Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09-01-2022 09:16
Static task
static1
Behavioral task
behavioral1
Sample
0347b84f4e3d0aa6a1009f509539e2b1.exe
Resource
win7-en-20211208
General
-
Target
0347b84f4e3d0aa6a1009f509539e2b1.exe
-
Size
1.1MB
-
MD5
0347b84f4e3d0aa6a1009f509539e2b1
-
SHA1
48186b9449ca1bbce11c8cc03d5b2c790fb8db40
-
SHA256
1027b3f9e451a16896a4b06e851002ab01ca153421b17cbad6b0e73fac85ed4a
-
SHA512
a9a070821792f07feacdfe3a1d43bd7d2ecd1416a068ad10a3990f78cc9b2c57f58e5db9fb7be483d9cd9f23fd815a9162adbdaa0635264525c5aa55cf4ede55
Malware Config
Extracted
danabot
4
192.119.110.4:443
192.236.194.72:443
-
embedded_hash
422236FD601D11EE82825A484D26DD6F
-
type
loader
Signatures
-
Danabot Loader Component 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\0347b84f4e3d0aa6a1009f509539e2b1.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\0347b84f4e3d0aa6a1009f509539e2b1.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\0347b84f4e3d0aa6a1009f509539e2b1.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\0347b84f4e3d0aa6a1009f509539e2b1.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\0347b84f4e3d0aa6a1009f509539e2b1.exe.dll DanabotLoader2021 behavioral1/memory/1356-66-0x0000000000860000-0x00000000009AD000-memory.dmp DanabotLoader2021 -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 1356 rundll32.exe 1356 rundll32.exe 1356 rundll32.exe 1356 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
0347b84f4e3d0aa6a1009f509539e2b1.exedescription pid process target process PID 740 wrote to memory of 1356 740 0347b84f4e3d0aa6a1009f509539e2b1.exe rundll32.exe PID 740 wrote to memory of 1356 740 0347b84f4e3d0aa6a1009f509539e2b1.exe rundll32.exe PID 740 wrote to memory of 1356 740 0347b84f4e3d0aa6a1009f509539e2b1.exe rundll32.exe PID 740 wrote to memory of 1356 740 0347b84f4e3d0aa6a1009f509539e2b1.exe rundll32.exe PID 740 wrote to memory of 1356 740 0347b84f4e3d0aa6a1009f509539e2b1.exe rundll32.exe PID 740 wrote to memory of 1356 740 0347b84f4e3d0aa6a1009f509539e2b1.exe rundll32.exe PID 740 wrote to memory of 1356 740 0347b84f4e3d0aa6a1009f509539e2b1.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0347b84f4e3d0aa6a1009f509539e2b1.exe"C:\Users\Admin\AppData\Local\Temp\0347b84f4e3d0aa6a1009f509539e2b1.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\0347b84f4e3d0aa6a1009f509539e2b1.exe.dll,z C:\Users\Admin\AppData\Local\Temp\0347b84f4e3d0aa6a1009f509539e2b1.exe2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0347b84f4e3d0aa6a1009f509539e2b1.exe.dllMD5
d2c690f176851df4bd749dcaf98c9cab
SHA12710968ed52181c2e608ce47f9c40c288000bfdd
SHA256f2de8846f8e047dd66a2f2362213a06d19ff0ad83cba4ef7a5c39a7a83e0d626
SHA5125869942743542bf7ab00704f8b179dda6880c6e4fd6a5ba921f2dfb0da5743a0140ab91ba45bde4b0d04ff7bf6ce7aacfc78cf29c8359a4e1dccf3405a0954f4
-
\Users\Admin\AppData\Local\Temp\0347b84f4e3d0aa6a1009f509539e2b1.exe.dllMD5
d2c690f176851df4bd749dcaf98c9cab
SHA12710968ed52181c2e608ce47f9c40c288000bfdd
SHA256f2de8846f8e047dd66a2f2362213a06d19ff0ad83cba4ef7a5c39a7a83e0d626
SHA5125869942743542bf7ab00704f8b179dda6880c6e4fd6a5ba921f2dfb0da5743a0140ab91ba45bde4b0d04ff7bf6ce7aacfc78cf29c8359a4e1dccf3405a0954f4
-
\Users\Admin\AppData\Local\Temp\0347b84f4e3d0aa6a1009f509539e2b1.exe.dllMD5
d2c690f176851df4bd749dcaf98c9cab
SHA12710968ed52181c2e608ce47f9c40c288000bfdd
SHA256f2de8846f8e047dd66a2f2362213a06d19ff0ad83cba4ef7a5c39a7a83e0d626
SHA5125869942743542bf7ab00704f8b179dda6880c6e4fd6a5ba921f2dfb0da5743a0140ab91ba45bde4b0d04ff7bf6ce7aacfc78cf29c8359a4e1dccf3405a0954f4
-
\Users\Admin\AppData\Local\Temp\0347b84f4e3d0aa6a1009f509539e2b1.exe.dllMD5
d2c690f176851df4bd749dcaf98c9cab
SHA12710968ed52181c2e608ce47f9c40c288000bfdd
SHA256f2de8846f8e047dd66a2f2362213a06d19ff0ad83cba4ef7a5c39a7a83e0d626
SHA5125869942743542bf7ab00704f8b179dda6880c6e4fd6a5ba921f2dfb0da5743a0140ab91ba45bde4b0d04ff7bf6ce7aacfc78cf29c8359a4e1dccf3405a0954f4
-
\Users\Admin\AppData\Local\Temp\0347b84f4e3d0aa6a1009f509539e2b1.exe.dllMD5
d2c690f176851df4bd749dcaf98c9cab
SHA12710968ed52181c2e608ce47f9c40c288000bfdd
SHA256f2de8846f8e047dd66a2f2362213a06d19ff0ad83cba4ef7a5c39a7a83e0d626
SHA5125869942743542bf7ab00704f8b179dda6880c6e4fd6a5ba921f2dfb0da5743a0140ab91ba45bde4b0d04ff7bf6ce7aacfc78cf29c8359a4e1dccf3405a0954f4
-
memory/740-55-0x00000000763B1000-0x00000000763B3000-memory.dmpFilesize
8KB
-
memory/740-56-0x0000000004590000-0x0000000004672000-memory.dmpFilesize
904KB
-
memory/740-57-0x0000000004680000-0x000000000477A000-memory.dmpFilesize
1000KB
-
memory/740-58-0x0000000000400000-0x0000000002C53000-memory.dmpFilesize
40.3MB
-
memory/1356-59-0x0000000000000000-mapping.dmp
-
memory/1356-66-0x0000000000860000-0x00000000009AD000-memory.dmpFilesize
1.3MB