Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-05-2022 13:04
Static task
static1
Behavioral task
behavioral1
Sample
201715e350439f6d19ce61769e5bb8d5.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
201715e350439f6d19ce61769e5bb8d5.exe
-
Size
1.0MB
-
MD5
201715e350439f6d19ce61769e5bb8d5
-
SHA1
38f5365dfe6d9d31d75b5637ddcbdb8db8cb35c6
-
SHA256
35bb9fb5b4801c32caa7c9b1d178f6a11d88cf849394333d450d9fc36dac0c1f
-
SHA512
32eaa99506f68b8a9f814f795fc0f10fa426ff91f10cb0ea3ae5684a5b468fcf066bc05c3b1146f649e310813d0a32e4d1b6d86ac761ca07914ab3c14e2a8c72
Malware Config
Extracted
Family
danabot
Attributes
-
type
loader
Extracted
Family
danabot
Botnet
6
C2
192.236.160.249:443
104.168.234.51:443
23.254.161.215:443
192.236.147.212:443
Attributes
-
embedded_hash
A471231BC0846BE9EFCDD39DCBA967C5
-
type
loader
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 19 4456 rundll32.exe 41 4456 rundll32.exe 61 4456 rundll32.exe 69 4456 rundll32.exe 81 4456 rundll32.exe 84 4456 rundll32.exe 85 4456 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1312 2544 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86 PID 2544 wrote to memory of 4456 2544 201715e350439f6d19ce61769e5bb8d5.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\201715e350439f6d19ce61769e5bb8d5.exe"C:\Users\Admin\AppData\Local\Temp\201715e350439f6d19ce61769e5bb8d5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 6162⤵
- Program crash
PID:1312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2544 -ip 25441⤵PID:3732