Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 19:56
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Graftor.752710.22488.21345.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Variant.Graftor.752710.22488.21345.dll
-
Size
3.3MB
-
MD5
87d9f26e60c839281621348244e7a50e
-
SHA1
03cdedd359cf66d388f96c6aa48c9ba75469db72
-
SHA256
a5bd1ac8e6458e40e63cf558145dbd06cc2700d97f9ed3ae5a161b165ca6c035
-
SHA512
82f9de782234b46938e80cd357f847f4a5bdd8a75f7d412fc10fde3e4d9ef336e6db7f7b05c22859cb4344d3c20de69456916f5c8c1d14906edfbb4a0da682b3
Malware Config
Extracted
Family
danabot
C2
172.81.129.196
54.38.22.65
192.99.219.207
51.255.134.130
192.236.179.73
23.82.140.201
45.147.228.92
rsa_pubkey.plain
Signatures
-
Blocklisted process makes network request 5 IoCs
Processes:
rundll32.exeflow pid process 22 3772 rundll32.exe 23 3772 rundll32.exe 24 3772 rundll32.exe 25 3772 rundll32.exe 27 3772 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1520 1912 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 1520 WerFault.exe Token: SeBackupPrivilege 1520 WerFault.exe Token: SeDebugPrivilege 1520 WerFault.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 972 wrote to memory of 1912 972 rundll32.exe rundll32.exe PID 972 wrote to memory of 1912 972 rundll32.exe rundll32.exe PID 972 wrote to memory of 1912 972 rundll32.exe rundll32.exe PID 1912 wrote to memory of 3772 1912 rundll32.exe rundll32.exe PID 1912 wrote to memory of 3772 1912 rundll32.exe rundll32.exe PID 1912 wrote to memory of 3772 1912 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Graftor.752710.22488.21345.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Graftor.752710.22488.21345.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Graftor.752710.22488.21345.dll,f03⤵
- Blocklisted process makes network request
PID:3772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 7363⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520