Analysis
-
max time kernel
136s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09-01-2022 09:14
Static task
static1
Behavioral task
behavioral1
Sample
f601ad405d65674d3fdd6d9625770487.exe
Resource
win7-en-20211208
General
-
Target
f601ad405d65674d3fdd6d9625770487.exe
-
Size
1.1MB
-
MD5
f601ad405d65674d3fdd6d9625770487
-
SHA1
2d5a12ef12b560d3bb634fa37d78951169113949
-
SHA256
2a009cecbb0b5f61ac6956e12a8ffd880a5c6c5fcce207d48a39dec829daff6d
-
SHA512
1347e26b67ed12d3173196aaca8e9fcad5bb8f6ed17e0482c5b5e33ddbecb19b954d46fcea4ff9e07e7d116b2c3ba351a1ce3aae294e4ce9e176797115a8171f
Malware Config
Extracted
danabot
4
192.119.110.4:443
103.175.16.113:443
-
embedded_hash
422236FD601D11EE82825A484D26DD6F
-
type
loader
Signatures
-
Danabot Loader Component 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\f601ad405d65674d3fdd6d9625770487.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\f601ad405d65674d3fdd6d9625770487.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\f601ad405d65674d3fdd6d9625770487.exe.dll DanabotLoader2021 behavioral2/memory/2432-122-0x0000000000CA0000-0x0000000000DF1000-memory.dmp DanabotLoader2021 -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 2432 rundll32.exe 2432 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
f601ad405d65674d3fdd6d9625770487.exedescription pid process target process PID 492 wrote to memory of 2432 492 f601ad405d65674d3fdd6d9625770487.exe rundll32.exe PID 492 wrote to memory of 2432 492 f601ad405d65674d3fdd6d9625770487.exe rundll32.exe PID 492 wrote to memory of 2432 492 f601ad405d65674d3fdd6d9625770487.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f601ad405d65674d3fdd6d9625770487.exe"C:\Users\Admin\AppData\Local\Temp\f601ad405d65674d3fdd6d9625770487.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\f601ad405d65674d3fdd6d9625770487.exe.dll,z C:\Users\Admin\AppData\Local\Temp\f601ad405d65674d3fdd6d9625770487.exe2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\f601ad405d65674d3fdd6d9625770487.exe.dllMD5
90d6511b232dfa8fcda6d7951cc5a3b0
SHA11f4434aeb484ec728696d99ee137e354047105ed
SHA256bc9e2120d785287e68db559e26c73f80f0d555961450a33cf2617689f397658b
SHA51274961586bd61da070a92cb852ef33b3ffdff46b8282a385dc1581c66d098e1a9aae99adf8f24e0f018b68646973932edb8f68449bc9ceb1e137c82591775436e
-
\Users\Admin\AppData\Local\Temp\f601ad405d65674d3fdd6d9625770487.exe.dllMD5
90d6511b232dfa8fcda6d7951cc5a3b0
SHA11f4434aeb484ec728696d99ee137e354047105ed
SHA256bc9e2120d785287e68db559e26c73f80f0d555961450a33cf2617689f397658b
SHA51274961586bd61da070a92cb852ef33b3ffdff46b8282a385dc1581c66d098e1a9aae99adf8f24e0f018b68646973932edb8f68449bc9ceb1e137c82591775436e
-
\Users\Admin\AppData\Local\Temp\f601ad405d65674d3fdd6d9625770487.exe.dllMD5
90d6511b232dfa8fcda6d7951cc5a3b0
SHA11f4434aeb484ec728696d99ee137e354047105ed
SHA256bc9e2120d785287e68db559e26c73f80f0d555961450a33cf2617689f397658b
SHA51274961586bd61da070a92cb852ef33b3ffdff46b8282a385dc1581c66d098e1a9aae99adf8f24e0f018b68646973932edb8f68449bc9ceb1e137c82591775436e
-
memory/492-115-0x0000000004B90000-0x0000000004C74000-memory.dmpFilesize
912KB
-
memory/492-116-0x0000000004C80000-0x0000000004D7C000-memory.dmpFilesize
1008KB
-
memory/492-117-0x0000000000400000-0x0000000002C54000-memory.dmpFilesize
40.3MB
-
memory/2432-118-0x0000000000000000-mapping.dmp
-
memory/2432-122-0x0000000000CA0000-0x0000000000DF1000-memory.dmpFilesize
1.3MB