Analysis
-
max time kernel
134s -
max time network
123s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
12-01-2022 07:12
Static task
static1
General
-
Target
f38ab9b98774509a4d1dbadc3f5c9a5f927979736ff89dd5892b380a9f09738c.exe
-
Size
1.1MB
-
MD5
51913f93259de85f17d3590a8263589d
-
SHA1
c36fb4dade6e0c69e81b8e2f2a69090471c22f7a
-
SHA256
f38ab9b98774509a4d1dbadc3f5c9a5f927979736ff89dd5892b380a9f09738c
-
SHA512
dca6b3579463af33792171d29ecb711c7bef7e83efb38cf43c37b3dd654267847851223caeef5a260a596c5d9a27f14b59ba969ceb6a0678d2515a1b5f601c82
Malware Config
Extracted
danabot
4
209.127.27.22:443
103.175.16.114:443
103.175.16.113:443
-
embedded_hash
422236FD601D11EE82825A484D26DD6F
-
type
loader
Signatures
-
Danabot Loader Component 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\f38ab9b98774509a4d1dbadc3f5c9a5f927979736ff89dd5892b380a9f09738c.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\f38ab9b98774509a4d1dbadc3f5c9a5f927979736ff89dd5892b380a9f09738c.exe.dll DanabotLoader2021 -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4228 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
f38ab9b98774509a4d1dbadc3f5c9a5f927979736ff89dd5892b380a9f09738c.exedescription pid process target process PID 344 wrote to memory of 4228 344 f38ab9b98774509a4d1dbadc3f5c9a5f927979736ff89dd5892b380a9f09738c.exe rundll32.exe PID 344 wrote to memory of 4228 344 f38ab9b98774509a4d1dbadc3f5c9a5f927979736ff89dd5892b380a9f09738c.exe rundll32.exe PID 344 wrote to memory of 4228 344 f38ab9b98774509a4d1dbadc3f5c9a5f927979736ff89dd5892b380a9f09738c.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f38ab9b98774509a4d1dbadc3f5c9a5f927979736ff89dd5892b380a9f09738c.exe"C:\Users\Admin\AppData\Local\Temp\f38ab9b98774509a4d1dbadc3f5c9a5f927979736ff89dd5892b380a9f09738c.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\f38ab9b98774509a4d1dbadc3f5c9a5f927979736ff89dd5892b380a9f09738c.exe.dll,z C:\Users\Admin\AppData\Local\Temp\f38ab9b98774509a4d1dbadc3f5c9a5f927979736ff89dd5892b380a9f09738c.exe2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\f38ab9b98774509a4d1dbadc3f5c9a5f927979736ff89dd5892b380a9f09738c.exe.dllMD5
0afa9091328834665946d45b4f9b61b8
SHA1c5175a0e0522bfe9889904ef1d765d04d272a64e
SHA25608415b93a560bdf8a28bd646de06fd244127b34e9c91c14b54f62d33e68a70b7
SHA512b861bb27bea714e3a06181b3765ab92bc76308c2f7761c05243b01feecad045a6036339b43ba0f62c3af45ed0429e810fbd8e27bb3d6333cfa7725f67cf3c6b2
-
\Users\Admin\AppData\Local\Temp\f38ab9b98774509a4d1dbadc3f5c9a5f927979736ff89dd5892b380a9f09738c.exe.dllMD5
0afa9091328834665946d45b4f9b61b8
SHA1c5175a0e0522bfe9889904ef1d765d04d272a64e
SHA25608415b93a560bdf8a28bd646de06fd244127b34e9c91c14b54f62d33e68a70b7
SHA512b861bb27bea714e3a06181b3765ab92bc76308c2f7761c05243b01feecad045a6036339b43ba0f62c3af45ed0429e810fbd8e27bb3d6333cfa7725f67cf3c6b2
-
memory/344-115-0x000000000092F000-0x0000000000A14000-memory.dmpFilesize
916KB
-
memory/344-117-0x0000000000400000-0x000000000063F000-memory.dmpFilesize
2.2MB
-
memory/344-116-0x0000000000A20000-0x0000000000B1C000-memory.dmpFilesize
1008KB
-
memory/4228-118-0x0000000000000000-mapping.dmp