Analysis
-
max time kernel
137s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
02-01-2022 01:55
Static task
static1
Behavioral task
behavioral1
Sample
8e33169905bd13e9036657eb3146d2ec.exe
Resource
win7-en-20211208
General
-
Target
8e33169905bd13e9036657eb3146d2ec.exe
-
Size
1.8MB
-
MD5
8e33169905bd13e9036657eb3146d2ec
-
SHA1
e4626a48869d18ad4ad4a20edd7a60fa961dc0a1
-
SHA256
8d72a6f7a3815a3c786aa596cb7b2ba0a5253228343c154e9a32e9ab690cba33
-
SHA512
308cad35cdf485f90ff20fb8f4d831cad48328351e30aa6e274ddcb2ceabeb5dc6432fa44d1f8dd77709d9bd3e93edb70c69f9f12fefcb80fe82ad3a080e53b7
Malware Config
Extracted
danabot
4
142.11.244.223:443
192.236.194.72:443
-
embedded_hash
0FA95F120D6EB149A5D48E36BC76879D
-
type
loader
Signatures
-
Danabot Loader Component 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\8E3316~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\8E3316~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\8E3316~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\8E3316~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\8E3316~1.DLL DanabotLoader2021 behavioral1/memory/560-66-0x0000000001C70000-0x0000000001EEC000-memory.dmp DanabotLoader2021 -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 560 rundll32.exe 560 rundll32.exe 560 rundll32.exe 560 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1096 1580 WerFault.exe 8e33169905bd13e9036657eb3146d2ec.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 1096 WerFault.exe 1096 WerFault.exe 1096 WerFault.exe 1096 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1096 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
8e33169905bd13e9036657eb3146d2ec.exedescription pid process target process PID 1580 wrote to memory of 560 1580 8e33169905bd13e9036657eb3146d2ec.exe rundll32.exe PID 1580 wrote to memory of 560 1580 8e33169905bd13e9036657eb3146d2ec.exe rundll32.exe PID 1580 wrote to memory of 560 1580 8e33169905bd13e9036657eb3146d2ec.exe rundll32.exe PID 1580 wrote to memory of 560 1580 8e33169905bd13e9036657eb3146d2ec.exe rundll32.exe PID 1580 wrote to memory of 560 1580 8e33169905bd13e9036657eb3146d2ec.exe rundll32.exe PID 1580 wrote to memory of 560 1580 8e33169905bd13e9036657eb3146d2ec.exe rundll32.exe PID 1580 wrote to memory of 560 1580 8e33169905bd13e9036657eb3146d2ec.exe rundll32.exe PID 1580 wrote to memory of 1096 1580 8e33169905bd13e9036657eb3146d2ec.exe WerFault.exe PID 1580 wrote to memory of 1096 1580 8e33169905bd13e9036657eb3146d2ec.exe WerFault.exe PID 1580 wrote to memory of 1096 1580 8e33169905bd13e9036657eb3146d2ec.exe WerFault.exe PID 1580 wrote to memory of 1096 1580 8e33169905bd13e9036657eb3146d2ec.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e33169905bd13e9036657eb3146d2ec.exe"C:\Users\Admin\AppData\Local\Temp\8e33169905bd13e9036657eb3146d2ec.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\8E3316~1.DLL,s C:\Users\Admin\AppData\Local\Temp\8E3316~1.EXE2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 2082⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8E3316~1.DLLMD5
eb2f0fa93bc931458d67c89d4fcfce25
SHA1680d8d9261c2fa5a130ab4d42d71df06fccd04bf
SHA256612ddc7dbe69aa8222fd4f80e5a77be6ef836861af91752b7056e5e6b59fb61a
SHA5123c6adead7456f90b84a7e7c5aa615589491b4c2808a1402b2f527ba769412f93bae73e3ccadaf8b4df96bcd7b1100a0972705b5612da4313edc5afd4ae184be8
-
\Users\Admin\AppData\Local\Temp\8E3316~1.DLLMD5
eb2f0fa93bc931458d67c89d4fcfce25
SHA1680d8d9261c2fa5a130ab4d42d71df06fccd04bf
SHA256612ddc7dbe69aa8222fd4f80e5a77be6ef836861af91752b7056e5e6b59fb61a
SHA5123c6adead7456f90b84a7e7c5aa615589491b4c2808a1402b2f527ba769412f93bae73e3ccadaf8b4df96bcd7b1100a0972705b5612da4313edc5afd4ae184be8
-
\Users\Admin\AppData\Local\Temp\8E3316~1.DLLMD5
eb2f0fa93bc931458d67c89d4fcfce25
SHA1680d8d9261c2fa5a130ab4d42d71df06fccd04bf
SHA256612ddc7dbe69aa8222fd4f80e5a77be6ef836861af91752b7056e5e6b59fb61a
SHA5123c6adead7456f90b84a7e7c5aa615589491b4c2808a1402b2f527ba769412f93bae73e3ccadaf8b4df96bcd7b1100a0972705b5612da4313edc5afd4ae184be8
-
\Users\Admin\AppData\Local\Temp\8E3316~1.DLLMD5
eb2f0fa93bc931458d67c89d4fcfce25
SHA1680d8d9261c2fa5a130ab4d42d71df06fccd04bf
SHA256612ddc7dbe69aa8222fd4f80e5a77be6ef836861af91752b7056e5e6b59fb61a
SHA5123c6adead7456f90b84a7e7c5aa615589491b4c2808a1402b2f527ba769412f93bae73e3ccadaf8b4df96bcd7b1100a0972705b5612da4313edc5afd4ae184be8
-
\Users\Admin\AppData\Local\Temp\8E3316~1.DLLMD5
eb2f0fa93bc931458d67c89d4fcfce25
SHA1680d8d9261c2fa5a130ab4d42d71df06fccd04bf
SHA256612ddc7dbe69aa8222fd4f80e5a77be6ef836861af91752b7056e5e6b59fb61a
SHA5123c6adead7456f90b84a7e7c5aa615589491b4c2808a1402b2f527ba769412f93bae73e3ccadaf8b4df96bcd7b1100a0972705b5612da4313edc5afd4ae184be8
-
memory/560-59-0x0000000000000000-mapping.dmp
-
memory/560-66-0x0000000001C70000-0x0000000001EEC000-memory.dmpFilesize
2.5MB
-
memory/1096-67-0x0000000000000000-mapping.dmp
-
memory/1096-69-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/1580-58-0x0000000000400000-0x00000000005EA000-memory.dmpFilesize
1.9MB
-
memory/1580-57-0x0000000074F11000-0x0000000074F13000-memory.dmpFilesize
8KB
-
memory/1580-56-0x00000000009C0000-0x0000000000B65000-memory.dmpFilesize
1.6MB
-
memory/1580-55-0x0000000000830000-0x00000000009BF000-memory.dmpFilesize
1.6MB