Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-05-2022 13:05
Static task
static1
Behavioral task
behavioral1
Sample
8fba92e7730c734197c8e5977533df77.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
8fba92e7730c734197c8e5977533df77.exe
-
Size
975KB
-
MD5
8fba92e7730c734197c8e5977533df77
-
SHA1
8106d808d0199d230b5943f15b1d85d05334d3ea
-
SHA256
72cb26ac08fa4ba35112a093b506eb97f730537f9a011a20ad8049d4da6fcb77
-
SHA512
ab1e7246e219b63b65082de10be4f6880bee0e1b04a50722bb7a1b8cfa81853a5793f581decfc43b5f1cf02d01fdd4fa3bc047cbc28afc0f37f6f87b75b397bb
Malware Config
Extracted
Family
danabot
Attributes
-
type
loader
Extracted
Family
danabot
Botnet
7
Attributes
-
embedded_hash
7E121872EDA1FC9ABB4099F6D6AE1D49
-
type
loader
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 17 4324 rundll32.exe 34 4324 rundll32.exe 43 4324 rundll32.exe 53 4324 rundll32.exe 60 4324 rundll32.exe 61 4324 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4068 2500 WerFault.exe 79 -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81 PID 2500 wrote to memory of 4324 2500 8fba92e7730c734197c8e5977533df77.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fba92e7730c734197c8e5977533df77.exe"C:\Users\Admin\AppData\Local\Temp\8fba92e7730c734197c8e5977533df77.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:4324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 6242⤵
- Program crash
PID:4068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2500 -ip 25001⤵PID:4672