Analysis
-
max time kernel
140s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-05-2022 13:05
Static task
static1
Behavioral task
behavioral1
Sample
8fba92e7730c734197c8e5977533df77.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
8fba92e7730c734197c8e5977533df77.exe
-
Size
975KB
-
MD5
8fba92e7730c734197c8e5977533df77
-
SHA1
8106d808d0199d230b5943f15b1d85d05334d3ea
-
SHA256
72cb26ac08fa4ba35112a093b506eb97f730537f9a011a20ad8049d4da6fcb77
-
SHA512
ab1e7246e219b63b65082de10be4f6880bee0e1b04a50722bb7a1b8cfa81853a5793f581decfc43b5f1cf02d01fdd4fa3bc047cbc28afc0f37f6f87b75b397bb
Malware Config
Extracted
Family
danabot
Attributes
-
type
loader
Extracted
Family
danabot
Botnet
7
C2
192.236.176.108:443
23.254.209.218:443
Attributes
-
embedded_hash
7E121872EDA1FC9ABB4099F6D6AE1D49
-
type
loader
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 2 940 rundll32.exe 4 940 rundll32.exe 5 940 rundll32.exe 7 940 rundll32.exe 8 940 rundll32.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27 PID 560 wrote to memory of 940 560 8fba92e7730c734197c8e5977533df77.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fba92e7730c734197c8e5977533df77.exe"C:\Users\Admin\AppData\Local\Temp\8fba92e7730c734197c8e5977533df77.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:940
-