Analysis
-
max time kernel
13s -
max time network
13s -
platform
windows7_x64 -
resource
win7 -
submitted
14-09-2020 01:26
Static task
static1
Behavioral task
behavioral1
Sample
elder.exe
Resource
win7
General
-
Target
elder.exe
-
Size
2.3MB
-
MD5
e4fc60d76aed36f58af4e8a02ac91887
-
SHA1
59565273a6d014865b15e81fdbbed59fc56451f0
-
SHA256
7a5bff709af4ad1e50840b0822a91edbec6ab2418e13ef1cdf30e3ea09228590
-
SHA512
5e2653cae0d078f1ed4856b196f0956f78c40c270372e1104cdca9c5d86c8e2d17516164d6d9ab7779a038a36753a82f0c1de6b859d4d8e0582d9602c477f19a
Malware Config
Extracted
danabot
89.44.9.132
64.188.23.70
179.43.133.35
45.147.231.218
89.45.4.126
Signatures
-
Danabot x86 payload 6 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\elder.dll family_danabot \Users\Admin\AppData\Local\Temp\elder.dll family_danabot \Users\Admin\AppData\Local\Temp\elder.dll family_danabot \Users\Admin\AppData\Local\Temp\elder.dll family_danabot \Users\Admin\AppData\Local\Temp\elder.dll family_danabot \Users\Admin\AppData\Local\Temp\elder.dll family_danabot -
Blocklisted process makes network request 10 IoCs
Processes:
rundll32.exeflow pid process 2 1616 rundll32.exe 3 1616 rundll32.exe 4 1616 rundll32.exe 5 1616 rundll32.exe 6 1616 rundll32.exe 7 1616 rundll32.exe 8 1616 rundll32.exe 9 1616 rundll32.exe 10 1616 rundll32.exe 11 1616 rundll32.exe -
Loads dropped DLL 5 IoCs
Processes:
regsvr32.exerundll32.exepid process 1564 regsvr32.exe 1616 rundll32.exe 1616 rundll32.exe 1616 rundll32.exe 1616 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
elder.exeregsvr32.exedescription pid process target process PID 1088 wrote to memory of 1564 1088 elder.exe regsvr32.exe PID 1088 wrote to memory of 1564 1088 elder.exe regsvr32.exe PID 1088 wrote to memory of 1564 1088 elder.exe regsvr32.exe PID 1088 wrote to memory of 1564 1088 elder.exe regsvr32.exe PID 1088 wrote to memory of 1564 1088 elder.exe regsvr32.exe PID 1088 wrote to memory of 1564 1088 elder.exe regsvr32.exe PID 1088 wrote to memory of 1564 1088 elder.exe regsvr32.exe PID 1564 wrote to memory of 1616 1564 regsvr32.exe rundll32.exe PID 1564 wrote to memory of 1616 1564 regsvr32.exe rundll32.exe PID 1564 wrote to memory of 1616 1564 regsvr32.exe rundll32.exe PID 1564 wrote to memory of 1616 1564 regsvr32.exe rundll32.exe PID 1564 wrote to memory of 1616 1564 regsvr32.exe rundll32.exe PID 1564 wrote to memory of 1616 1564 regsvr32.exe rundll32.exe PID 1564 wrote to memory of 1616 1564 regsvr32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\elder.exe"C:\Users\Admin\AppData\Local\Temp\elder.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\elder.dll f1 C:\Users\Admin\AppData\Local\Temp\elder.exe@10882⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\elder.dll,f03⤵
- Blocklisted process makes network request
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\elder.dllMD5
07119b1790f56250fff9f87e81b96fc2
SHA1400e345b7566f4d7b8c5bd460b271864a934172d
SHA256fd9fd627f781017c2e5b375a3ac6b7f3f6e2c081d0ea093f281043d83ef04f09
SHA51226f852057938563c10c2289706b582c86622055041b47aae29a395947a1a457649b719630ec3c995d5edf4fd9a2c581ce4a52698fa3f7e1b9ce27b8728c87dfd
-
\Users\Admin\AppData\Local\Temp\elder.dllMD5
07119b1790f56250fff9f87e81b96fc2
SHA1400e345b7566f4d7b8c5bd460b271864a934172d
SHA256fd9fd627f781017c2e5b375a3ac6b7f3f6e2c081d0ea093f281043d83ef04f09
SHA51226f852057938563c10c2289706b582c86622055041b47aae29a395947a1a457649b719630ec3c995d5edf4fd9a2c581ce4a52698fa3f7e1b9ce27b8728c87dfd
-
\Users\Admin\AppData\Local\Temp\elder.dllMD5
07119b1790f56250fff9f87e81b96fc2
SHA1400e345b7566f4d7b8c5bd460b271864a934172d
SHA256fd9fd627f781017c2e5b375a3ac6b7f3f6e2c081d0ea093f281043d83ef04f09
SHA51226f852057938563c10c2289706b582c86622055041b47aae29a395947a1a457649b719630ec3c995d5edf4fd9a2c581ce4a52698fa3f7e1b9ce27b8728c87dfd
-
\Users\Admin\AppData\Local\Temp\elder.dllMD5
07119b1790f56250fff9f87e81b96fc2
SHA1400e345b7566f4d7b8c5bd460b271864a934172d
SHA256fd9fd627f781017c2e5b375a3ac6b7f3f6e2c081d0ea093f281043d83ef04f09
SHA51226f852057938563c10c2289706b582c86622055041b47aae29a395947a1a457649b719630ec3c995d5edf4fd9a2c581ce4a52698fa3f7e1b9ce27b8728c87dfd
-
\Users\Admin\AppData\Local\Temp\elder.dllMD5
07119b1790f56250fff9f87e81b96fc2
SHA1400e345b7566f4d7b8c5bd460b271864a934172d
SHA256fd9fd627f781017c2e5b375a3ac6b7f3f6e2c081d0ea093f281043d83ef04f09
SHA51226f852057938563c10c2289706b582c86622055041b47aae29a395947a1a457649b719630ec3c995d5edf4fd9a2c581ce4a52698fa3f7e1b9ce27b8728c87dfd
-
\Users\Admin\AppData\Local\Temp\elder.dllMD5
07119b1790f56250fff9f87e81b96fc2
SHA1400e345b7566f4d7b8c5bd460b271864a934172d
SHA256fd9fd627f781017c2e5b375a3ac6b7f3f6e2c081d0ea093f281043d83ef04f09
SHA51226f852057938563c10c2289706b582c86622055041b47aae29a395947a1a457649b719630ec3c995d5edf4fd9a2c581ce4a52698fa3f7e1b9ce27b8728c87dfd
-
memory/1088-0-0x00000000020A0000-0x00000000022C1000-memory.dmpFilesize
2.1MB
-
memory/1088-1-0x00000000022D0000-0x00000000022E1000-memory.dmpFilesize
68KB
-
memory/1564-2-0x0000000000000000-mapping.dmp
-
memory/1616-5-0x0000000000000000-mapping.dmp