Analysis
-
max time kernel
139s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-05-2022 12:57
Static task
static1
Behavioral task
behavioral1
Sample
ae6a68f651c30d7c6c914114fa14aa0b.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
ae6a68f651c30d7c6c914114fa14aa0b.exe
-
Size
967KB
-
MD5
ae6a68f651c30d7c6c914114fa14aa0b
-
SHA1
21eeaeb2061461f7bdd20f02542c18cc4ea75baa
-
SHA256
f93628943add0691bc80e1db3cee114133ef839e820f50448b3082c46113cb6d
-
SHA512
e06c62be260746076290d404f90e797d340db014b250d1c78bf05fc33fd469e051d9092df59f7668673cdd7a6a7df47ab5977b241b66da3ad20528c6266ddef9
Malware Config
Extracted
Family
danabot
Attributes
-
type
loader
Extracted
Family
danabot
Botnet
7
C2
192.236.176.108:443
23.254.209.218:443
Attributes
-
embedded_hash
FF16DCD8834CB7E04B2EEB3200331F40
-
type
loader
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 2 840 rundll32.exe 4 840 rundll32.exe 5 840 rundll32.exe 7 840 rundll32.exe 8 840 rundll32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28 PID 2036 wrote to memory of 840 2036 ae6a68f651c30d7c6c914114fa14aa0b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae6a68f651c30d7c6c914114fa14aa0b.exe"C:\Users\Admin\AppData\Local\Temp\ae6a68f651c30d7c6c914114fa14aa0b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:840
-