Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
25-11-2021 16:40
Static task
static1
General
-
Target
951b94f3bb2bf01cf26d5b55dbc6a7a21864bc552c649a9750fc67076276e2b1.exe
-
Size
1.8MB
-
MD5
a950ef033197897455d5fb2bbedd6f0d
-
SHA1
7b5162ff77988cc82c316d8409dc8084f6713efb
-
SHA256
951b94f3bb2bf01cf26d5b55dbc6a7a21864bc552c649a9750fc67076276e2b1
-
SHA512
199e60ae2a77b4dfdbba3dd45ad670442040812865ee8775fa0402a372bee25dbfc564056e7da9ddf4a8b78571a482b09fc20bb626f3de80cda2b42912a0ea68
Malware Config
Extracted
danabot
142.11.244.223:443
23.106.122.139:443
-
embedded_hash
0FA95F120D6EB149A5D48E36BC76879D
-
type
loader
Signatures
-
Danabot Loader Component 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\951B94~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\951B94~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\951B94~1.DLL DanabotLoader2021 behavioral1/memory/812-125-0x0000000004250000-0x00000000044CA000-memory.dmp DanabotLoader2021 -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 1244 created 1852 1244 WerFault.exe 951b94f3bb2bf01cf26d5b55dbc6a7a21864bc552c649a9750fc67076276e2b1.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 812 rundll32.exe 812 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1244 1852 WerFault.exe 951b94f3bb2bf01cf26d5b55dbc6a7a21864bc552c649a9750fc67076276e2b1.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 1244 WerFault.exe 1244 WerFault.exe 1244 WerFault.exe 1244 WerFault.exe 1244 WerFault.exe 1244 WerFault.exe 1244 WerFault.exe 1244 WerFault.exe 1244 WerFault.exe 1244 WerFault.exe 1244 WerFault.exe 1244 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 1244 WerFault.exe Token: SeBackupPrivilege 1244 WerFault.exe Token: SeDebugPrivilege 1244 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
951b94f3bb2bf01cf26d5b55dbc6a7a21864bc552c649a9750fc67076276e2b1.exedescription pid process target process PID 1852 wrote to memory of 812 1852 951b94f3bb2bf01cf26d5b55dbc6a7a21864bc552c649a9750fc67076276e2b1.exe rundll32.exe PID 1852 wrote to memory of 812 1852 951b94f3bb2bf01cf26d5b55dbc6a7a21864bc552c649a9750fc67076276e2b1.exe rundll32.exe PID 1852 wrote to memory of 812 1852 951b94f3bb2bf01cf26d5b55dbc6a7a21864bc552c649a9750fc67076276e2b1.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\951b94f3bb2bf01cf26d5b55dbc6a7a21864bc552c649a9750fc67076276e2b1.exe"C:\Users\Admin\AppData\Local\Temp\951b94f3bb2bf01cf26d5b55dbc6a7a21864bc552c649a9750fc67076276e2b1.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\951B94~1.DLL,s C:\Users\Admin\AppData\Local\Temp\951B94~1.EXE2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 5602⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\951B94~1.DLLMD5
6a771db3dd8990ef3833551de28a6d7b
SHA15ac5f19c2b59539af0c46d57d05a8d6d34972fe1
SHA25683caf30c1a592789678cf680d79d36c952b826ad202c963d4ddfcb9c7a555e4f
SHA512f2c6de88b7b89b16f30d9997f436d4d4def78fa777e1fd53fcba3ee35efe97ed459611dbdaac4b933df856f1c6b3ebd196fd3c7d3ff6d067b62e93ba76bcc34f
-
\Users\Admin\AppData\Local\Temp\951B94~1.DLLMD5
6a771db3dd8990ef3833551de28a6d7b
SHA15ac5f19c2b59539af0c46d57d05a8d6d34972fe1
SHA25683caf30c1a592789678cf680d79d36c952b826ad202c963d4ddfcb9c7a555e4f
SHA512f2c6de88b7b89b16f30d9997f436d4d4def78fa777e1fd53fcba3ee35efe97ed459611dbdaac4b933df856f1c6b3ebd196fd3c7d3ff6d067b62e93ba76bcc34f
-
\Users\Admin\AppData\Local\Temp\951B94~1.DLLMD5
6a771db3dd8990ef3833551de28a6d7b
SHA15ac5f19c2b59539af0c46d57d05a8d6d34972fe1
SHA25683caf30c1a592789678cf680d79d36c952b826ad202c963d4ddfcb9c7a555e4f
SHA512f2c6de88b7b89b16f30d9997f436d4d4def78fa777e1fd53fcba3ee35efe97ed459611dbdaac4b933df856f1c6b3ebd196fd3c7d3ff6d067b62e93ba76bcc34f
-
memory/812-121-0x0000000000000000-mapping.dmp
-
memory/812-125-0x0000000004250000-0x00000000044CA000-memory.dmpFilesize
2.5MB
-
memory/1852-118-0x0000000003C52000-0x0000000003DE1000-memory.dmpFilesize
1.6MB
-
memory/1852-120-0x0000000000400000-0x0000000001D7F000-memory.dmpFilesize
25.5MB
-
memory/1852-119-0x0000000003DF0000-0x0000000003F96000-memory.dmpFilesize
1.6MB