Analysis
-
max time kernel
139s -
max time network
139s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
23-11-2021 08:55
Static task
static1
General
-
Target
3e2e7ade6f01cbff7cd4cb3380ba211a4646d3e82d295037eb4bb5f85b4835f0.exe
-
Size
1.8MB
-
MD5
eccbe02e557ad19e5445a9f1523f1c3d
-
SHA1
675d681f5da40f365ce2b3e8f55ed259a40a1fdd
-
SHA256
3e2e7ade6f01cbff7cd4cb3380ba211a4646d3e82d295037eb4bb5f85b4835f0
-
SHA512
8cbd6e5884ceb900c2755991fd145a5ce9af5ec012c1bff5a057e889b544e83aa55322ca444c36129a7e452dce364999a34828b63601564a89d3e19767affdbd
Malware Config
Extracted
Family
danabot
C2
142.11.244.223:443
23.106.122.139:443
Attributes
-
embedded_hash
0FA95F120D6EB149A5D48E36BC76879D
-
type
loader
rsa_pubkey.plain
rsa_privkey.plain
Signatures
-
Danabot Loader Component 2 IoCs
resource yara_rule behavioral1/files/0x0007000000000689-122.dat DanabotLoader2021 behavioral1/files/0x0007000000000689-123.dat DanabotLoader2021 -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 432 created 3368 432 WerFault.exe 68 -
Loads dropped DLL 1 IoCs
pid Process 3024 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 432 3368 WerFault.exe 68 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 432 WerFault.exe 432 WerFault.exe 432 WerFault.exe 432 WerFault.exe 432 WerFault.exe 432 WerFault.exe 432 WerFault.exe 432 WerFault.exe 432 WerFault.exe 432 WerFault.exe 432 WerFault.exe 432 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 432 WerFault.exe Token: SeBackupPrivilege 432 WerFault.exe Token: SeDebugPrivilege 432 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3368 wrote to memory of 3024 3368 3e2e7ade6f01cbff7cd4cb3380ba211a4646d3e82d295037eb4bb5f85b4835f0.exe 69 PID 3368 wrote to memory of 3024 3368 3e2e7ade6f01cbff7cd4cb3380ba211a4646d3e82d295037eb4bb5f85b4835f0.exe 69 PID 3368 wrote to memory of 3024 3368 3e2e7ade6f01cbff7cd4cb3380ba211a4646d3e82d295037eb4bb5f85b4835f0.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e2e7ade6f01cbff7cd4cb3380ba211a4646d3e82d295037eb4bb5f85b4835f0.exe"C:\Users\Admin\AppData\Local\Temp\3e2e7ade6f01cbff7cd4cb3380ba211a4646d3e82d295037eb4bb5f85b4835f0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\3E2E7A~1.DLL,s C:\Users\Admin\AppData\Local\Temp\3E2E7A~1.EXE2⤵
- Loads dropped DLL
PID:3024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 5522⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:432
-