HKU\.DEFAULT\Software\Classes\Local Settings\MuiCache\10B\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103

 


Tips to Prevent virus and malware from Infecting Your System:
  1. Enable your popup blocker: Pop-ups and ads on the websites are the most adoptable tactic used by cybercriminals or developers with the core intention to spread malicious programs.
    So, avoid clicking uncertain sites, software offers, pop-ups etc. and Install a powerful ad- blocker for ChromeMozilla, and IE
  2. Keep your Windows Updated: To avoid such infections, we recommend that you should always keep your system updated through automatic windows update.By doing this you can keep your device free from virus.According to the survey, outdated/older versions of Windows operating system are an easy target.
  3. Third-party installation: Try to avoid freeware download websites as they usually install bundled of software with any installer or stub file.
  4. Regular Backup: Regular and periodical backup helps you to keep your data safe in case the system is infected by any kind of virus or any other infection.Thus always backup important files regularly on a cloud drive or an external hard drive.
  5. Always have an Anti-Virus: Precaution is better than cure. We recommend that you install an antivirus like ITL Total Security or a good Malware Removal Tool like Download Virus RemovalTool

Newsletter

×
×
#include file="../statichtml/static_notification.html"

1

ITLSecureVPN_setup.exe
2

3

1

2

3

1

2

3