Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
13-01-2022 15:32
Static task
static1
Behavioral task
behavioral1
Sample
d57c5f0618d68902c6b7e8fa7b888641.exe
Resource
win7-en-20211208
General
-
Target
d57c5f0618d68902c6b7e8fa7b888641.exe
-
Size
1.1MB
-
MD5
d57c5f0618d68902c6b7e8fa7b888641
-
SHA1
06693ad79544d8f5172d48a938ba949499ba6c60
-
SHA256
eb5966c02b728346e88e69ac3f63da4ec863a3e0d0754937c0f56799d3718d3d
-
SHA512
f48c04fad244d0c6d8a6a6d4ca5ae196184f43c18ac981a59101269bf2d8eb0834ad5b0138897c002bf507b0b8e3870afcc92d659035c40f7c246f524a6e9e6d
Malware Config
Extracted
danabot
4
103.175.16.113:443
103.175.16.114:443
-
embedded_hash
422236FD601D11EE82825A484D26DD6F
-
type
loader
Signatures
-
Danabot Loader Component 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\d57c5f0618d68902c6b7e8fa7b888641.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\d57c5f0618d68902c6b7e8fa7b888641.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\d57c5f0618d68902c6b7e8fa7b888641.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\d57c5f0618d68902c6b7e8fa7b888641.exe.dll DanabotLoader2021 \Users\Admin\AppData\Local\Temp\d57c5f0618d68902c6b7e8fa7b888641.exe.dll DanabotLoader2021 behavioral1/memory/1732-65-0x0000000001D60000-0x0000000001EB1000-memory.dmp DanabotLoader2021 -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 1732 rundll32.exe 1732 rundll32.exe 1732 rundll32.exe 1732 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
d57c5f0618d68902c6b7e8fa7b888641.exedescription pid process target process PID 748 wrote to memory of 1732 748 d57c5f0618d68902c6b7e8fa7b888641.exe rundll32.exe PID 748 wrote to memory of 1732 748 d57c5f0618d68902c6b7e8fa7b888641.exe rundll32.exe PID 748 wrote to memory of 1732 748 d57c5f0618d68902c6b7e8fa7b888641.exe rundll32.exe PID 748 wrote to memory of 1732 748 d57c5f0618d68902c6b7e8fa7b888641.exe rundll32.exe PID 748 wrote to memory of 1732 748 d57c5f0618d68902c6b7e8fa7b888641.exe rundll32.exe PID 748 wrote to memory of 1732 748 d57c5f0618d68902c6b7e8fa7b888641.exe rundll32.exe PID 748 wrote to memory of 1732 748 d57c5f0618d68902c6b7e8fa7b888641.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d57c5f0618d68902c6b7e8fa7b888641.exe"C:\Users\Admin\AppData\Local\Temp\d57c5f0618d68902c6b7e8fa7b888641.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\d57c5f0618d68902c6b7e8fa7b888641.exe.dll,z C:\Users\Admin\AppData\Local\Temp\d57c5f0618d68902c6b7e8fa7b888641.exe2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\d57c5f0618d68902c6b7e8fa7b888641.exe.dllMD5
dabd9b8bcc720a649402f5f27eca245e
SHA19d165278dd792ed4d1c399cd5732d5fdb7d701c2
SHA25626fa6fdbb4613151fb5c2b318b9e97bf43a2a6ff0847621df057b0dc4631dc43
SHA512d87465e6c5f2ef498251959e6d94a89165f09503ec5157c29b610b0769eaea9f77f01da009dc209ca3f28ad2d168024245a5abb567a157e8e1fb7949f7525201
-
\Users\Admin\AppData\Local\Temp\d57c5f0618d68902c6b7e8fa7b888641.exe.dllMD5
dabd9b8bcc720a649402f5f27eca245e
SHA19d165278dd792ed4d1c399cd5732d5fdb7d701c2
SHA25626fa6fdbb4613151fb5c2b318b9e97bf43a2a6ff0847621df057b0dc4631dc43
SHA512d87465e6c5f2ef498251959e6d94a89165f09503ec5157c29b610b0769eaea9f77f01da009dc209ca3f28ad2d168024245a5abb567a157e8e1fb7949f7525201
-
\Users\Admin\AppData\Local\Temp\d57c5f0618d68902c6b7e8fa7b888641.exe.dllMD5
dabd9b8bcc720a649402f5f27eca245e
SHA19d165278dd792ed4d1c399cd5732d5fdb7d701c2
SHA25626fa6fdbb4613151fb5c2b318b9e97bf43a2a6ff0847621df057b0dc4631dc43
SHA512d87465e6c5f2ef498251959e6d94a89165f09503ec5157c29b610b0769eaea9f77f01da009dc209ca3f28ad2d168024245a5abb567a157e8e1fb7949f7525201
-
\Users\Admin\AppData\Local\Temp\d57c5f0618d68902c6b7e8fa7b888641.exe.dllMD5
dabd9b8bcc720a649402f5f27eca245e
SHA19d165278dd792ed4d1c399cd5732d5fdb7d701c2
SHA25626fa6fdbb4613151fb5c2b318b9e97bf43a2a6ff0847621df057b0dc4631dc43
SHA512d87465e6c5f2ef498251959e6d94a89165f09503ec5157c29b610b0769eaea9f77f01da009dc209ca3f28ad2d168024245a5abb567a157e8e1fb7949f7525201
-
\Users\Admin\AppData\Local\Temp\d57c5f0618d68902c6b7e8fa7b888641.exe.dllMD5
dabd9b8bcc720a649402f5f27eca245e
SHA19d165278dd792ed4d1c399cd5732d5fdb7d701c2
SHA25626fa6fdbb4613151fb5c2b318b9e97bf43a2a6ff0847621df057b0dc4631dc43
SHA512d87465e6c5f2ef498251959e6d94a89165f09503ec5157c29b610b0769eaea9f77f01da009dc209ca3f28ad2d168024245a5abb567a157e8e1fb7949f7525201
-
memory/748-54-0x00000000754B1000-0x00000000754B3000-memory.dmpFilesize
8KB
-
memory/748-55-0x0000000000740000-0x0000000000825000-memory.dmpFilesize
916KB
-
memory/748-56-0x0000000000830000-0x000000000092D000-memory.dmpFilesize
1012KB
-
memory/748-57-0x0000000000400000-0x0000000000529000-memory.dmpFilesize
1.2MB
-
memory/1732-58-0x0000000000000000-mapping.dmp
-
memory/1732-65-0x0000000001D60000-0x0000000001EB1000-memory.dmpFilesize
1.3MB