Analysis
-
max time kernel
134s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
07-01-2022 16:04
Static task
static1
Behavioral task
behavioral1
Sample
7d73bbc0c762f65500d81187cabb075d.exe
Resource
win7-en-20211208
General
-
Target
7d73bbc0c762f65500d81187cabb075d.exe
-
Size
1.1MB
-
MD5
7d73bbc0c762f65500d81187cabb075d
-
SHA1
e8a1f531e3ad3a1ee0fecccf34d0f23b6f452a53
-
SHA256
9a8418ab244c91ab1447181ca5544cc1202c1e5aee5549e0e9908ac5080ed3a6
-
SHA512
83455a8f8dbcfb90bcd7a4538dbc89d799710489e21d17cda7a2cdebbcc6679ae2e027835aa4c20de63c75451af37c3ebb614d6217dc81fe10db0055dfb9ec57
Malware Config
Extracted
danabot
4
142.11.244.223:443
192.236.194.72:443
192.119.110.4:443
-
embedded_hash
8357B947FCA843DB2D85EC29EDCDEF3C
-
type
loader
Signatures
-
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 760 rundll32.exe 760 rundll32.exe 760 rundll32.exe 760 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
7d73bbc0c762f65500d81187cabb075d.exedescription pid process target process PID 1884 wrote to memory of 760 1884 7d73bbc0c762f65500d81187cabb075d.exe rundll32.exe PID 1884 wrote to memory of 760 1884 7d73bbc0c762f65500d81187cabb075d.exe rundll32.exe PID 1884 wrote to memory of 760 1884 7d73bbc0c762f65500d81187cabb075d.exe rundll32.exe PID 1884 wrote to memory of 760 1884 7d73bbc0c762f65500d81187cabb075d.exe rundll32.exe PID 1884 wrote to memory of 760 1884 7d73bbc0c762f65500d81187cabb075d.exe rundll32.exe PID 1884 wrote to memory of 760 1884 7d73bbc0c762f65500d81187cabb075d.exe rundll32.exe PID 1884 wrote to memory of 760 1884 7d73bbc0c762f65500d81187cabb075d.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d73bbc0c762f65500d81187cabb075d.exe"C:\Users\Admin\AppData\Local\Temp\7d73bbc0c762f65500d81187cabb075d.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\7d73bbc0c762f65500d81187cabb075d.exe.dll,z C:\Users\Admin\AppData\Local\Temp\7d73bbc0c762f65500d81187cabb075d.exe2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7d73bbc0c762f65500d81187cabb075d.exe.dllMD5
d9df2c18d63e6171decc3e3bac29a1aa
SHA176d08651496ca262173fd7592173d01d096d0620
SHA25645b88ddbd981ab5de6a58efd0e4ac0ab1cc05da2e4ffa1aac9caf2e875c5f705
SHA51263e889e98566f8dd024860ea5a5e6629235d5eb9b94955b2978a819dd949a23d4c8ba66bdbb048bf3c5b7d8e0ff478318850b8f1736da3aca72afc8208742801
-
\Users\Admin\AppData\Local\Temp\7d73bbc0c762f65500d81187cabb075d.exe.dllMD5
d9df2c18d63e6171decc3e3bac29a1aa
SHA176d08651496ca262173fd7592173d01d096d0620
SHA25645b88ddbd981ab5de6a58efd0e4ac0ab1cc05da2e4ffa1aac9caf2e875c5f705
SHA51263e889e98566f8dd024860ea5a5e6629235d5eb9b94955b2978a819dd949a23d4c8ba66bdbb048bf3c5b7d8e0ff478318850b8f1736da3aca72afc8208742801
-
\Users\Admin\AppData\Local\Temp\7d73bbc0c762f65500d81187cabb075d.exe.dllMD5
d9df2c18d63e6171decc3e3bac29a1aa
SHA176d08651496ca262173fd7592173d01d096d0620
SHA25645b88ddbd981ab5de6a58efd0e4ac0ab1cc05da2e4ffa1aac9caf2e875c5f705
SHA51263e889e98566f8dd024860ea5a5e6629235d5eb9b94955b2978a819dd949a23d4c8ba66bdbb048bf3c5b7d8e0ff478318850b8f1736da3aca72afc8208742801
-
\Users\Admin\AppData\Local\Temp\7d73bbc0c762f65500d81187cabb075d.exe.dllMD5
d9df2c18d63e6171decc3e3bac29a1aa
SHA176d08651496ca262173fd7592173d01d096d0620
SHA25645b88ddbd981ab5de6a58efd0e4ac0ab1cc05da2e4ffa1aac9caf2e875c5f705
SHA51263e889e98566f8dd024860ea5a5e6629235d5eb9b94955b2978a819dd949a23d4c8ba66bdbb048bf3c5b7d8e0ff478318850b8f1736da3aca72afc8208742801
-
\Users\Admin\AppData\Local\Temp\7d73bbc0c762f65500d81187cabb075d.exe.dllMD5
d9df2c18d63e6171decc3e3bac29a1aa
SHA176d08651496ca262173fd7592173d01d096d0620
SHA25645b88ddbd981ab5de6a58efd0e4ac0ab1cc05da2e4ffa1aac9caf2e875c5f705
SHA51263e889e98566f8dd024860ea5a5e6629235d5eb9b94955b2978a819dd949a23d4c8ba66bdbb048bf3c5b7d8e0ff478318850b8f1736da3aca72afc8208742801
-
memory/760-57-0x0000000000000000-mapping.dmp
-
memory/760-64-0x0000000001F00000-0x000000000204E000-memory.dmpFilesize
1.3MB
-
memory/1884-53-0x0000000000540000-0x0000000000623000-memory.dmpFilesize
908KB
-
memory/1884-54-0x0000000075AB1000-0x0000000075AB3000-memory.dmpFilesize
8KB
-
memory/1884-56-0x0000000000400000-0x0000000000535000-memory.dmpFilesize
1.2MB
-
memory/1884-55-0x0000000000700000-0x00000000007FA000-memory.dmpFilesize
1000KB