Analysis
-
max time kernel
134s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
12-01-2022 22:00
Static task
static1
General
-
Target
e60d0b4cde4d9d94fd6b0c82ab32ff7e98b9b20a46b4fed0def44b19ae3a3943.exe
-
Size
1.1MB
-
MD5
96dfa3c9a3fd17abdeb8a4a16972b8c7
-
SHA1
a2881094c447e3a9523cdc3b8e44128050130b75
-
SHA256
e60d0b4cde4d9d94fd6b0c82ab32ff7e98b9b20a46b4fed0def44b19ae3a3943
-
SHA512
85c54d9b815d797b57f193cbfa2184522ae9fabcf333f93e9b469b74e86bc42aab6f8f0d644fb10b5dc116de3c2de317e19686cc0d931b7edbd03648ec4ec4d3
Malware Config
Extracted
danabot
4
209.127.27.22:443
103.175.16.114:443
103.175.16.113:443
-
embedded_hash
422236FD601D11EE82825A484D26DD6F
-
type
loader
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3412 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
e60d0b4cde4d9d94fd6b0c82ab32ff7e98b9b20a46b4fed0def44b19ae3a3943.exedescription pid process target process PID 2564 wrote to memory of 3412 2564 e60d0b4cde4d9d94fd6b0c82ab32ff7e98b9b20a46b4fed0def44b19ae3a3943.exe rundll32.exe PID 2564 wrote to memory of 3412 2564 e60d0b4cde4d9d94fd6b0c82ab32ff7e98b9b20a46b4fed0def44b19ae3a3943.exe rundll32.exe PID 2564 wrote to memory of 3412 2564 e60d0b4cde4d9d94fd6b0c82ab32ff7e98b9b20a46b4fed0def44b19ae3a3943.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e60d0b4cde4d9d94fd6b0c82ab32ff7e98b9b20a46b4fed0def44b19ae3a3943.exe"C:\Users\Admin\AppData\Local\Temp\e60d0b4cde4d9d94fd6b0c82ab32ff7e98b9b20a46b4fed0def44b19ae3a3943.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\e60d0b4cde4d9d94fd6b0c82ab32ff7e98b9b20a46b4fed0def44b19ae3a3943.exe.dll,z C:\Users\Admin\AppData\Local\Temp\e60d0b4cde4d9d94fd6b0c82ab32ff7e98b9b20a46b4fed0def44b19ae3a3943.exe2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e60d0b4cde4d9d94fd6b0c82ab32ff7e98b9b20a46b4fed0def44b19ae3a3943.exe.dllMD5
df3464d790feb67051ff0f5560533c21
SHA1c5c536664e307d5bd678b3008ba84196c6440e96
SHA256bdff83014eac859e146424a730d8279bf96a05f74b67ede5b8548c7e791ba65c
SHA51259079bafca39f389cc16960f2aa236c75d9a5e197592972f5efcbd458de28d9a852b6a50b2f76f0df77bc4fca9143857338fbcc5571bf65fb4ded25d836ed26d
-
\Users\Admin\AppData\Local\Temp\e60d0b4cde4d9d94fd6b0c82ab32ff7e98b9b20a46b4fed0def44b19ae3a3943.exe.dllMD5
df3464d790feb67051ff0f5560533c21
SHA1c5c536664e307d5bd678b3008ba84196c6440e96
SHA256bdff83014eac859e146424a730d8279bf96a05f74b67ede5b8548c7e791ba65c
SHA51259079bafca39f389cc16960f2aa236c75d9a5e197592972f5efcbd458de28d9a852b6a50b2f76f0df77bc4fca9143857338fbcc5571bf65fb4ded25d836ed26d
-
memory/2564-115-0x000000000090C000-0x00000000009EF000-memory.dmpFilesize
908KB
-
memory/2564-117-0x0000000000400000-0x000000000063C000-memory.dmpFilesize
2.2MB
-
memory/2564-116-0x0000000000AB0000-0x0000000000BAB000-memory.dmpFilesize
1004KB
-
memory/3412-118-0x0000000000000000-mapping.dmp