Analysis
-
max time kernel
138s -
max time network
54s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
25-06-2020 12:40
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Danabot.2.3619.11339.exe
Resource
win7
General
-
Target
SecuriteInfo.com.Variant.Danabot.2.3619.11339.exe
-
Size
920KB
-
MD5
aa9d791d36be565f6d537f34f0ed9f6e
-
SHA1
bab4cf9b752885788d4f07c42a5dcca42b1193b6
-
SHA256
e444e98ee06dc0e26cae8aa57a0cddab7b050db22d3002bd2b0da47d4fd5d78c
-
SHA512
cab24f89b5172827fb0fd31e9d97fc3879fdbf3e9c19f8de8147f7ebdf95373c1e56acc5a5fa2c9dc5c46c73007f1520ee62f45b84ac5a3795c7b2d24326c5f5
Malware Config
Extracted
danabot
45.11.183.43
185.101.92.195
185.101.92.201
Signatures
-
Danabot x86 payload 4 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\SECURI~1.DLL family_danabot \Users\Admin\AppData\Local\Temp\SECURI~1.DLL family_danabot \Users\Admin\AppData\Local\Temp\SECURI~1.DLL family_danabot \Users\Admin\AppData\Local\Temp\SECURI~1.DLL family_danabot -
Blocklisted process makes network request 10 IoCs
Processes:
rundll32.exeflow pid process 1 656 rundll32.exe 5 656 rundll32.exe 6 656 rundll32.exe 7 656 rundll32.exe 8 656 rundll32.exe 9 656 rundll32.exe 10 656 rundll32.exe 11 656 rundll32.exe 12 656 rundll32.exe 13 656 rundll32.exe -
Loads dropped DLL 3 IoCs
Processes:
regsvr32.exerundll32.exepid process 516 regsvr32.exe 516 regsvr32.exe 656 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
SecuriteInfo.com.Variant.Danabot.2.3619.11339.exeregsvr32.exedescription pid process target process PID 3656 wrote to memory of 516 3656 SecuriteInfo.com.Variant.Danabot.2.3619.11339.exe regsvr32.exe PID 3656 wrote to memory of 516 3656 SecuriteInfo.com.Variant.Danabot.2.3619.11339.exe regsvr32.exe PID 3656 wrote to memory of 516 3656 SecuriteInfo.com.Variant.Danabot.2.3619.11339.exe regsvr32.exe PID 516 wrote to memory of 656 516 regsvr32.exe rundll32.exe PID 516 wrote to memory of 656 516 regsvr32.exe rundll32.exe PID 516 wrote to memory of 656 516 regsvr32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Danabot.2.3619.11339.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Danabot.2.3619.11339.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\SECURI~1.DLL f1 C:\Users\Admin\AppData\Local\Temp\SECURI~1.EXE@36562⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\SECURI~1.DLL,f03⤵
- Blocklisted process makes network request
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\SECURI~1.DLLMD5
3adeb8722fc17162202c93aba62a0148
SHA1675e1a27bcb75a99cfd0347cc28a78e6965c352c
SHA2564471c864eca1949f2401a991e64639c53e30cd4582ffee12103a6607a5a79fc1
SHA5124956240237ee6eb99b611ad917c1d620825ab627d386a0369f5f88a698d624e438ef732976a4050d33773d5734e064cf5c50f22b703428b3a3ad085711dfc947
-
\Users\Admin\AppData\Local\Temp\SECURI~1.DLLMD5
3adeb8722fc17162202c93aba62a0148
SHA1675e1a27bcb75a99cfd0347cc28a78e6965c352c
SHA2564471c864eca1949f2401a991e64639c53e30cd4582ffee12103a6607a5a79fc1
SHA5124956240237ee6eb99b611ad917c1d620825ab627d386a0369f5f88a698d624e438ef732976a4050d33773d5734e064cf5c50f22b703428b3a3ad085711dfc947
-
\Users\Admin\AppData\Local\Temp\SECURI~1.DLLMD5
3adeb8722fc17162202c93aba62a0148
SHA1675e1a27bcb75a99cfd0347cc28a78e6965c352c
SHA2564471c864eca1949f2401a991e64639c53e30cd4582ffee12103a6607a5a79fc1
SHA5124956240237ee6eb99b611ad917c1d620825ab627d386a0369f5f88a698d624e438ef732976a4050d33773d5734e064cf5c50f22b703428b3a3ad085711dfc947
-
\Users\Admin\AppData\Local\Temp\SECURI~1.DLLMD5
3adeb8722fc17162202c93aba62a0148
SHA1675e1a27bcb75a99cfd0347cc28a78e6965c352c
SHA2564471c864eca1949f2401a991e64639c53e30cd4582ffee12103a6607a5a79fc1
SHA5124956240237ee6eb99b611ad917c1d620825ab627d386a0369f5f88a698d624e438ef732976a4050d33773d5734e064cf5c50f22b703428b3a3ad085711dfc947
-
memory/516-0-0x0000000000000000-mapping.dmp
-
memory/656-4-0x0000000000000000-mapping.dmp