Analysis
-
max time kernel
123s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
25-11-2021 16:11
Static task
static1
General
-
Target
6c4eb7846f442cc3f3db48fe0d016e5adc7c6639434eb5d83f06583eb43257be.dll
-
Size
1.9MB
-
MD5
61de01016846d49f1eaf0635dada0148
-
SHA1
d71af7c334554306f5670d654916f426773f1f7d
-
SHA256
6c4eb7846f442cc3f3db48fe0d016e5adc7c6639434eb5d83f06583eb43257be
-
SHA512
09eeda67f04e4fbb62fa9b7397c747e1024c8cddcb918e6fea55a20e97b3d4e6e515983546d0d6895a2fabe1d8a98edcb98248bdde2ac09269ce2f8115c52960
Malware Config
Extracted
Family
danabot
C2
185.117.90.36:443
193.42.36.59:443
193.56.146.53:443
185.106.123.228:443
Attributes
-
embedded_hash
07284E2A3AB3C2E1FFFBD425849BE150
-
type
loader
rsa_pubkey.plain
rsa_privkey.plain
Signatures
-
Danabot Loader Component 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2700-121-0x0000000000400000-0x00000000005F4000-memory.dmp DanabotLoader2021 behavioral1/memory/2700-120-0x0000000000400000-0x0000000000560000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 22 2700 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2668 wrote to memory of 2700 2668 rundll32.exe rundll32.exe PID 2668 wrote to memory of 2700 2668 rundll32.exe rundll32.exe PID 2668 wrote to memory of 2700 2668 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6c4eb7846f442cc3f3db48fe0d016e5adc7c6639434eb5d83f06583eb43257be.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6c4eb7846f442cc3f3db48fe0d016e5adc7c6639434eb5d83f06583eb43257be.dll,#12⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2700-118-0x0000000000000000-mapping.dmp
-
memory/2700-119-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB
-
memory/2700-121-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB
-
memory/2700-120-0x0000000000400000-0x0000000000560000-memory.dmpFilesize
1.4MB
-
memory/2700-123-0x0000000002DA0000-0x0000000002EEA000-memory.dmpFilesize
1.3MB