Analysis
-
max time kernel
297s -
max time network
304s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-05-2022 13:27
Static task
static1
Behavioral task
behavioral1
Sample
341d69cf4f5d9be493ebe9913f4150cf.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
341d69cf4f5d9be493ebe9913f4150cf.exe
-
Size
1.1MB
-
MD5
341d69cf4f5d9be493ebe9913f4150cf
-
SHA1
b043c610bf6b1fea68701910870d439501d8f832
-
SHA256
ea315e9e65af9d1d95ac0636abde389107bb131f99e9eeac2dd16821be1ba888
-
SHA512
50534e155760d2dde64e0737f90b63d35c1b0e3136007476d9e62b8eaf0bfb42225a57dc340c12e45a7346cdf56a857e403b4230d561b32991f1155f4d8294ab
Malware Config
Extracted
Family
danabot
Attributes
-
type
loader
Extracted
Family
danabot
Botnet
7
C2
192.236.176.108:443
23.254.209.218:443
Attributes
-
embedded_hash
F05AD7842A54466C7E7FBCE36DCCAB8C
-
type
loader
Signatures
-
Blocklisted process makes network request 14 IoCs
flow pid Process 17 3084 rundll32.exe 29 3084 rundll32.exe 42 3084 rundll32.exe 59 3084 rundll32.exe 64 3084 rundll32.exe 65 3084 rundll32.exe 67 3084 rundll32.exe 68 3084 rundll32.exe 69 3084 rundll32.exe 70 3084 rundll32.exe 71 3084 rundll32.exe 72 3084 rundll32.exe 73 3084 rundll32.exe 74 3084 rundll32.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 2348 2436 WerFault.exe 81 1952 2436 WerFault.exe 81 1720 2436 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87 PID 2436 wrote to memory of 3084 2436 341d69cf4f5d9be493ebe9913f4150cf.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\341d69cf4f5d9be493ebe9913f4150cf.exe"C:\Users\Admin\AppData\Local\Temp\341d69cf4f5d9be493ebe9913f4150cf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:3084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 6002⤵
- Program crash
PID:2348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 6322⤵
- Program crash
PID:1952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 6922⤵
- Program crash
PID:1720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2436 -ip 24361⤵PID:2412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2436 -ip 24361⤵PID:1232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2436 -ip 24361⤵PID:4324