Analysis
-
max time kernel
143s -
max time network
142s -
platform
windows7_x64 -
resource
win7-en -
submitted
11-09-2021 04:36
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Win32.Save.a.27858.20227.exe
Resource
win7-en
General
-
Target
SecuriteInfo.com.Trojan.Win32.Save.a.27858.20227.exe
-
Size
1.0MB
-
MD5
643203bc80de891208614cc77925373f
-
SHA1
0df0efd8a4d0cabcc8242d708e72cd11ec70b19b
-
SHA256
49f3d49a89443de2c5c954803aff0e8891c6a87c069c784dd67e373204590cd5
-
SHA512
c6666663e6831995f693b8561f128a1b791d01c92e6f3f31c298ec56806c01f8d6056046dadd33537574f868b3ded3011427d00ad4679eb27228236b70560e87
Malware Config
Extracted
danabot
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
Signatures
-
Danabot Loader Component 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\SECURI~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\SECURI~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\SECURI~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\SECURI~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\SECURI~1.DLL DanabotLoader2021 behavioral1/memory/2020-62-0x0000000001E80000-0x0000000001FE1000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 3 2020 rundll32.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 2020 rundll32.exe 2020 rundll32.exe 2020 rundll32.exe 2020 rundll32.exe -
Drops file in Program Files directory 1 IoCs
Processes:
rundll32.exedescription ioc process File created C:\PROGRA~3\Gskyj.tmp rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
SecuriteInfo.com.Trojan.Win32.Save.a.27858.20227.exedescription pid process target process PID 2044 wrote to memory of 2020 2044 SecuriteInfo.com.Trojan.Win32.Save.a.27858.20227.exe rundll32.exe PID 2044 wrote to memory of 2020 2044 SecuriteInfo.com.Trojan.Win32.Save.a.27858.20227.exe rundll32.exe PID 2044 wrote to memory of 2020 2044 SecuriteInfo.com.Trojan.Win32.Save.a.27858.20227.exe rundll32.exe PID 2044 wrote to memory of 2020 2044 SecuriteInfo.com.Trojan.Win32.Save.a.27858.20227.exe rundll32.exe PID 2044 wrote to memory of 2020 2044 SecuriteInfo.com.Trojan.Win32.Save.a.27858.20227.exe rundll32.exe PID 2044 wrote to memory of 2020 2044 SecuriteInfo.com.Trojan.Win32.Save.a.27858.20227.exe rundll32.exe PID 2044 wrote to memory of 2020 2044 SecuriteInfo.com.Trojan.Win32.Save.a.27858.20227.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Win32.Save.a.27858.20227.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Win32.Save.a.27858.20227.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\SECURI~1.DLL,s C:\Users\Admin\AppData\Local\Temp\SECURI~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Program Files directory
PID:2020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
619cc0dd311737393371cfda6bb57b91
SHA1f9f000480eb9daad7c73cd1c48f8822ac278e19f
SHA256025da2d73d48ec45e30c3238e5b1ddc84989035265b07e86b1627fb6cdc4cfce
SHA512f2afd2a3bb26d450f8a7914043b9575e6d57936b12e26f6412e4528b7f84bada0004067b1281058be968f757190a7362c77ae2df2bb9fcd632919b7ef13a78f0
-
MD5
619cc0dd311737393371cfda6bb57b91
SHA1f9f000480eb9daad7c73cd1c48f8822ac278e19f
SHA256025da2d73d48ec45e30c3238e5b1ddc84989035265b07e86b1627fb6cdc4cfce
SHA512f2afd2a3bb26d450f8a7914043b9575e6d57936b12e26f6412e4528b7f84bada0004067b1281058be968f757190a7362c77ae2df2bb9fcd632919b7ef13a78f0
-
MD5
619cc0dd311737393371cfda6bb57b91
SHA1f9f000480eb9daad7c73cd1c48f8822ac278e19f
SHA256025da2d73d48ec45e30c3238e5b1ddc84989035265b07e86b1627fb6cdc4cfce
SHA512f2afd2a3bb26d450f8a7914043b9575e6d57936b12e26f6412e4528b7f84bada0004067b1281058be968f757190a7362c77ae2df2bb9fcd632919b7ef13a78f0
-
MD5
619cc0dd311737393371cfda6bb57b91
SHA1f9f000480eb9daad7c73cd1c48f8822ac278e19f
SHA256025da2d73d48ec45e30c3238e5b1ddc84989035265b07e86b1627fb6cdc4cfce
SHA512f2afd2a3bb26d450f8a7914043b9575e6d57936b12e26f6412e4528b7f84bada0004067b1281058be968f757190a7362c77ae2df2bb9fcd632919b7ef13a78f0
-
MD5
619cc0dd311737393371cfda6bb57b91
SHA1f9f000480eb9daad7c73cd1c48f8822ac278e19f
SHA256025da2d73d48ec45e30c3238e5b1ddc84989035265b07e86b1627fb6cdc4cfce
SHA512f2afd2a3bb26d450f8a7914043b9575e6d57936b12e26f6412e4528b7f84bada0004067b1281058be968f757190a7362c77ae2df2bb9fcd632919b7ef13a78f0