Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
18-11-2021 18:50
Static task
static1
General
-
Target
fc3bbac32a466177b1575504b966baf11e8b7c3aafc4f755818591fb35aaf5d4.exe
-
Size
1.8MB
-
MD5
ab31c2d598849285e601ef678552ee29
-
SHA1
e732ba422aa5a6c6abc13685e7cda9ac7d43b1a5
-
SHA256
fc3bbac32a466177b1575504b966baf11e8b7c3aafc4f755818591fb35aaf5d4
-
SHA512
a3069dc5aff9e084a4a1c3e088837d3c46ca6c812ed1c2ed85cb3aac5e6785d57a5444dec71ba8a98084015a30faf9abf7b2e43ea97cf5a00ef96b0c00241eb2
Malware Config
Extracted
Family
danabot
C2
192.119.110.73:443
192.236.192.201:443
Attributes
-
embedded_hash
0FA95F120D6EB149A5D48E36BC76879D
-
type
loader
rsa_pubkey.plain
rsa_privkey.plain
Signatures
-
Danabot Loader Component 2 IoCs
resource yara_rule behavioral1/files/0x000400000001abc8-122.dat DanabotLoader2021 behavioral1/files/0x000400000001abc8-123.dat DanabotLoader2021 -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 4180 created 4200 4180 WerFault.exe 68 -
Loads dropped DLL 1 IoCs
pid Process 856 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4180 4200 WerFault.exe 68 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 4180 WerFault.exe Token: SeBackupPrivilege 4180 WerFault.exe Token: SeDebugPrivilege 4180 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4200 wrote to memory of 856 4200 fc3bbac32a466177b1575504b966baf11e8b7c3aafc4f755818591fb35aaf5d4.exe 69 PID 4200 wrote to memory of 856 4200 fc3bbac32a466177b1575504b966baf11e8b7c3aafc4f755818591fb35aaf5d4.exe 69 PID 4200 wrote to memory of 856 4200 fc3bbac32a466177b1575504b966baf11e8b7c3aafc4f755818591fb35aaf5d4.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc3bbac32a466177b1575504b966baf11e8b7c3aafc4f755818591fb35aaf5d4.exe"C:\Users\Admin\AppData\Local\Temp\fc3bbac32a466177b1575504b966baf11e8b7c3aafc4f755818591fb35aaf5d4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\FC3BBA~1.DLL,s C:\Users\Admin\AppData\Local\Temp\FC3BBA~1.EXE2⤵
- Loads dropped DLL
PID:856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 5482⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4180
-