Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
10-01-2022 07:58
Static task
static1
Behavioral task
behavioral1
Sample
3b2e2b369895d2fd94a07ef3c66978c5.exe
Resource
win7-en-20211208
General
-
Target
3b2e2b369895d2fd94a07ef3c66978c5.exe
-
Size
1.1MB
-
MD5
3b2e2b369895d2fd94a07ef3c66978c5
-
SHA1
91a09480fad625eae27f4df3e6de3e7e2cfec949
-
SHA256
220952caf42db06de1b1b80c1f95884419ebd90a667a07fa8da6792db1404316
-
SHA512
1be44c64c59b7c7c1236e30aa88c989263f763511615022c0f4e5ff8e898a8e6a9a19dcd5ac5311af3b9438983b09ee301496ba78df774de154b410209104734
Malware Config
Extracted
danabot
4
192.119.110.4:443
103.175.16.113:443
-
embedded_hash
422236FD601D11EE82825A484D26DD6F
-
type
loader
Signatures
-
Danabot Loader Component 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3b2e2b369895d2fd94a07ef3c66978c5.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\3b2e2b369895d2fd94a07ef3c66978c5.exe.dll DanabotLoader2021 -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2864 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
3b2e2b369895d2fd94a07ef3c66978c5.exedescription pid process target process PID 2704 wrote to memory of 2864 2704 3b2e2b369895d2fd94a07ef3c66978c5.exe rundll32.exe PID 2704 wrote to memory of 2864 2704 3b2e2b369895d2fd94a07ef3c66978c5.exe rundll32.exe PID 2704 wrote to memory of 2864 2704 3b2e2b369895d2fd94a07ef3c66978c5.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b2e2b369895d2fd94a07ef3c66978c5.exe"C:\Users\Admin\AppData\Local\Temp\3b2e2b369895d2fd94a07ef3c66978c5.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\3b2e2b369895d2fd94a07ef3c66978c5.exe.dll,z C:\Users\Admin\AppData\Local\Temp\3b2e2b369895d2fd94a07ef3c66978c5.exe2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3b2e2b369895d2fd94a07ef3c66978c5.exe.dllMD5
67be156a9e8aa3b3f85e8fcf3e5d610c
SHA19f1a6d241566e8023d52013f93a56928bd57658e
SHA25664afd7ccbe2db294e4ea84e915ec2b9f1774b4034bfa541253f689588b328180
SHA5120774f9cc7dbc72483a1e5ebc4fb90fd6b819cf4d633fe35fa07c95867a381a26b7dc3dcf493552e0d53aea7d2eeb7e059b98699ac96f62cc28b2b618fbd4bee3
-
\Users\Admin\AppData\Local\Temp\3b2e2b369895d2fd94a07ef3c66978c5.exe.dllMD5
67be156a9e8aa3b3f85e8fcf3e5d610c
SHA19f1a6d241566e8023d52013f93a56928bd57658e
SHA25664afd7ccbe2db294e4ea84e915ec2b9f1774b4034bfa541253f689588b328180
SHA5120774f9cc7dbc72483a1e5ebc4fb90fd6b819cf4d633fe35fa07c95867a381a26b7dc3dcf493552e0d53aea7d2eeb7e059b98699ac96f62cc28b2b618fbd4bee3
-
memory/2704-115-0x0000000004AE0000-0x0000000004BC3000-memory.dmpFilesize
908KB
-
memory/2704-116-0x0000000004BF0000-0x0000000004CEA000-memory.dmpFilesize
1000KB
-
memory/2704-117-0x0000000000400000-0x0000000002C59000-memory.dmpFilesize
40.3MB
-
memory/2864-118-0x0000000000000000-mapping.dmp