Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en -
submitted
14-09-2021 11:40
Static task
static1
Behavioral task
behavioral1
Sample
194da08d62700deae3dfbc9ecbf0fb03.exe
Resource
win7v20210408
General
-
Target
194da08d62700deae3dfbc9ecbf0fb03.exe
-
Size
1.2MB
-
MD5
194da08d62700deae3dfbc9ecbf0fb03
-
SHA1
e7385bf842b7a8e72227fa9b98454ea4841d980a
-
SHA256
f6f17df29850bf734970fd18cc9c8fbf1e7cc901c2f0a823b1743c5866394254
-
SHA512
e56c674f9116e8c5cf1eb4cac434b7347eaaeb4392b5af229dee6f9bcd3f07b530c78223c020f62ce3df6ae4f02ed3051cdea6b3b44d15dc7b40d60c8128e211
Malware Config
Extracted
danabot
23.229.29.48:443
5.9.224.204:443
192.255.166.212:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
Signatures
-
Danabot Loader Component 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\194DA0~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\194DA0~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\194DA0~1.DLL DanabotLoader2021 behavioral2/memory/4884-121-0x0000000000D60000-0x0000000000EC2000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 13 4884 rundll32.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 4884 rundll32.exe 4884 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
194da08d62700deae3dfbc9ecbf0fb03.exedescription pid process target process PID 4564 wrote to memory of 4884 4564 194da08d62700deae3dfbc9ecbf0fb03.exe rundll32.exe PID 4564 wrote to memory of 4884 4564 194da08d62700deae3dfbc9ecbf0fb03.exe rundll32.exe PID 4564 wrote to memory of 4884 4564 194da08d62700deae3dfbc9ecbf0fb03.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\194da08d62700deae3dfbc9ecbf0fb03.exe"C:\Users\Admin\AppData\Local\Temp\194da08d62700deae3dfbc9ecbf0fb03.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\194DA0~1.DLL,s C:\Users\Admin\AppData\Local\Temp\194DA0~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\194DA0~1.DLLMD5
9b599a6da5eb6331111c4c9acdbe7628
SHA1c54f621ca83940e2bf7c10ea175bacfd82a43669
SHA256ca1713b114f47b49cdba0b320e66f96f9fa4f5d08210454cfe25c6935fc15393
SHA512b7261b2618e3412fbde232a221ff2470226249241b0b15de0a62a3399ecf92aa4cbae5ce42c45d9471f10b92673868a5d27e5fd58fca06f35dab9f68232ca8e2
-
\Users\Admin\AppData\Local\Temp\194DA0~1.DLLMD5
9b599a6da5eb6331111c4c9acdbe7628
SHA1c54f621ca83940e2bf7c10ea175bacfd82a43669
SHA256ca1713b114f47b49cdba0b320e66f96f9fa4f5d08210454cfe25c6935fc15393
SHA512b7261b2618e3412fbde232a221ff2470226249241b0b15de0a62a3399ecf92aa4cbae5ce42c45d9471f10b92673868a5d27e5fd58fca06f35dab9f68232ca8e2
-
\Users\Admin\AppData\Local\Temp\194DA0~1.DLLMD5
9b599a6da5eb6331111c4c9acdbe7628
SHA1c54f621ca83940e2bf7c10ea175bacfd82a43669
SHA256ca1713b114f47b49cdba0b320e66f96f9fa4f5d08210454cfe25c6935fc15393
SHA512b7261b2618e3412fbde232a221ff2470226249241b0b15de0a62a3399ecf92aa4cbae5ce42c45d9471f10b92673868a5d27e5fd58fca06f35dab9f68232ca8e2
-
memory/4564-115-0x0000000003770000-0x0000000003875000-memory.dmpFilesize
1.0MB
-
memory/4564-116-0x0000000000400000-0x0000000001860000-memory.dmpFilesize
20.4MB
-
memory/4884-117-0x0000000000000000-mapping.dmp
-
memory/4884-121-0x0000000000D60000-0x0000000000EC2000-memory.dmpFilesize
1.4MB