Analysis
-
max time kernel
135s -
max time network
123s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
08-01-2022 16:09
Static task
static1
Behavioral task
behavioral1
Sample
f8151b5d4c4e62166a8c2e914f54cbb7.exe
Resource
win7-en-20211208
General
-
Target
f8151b5d4c4e62166a8c2e914f54cbb7.exe
-
Size
1.1MB
-
MD5
f8151b5d4c4e62166a8c2e914f54cbb7
-
SHA1
ee9da83f51b904db29d14847a013c4cff7ea6711
-
SHA256
7d3b2e91c3cfb16df02f63b973c69a2047b8031295a49e4fffa0fad3dba975f0
-
SHA512
0e141cee03549a768d284381bd8751b3b3b18805bffa1ada7e4a7c44c3d50fae190d6a4d82ddaee76c82f2a853190549a2d6d1f3a3fdfef425cff3499933b084
Malware Config
Extracted
danabot
4
192.119.110.4:443
192.236.194.72:443
-
embedded_hash
422236FD601D11EE82825A484D26DD6F
-
type
loader
Signatures
-
Danabot Loader Component 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\f8151b5d4c4e62166a8c2e914f54cbb7.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\f8151b5d4c4e62166a8c2e914f54cbb7.exe.dll DanabotLoader2021 -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2252 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
f8151b5d4c4e62166a8c2e914f54cbb7.exedescription pid process target process PID 3776 wrote to memory of 2252 3776 f8151b5d4c4e62166a8c2e914f54cbb7.exe rundll32.exe PID 3776 wrote to memory of 2252 3776 f8151b5d4c4e62166a8c2e914f54cbb7.exe rundll32.exe PID 3776 wrote to memory of 2252 3776 f8151b5d4c4e62166a8c2e914f54cbb7.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8151b5d4c4e62166a8c2e914f54cbb7.exe"C:\Users\Admin\AppData\Local\Temp\f8151b5d4c4e62166a8c2e914f54cbb7.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\f8151b5d4c4e62166a8c2e914f54cbb7.exe.dll,z C:\Users\Admin\AppData\Local\Temp\f8151b5d4c4e62166a8c2e914f54cbb7.exe2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\f8151b5d4c4e62166a8c2e914f54cbb7.exe.dllMD5
652b69278d2c1ab7d60566d4f69cf027
SHA1d75eddfa173bc189caf0e8bbf8a5931757d8f775
SHA2561d9f77cff0851c4d8009f673032e7ec109aec9a4c9224ee1ee9d07575c18d173
SHA512f0eff57e0442654008bd2e5779b1cfcf24a0ff43870338a538b7cb8370cbdc756728b6a9de66849617709b35c8396247a37f08a50963bdc07b353b525879a503
-
\Users\Admin\AppData\Local\Temp\f8151b5d4c4e62166a8c2e914f54cbb7.exe.dllMD5
652b69278d2c1ab7d60566d4f69cf027
SHA1d75eddfa173bc189caf0e8bbf8a5931757d8f775
SHA2561d9f77cff0851c4d8009f673032e7ec109aec9a4c9224ee1ee9d07575c18d173
SHA512f0eff57e0442654008bd2e5779b1cfcf24a0ff43870338a538b7cb8370cbdc756728b6a9de66849617709b35c8396247a37f08a50963bdc07b353b525879a503
-
memory/2252-118-0x0000000000000000-mapping.dmp
-
memory/3776-116-0x0000000004B00000-0x0000000004BFA000-memory.dmpFilesize
1000KB
-
memory/3776-115-0x0000000004A10000-0x0000000004AF2000-memory.dmpFilesize
904KB
-
memory/3776-117-0x0000000000400000-0x0000000002C53000-memory.dmpFilesize
40.3MB