Analysis
-
max time kernel
136s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
06-01-2022 12:30
Static task
static1
General
-
Target
cc4c11f8e7599cef56fe6ca5b62121dd9b361d7cd5efb90c0144314e6d98a41a.exe
-
Size
1.1MB
-
MD5
2e49f97a5a97ba0448bc259241398bef
-
SHA1
60327dc3e621f25117bc2562f2eb76cc110fca2b
-
SHA256
cc4c11f8e7599cef56fe6ca5b62121dd9b361d7cd5efb90c0144314e6d98a41a
-
SHA512
440fe729652ef9f8f0e0af31f468dba28247d47e056feef7932498f93bf56046f0d1c9540b9602965ffe08fdb1944b0bb5da235ca3d9ca270b770c3f2b667c9c
Malware Config
Extracted
danabot
4
142.11.244.223:443
192.236.194.72:443
192.119.110.4:443
-
embedded_hash
8357B947FCA843DB2D85EC29EDCDEF3C
-
type
loader
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 3920 rundll32.exe 3920 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cc4c11f8e7599cef56fe6ca5b62121dd9b361d7cd5efb90c0144314e6d98a41a.exedescription pid process target process PID 1108 wrote to memory of 3920 1108 cc4c11f8e7599cef56fe6ca5b62121dd9b361d7cd5efb90c0144314e6d98a41a.exe rundll32.exe PID 1108 wrote to memory of 3920 1108 cc4c11f8e7599cef56fe6ca5b62121dd9b361d7cd5efb90c0144314e6d98a41a.exe rundll32.exe PID 1108 wrote to memory of 3920 1108 cc4c11f8e7599cef56fe6ca5b62121dd9b361d7cd5efb90c0144314e6d98a41a.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc4c11f8e7599cef56fe6ca5b62121dd9b361d7cd5efb90c0144314e6d98a41a.exe"C:\Users\Admin\AppData\Local\Temp\cc4c11f8e7599cef56fe6ca5b62121dd9b361d7cd5efb90c0144314e6d98a41a.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\cc4c11f8e7599cef56fe6ca5b62121dd9b361d7cd5efb90c0144314e6d98a41a.exe.dll,z C:\Users\Admin\AppData\Local\Temp\cc4c11f8e7599cef56fe6ca5b62121dd9b361d7cd5efb90c0144314e6d98a41a.exe2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\cc4c11f8e7599cef56fe6ca5b62121dd9b361d7cd5efb90c0144314e6d98a41a.exe.dllMD5
96cc061a6811f11a7ab28e6dc4256841
SHA19a1ba66e10b3ed107f14bd39635c223c7d18d4c9
SHA256fcaa5cfe161ed68e449445744284b97db0addbfe661de967f7cc92917ce803a3
SHA51267d303a0b261a5a6226ea865116b8d642db398386b424403ab81ceb77d4c0523d2253958e44f5d9f925438019135e6693a23c60fc86f891fd88ec74fe14082be
-
\Users\Admin\AppData\Local\Temp\cc4c11f8e7599cef56fe6ca5b62121dd9b361d7cd5efb90c0144314e6d98a41a.exe.dllMD5
96cc061a6811f11a7ab28e6dc4256841
SHA19a1ba66e10b3ed107f14bd39635c223c7d18d4c9
SHA256fcaa5cfe161ed68e449445744284b97db0addbfe661de967f7cc92917ce803a3
SHA51267d303a0b261a5a6226ea865116b8d642db398386b424403ab81ceb77d4c0523d2253958e44f5d9f925438019135e6693a23c60fc86f891fd88ec74fe14082be
-
\Users\Admin\AppData\Local\Temp\cc4c11f8e7599cef56fe6ca5b62121dd9b361d7cd5efb90c0144314e6d98a41a.exe.dllMD5
96cc061a6811f11a7ab28e6dc4256841
SHA19a1ba66e10b3ed107f14bd39635c223c7d18d4c9
SHA256fcaa5cfe161ed68e449445744284b97db0addbfe661de967f7cc92917ce803a3
SHA51267d303a0b261a5a6226ea865116b8d642db398386b424403ab81ceb77d4c0523d2253958e44f5d9f925438019135e6693a23c60fc86f891fd88ec74fe14082be
-
memory/1108-115-0x0000000000943000-0x0000000000A26000-memory.dmpFilesize
908KB
-
memory/1108-117-0x0000000000400000-0x0000000000535000-memory.dmpFilesize
1.2MB
-
memory/1108-116-0x0000000000A30000-0x0000000000B2A000-memory.dmpFilesize
1000KB
-
memory/3920-118-0x0000000000000000-mapping.dmp
-
memory/3920-122-0x0000000004470000-0x00000000045BE000-memory.dmpFilesize
1.3MB