Analysis
-
max time kernel
144s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-05-2022 13:04
Static task
static1
Behavioral task
behavioral1
Sample
201715e350439f6d19ce61769e5bb8d5.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
201715e350439f6d19ce61769e5bb8d5.exe
-
Size
1.0MB
-
MD5
201715e350439f6d19ce61769e5bb8d5
-
SHA1
38f5365dfe6d9d31d75b5637ddcbdb8db8cb35c6
-
SHA256
35bb9fb5b4801c32caa7c9b1d178f6a11d88cf849394333d450d9fc36dac0c1f
-
SHA512
32eaa99506f68b8a9f814f795fc0f10fa426ff91f10cb0ea3ae5684a5b468fcf066bc05c3b1146f649e310813d0a32e4d1b6d86ac761ca07914ab3c14e2a8c72
Malware Config
Extracted
Family
danabot
Botnet
6
C2
192.236.160.249:443
104.168.234.51:443
23.254.161.215:443
192.236.147.212:443
Attributes
-
embedded_hash
A471231BC0846BE9EFCDD39DCBA967C5
-
type
loader
Extracted
Family
danabot
Attributes
-
type
loader
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 2 1644 rundll32.exe 4 1644 rundll32.exe 6 1644 rundll32.exe 7 1644 rundll32.exe 8 1644 rundll32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27 PID 1936 wrote to memory of 1644 1936 201715e350439f6d19ce61769e5bb8d5.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\201715e350439f6d19ce61769e5bb8d5.exe"C:\Users\Admin\AppData\Local\Temp\201715e350439f6d19ce61769e5bb8d5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:1644
-