Analysis
-
max time kernel
75s -
max time network
102s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 20:16
Static task
static1
Behavioral task
behavioral1
Sample
e374cc56b4174ebb693a7e7a58fbd792.exe
Resource
win7v20201028
General
-
Target
e374cc56b4174ebb693a7e7a58fbd792.exe
-
Size
2.7MB
-
MD5
e374cc56b4174ebb693a7e7a58fbd792
-
SHA1
654dbda2ff076f1907b9ae75b64ba606e9187d76
-
SHA256
d4290ca9fd03f5b700344fc4e14c9559fd9768eaf27fa5a5a2beaac170034ae0
-
SHA512
50ddc88210f2dea81be24650b16b99370bea7b305f71802ce4c2a3ca87ef4c404a951655ab58f67192018725cfcfb2424d0eb1ac46efc279b4a284b763b1fc58
Malware Config
Extracted
danabot
23.106.123.48
93.115.20.97
93.115.21.103
179.43.133.50
193.34.167.73
Signatures
-
Danabot x86 payload 4 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\E374CC~1.DLL family_danabot \Users\Admin\AppData\Local\Temp\E374CC~1.DLL family_danabot \Users\Admin\AppData\Local\Temp\E374CC~1.DLL family_danabot \Users\Admin\AppData\Local\Temp\E374CC~1.DLL family_danabot -
Blocklisted process makes network request 10 IoCs
Processes:
rundll32.exeflow pid process 11 436 rundll32.exe 12 436 rundll32.exe 13 436 rundll32.exe 14 436 rundll32.exe 15 436 rundll32.exe 20 436 rundll32.exe 21 436 rundll32.exe 22 436 rundll32.exe 23 436 rundll32.exe 24 436 rundll32.exe -
Loads dropped DLL 3 IoCs
Processes:
regsvr32.exerundll32.exepid process 2232 regsvr32.exe 436 rundll32.exe 436 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e374cc56b4174ebb693a7e7a58fbd792.exeregsvr32.exedescription pid process target process PID 4756 wrote to memory of 2232 4756 e374cc56b4174ebb693a7e7a58fbd792.exe regsvr32.exe PID 4756 wrote to memory of 2232 4756 e374cc56b4174ebb693a7e7a58fbd792.exe regsvr32.exe PID 4756 wrote to memory of 2232 4756 e374cc56b4174ebb693a7e7a58fbd792.exe regsvr32.exe PID 2232 wrote to memory of 436 2232 regsvr32.exe rundll32.exe PID 2232 wrote to memory of 436 2232 regsvr32.exe rundll32.exe PID 2232 wrote to memory of 436 2232 regsvr32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e374cc56b4174ebb693a7e7a58fbd792.exe"C:\Users\Admin\AppData\Local\Temp\e374cc56b4174ebb693a7e7a58fbd792.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\E374CC~1.DLL f1 C:\Users\Admin\AppData\Local\Temp\E374CC~1.EXE@47562⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\E374CC~1.DLL,f03⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:436
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\E374CC~1.DLLMD5
3cb75e26f8a16fa6bd286ac033452148
SHA1c005cae09b9c4161bfeb7536a3fc5b97ad6c96cf
SHA2569d11ec9801e5f9d4d107091fef230e3d91673de6104288b71daa2abf077a8167
SHA5123afda9a8d2773e5685415dec6f2418a8b40368c909722359e2828e0a2729f4c29eaa4ecda959654b42543be6548e9f8f7bf0645f8b40251ff1e22eea487104ee
-
\Users\Admin\AppData\Local\Temp\E374CC~1.DLLMD5
3cb75e26f8a16fa6bd286ac033452148
SHA1c005cae09b9c4161bfeb7536a3fc5b97ad6c96cf
SHA2569d11ec9801e5f9d4d107091fef230e3d91673de6104288b71daa2abf077a8167
SHA5123afda9a8d2773e5685415dec6f2418a8b40368c909722359e2828e0a2729f4c29eaa4ecda959654b42543be6548e9f8f7bf0645f8b40251ff1e22eea487104ee
-
\Users\Admin\AppData\Local\Temp\E374CC~1.DLLMD5
3cb75e26f8a16fa6bd286ac033452148
SHA1c005cae09b9c4161bfeb7536a3fc5b97ad6c96cf
SHA2569d11ec9801e5f9d4d107091fef230e3d91673de6104288b71daa2abf077a8167
SHA5123afda9a8d2773e5685415dec6f2418a8b40368c909722359e2828e0a2729f4c29eaa4ecda959654b42543be6548e9f8f7bf0645f8b40251ff1e22eea487104ee
-
\Users\Admin\AppData\Local\Temp\E374CC~1.DLLMD5
3cb75e26f8a16fa6bd286ac033452148
SHA1c005cae09b9c4161bfeb7536a3fc5b97ad6c96cf
SHA2569d11ec9801e5f9d4d107091fef230e3d91673de6104288b71daa2abf077a8167
SHA5123afda9a8d2773e5685415dec6f2418a8b40368c909722359e2828e0a2729f4c29eaa4ecda959654b42543be6548e9f8f7bf0645f8b40251ff1e22eea487104ee
-
memory/436-5-0x0000000000000000-mapping.dmp
-
memory/2232-2-0x0000000000000000-mapping.dmp
-
memory/4756-1-0x0000000000D50000-0x0000000000D51000-memory.dmpFilesize
4KB