Resubmissions

03-05-2022 13:27

220503-qp34xaabfj 8

26-04-2022 04:40

220426-fajfvabab3 8

Analysis

  • max time kernel
    297s
  • max time network
    304s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    03-05-2022 13:27

General

  • Target

    341d69cf4f5d9be493ebe9913f4150cf.exe

  • Size

    1.1MB

  • MD5

    341d69cf4f5d9be493ebe9913f4150cf

  • SHA1

    b043c610bf6b1fea68701910870d439501d8f832

  • SHA256

    ea315e9e65af9d1d95ac0636abde389107bb131f99e9eeac2dd16821be1ba888

  • SHA512

    50534e155760d2dde64e0737f90b63d35c1b0e3136007476d9e62b8eaf0bfb42225a57dc340c12e45a7346cdf56a857e403b4230d561b32991f1155f4d8294ab

Score
10/10

Malware Config

Extracted

Family

danabot

Attributes
  • type

    loader

Extracted

Family

danabot

Botnet

7

C2

192.236.176.108:443

23.254.209.218:443

Attributes
  • embedded_hash

    F05AD7842A54466C7E7FBCE36DCCAB8C

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 14 IoCs
  • Program crash 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\341d69cf4f5d9be493ebe9913f4150cf.exe
    "C:\Users\Admin\AppData\Local\Temp\341d69cf4f5d9be493ebe9913f4150cf.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:3084
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 600
      2⤵
      • Program crash
      PID:2348
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 632
      2⤵
      • Program crash
      PID:1952
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 692
      2⤵
      • Program crash
      PID:1720
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2436 -ip 2436
    1⤵
      PID:2412
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2436 -ip 2436
      1⤵
        PID:1232
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2436 -ip 2436
        1⤵
          PID:4324

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2436-130-0x0000000000755000-0x0000000000832000-memory.dmp
          Filesize

          884KB

        • memory/2436-131-0x0000000002440000-0x0000000002665000-memory.dmp
          Filesize

          2.1MB

        • memory/2436-133-0x0000000000400000-0x0000000000630000-memory.dmp
          Filesize

          2.2MB

        • memory/3084-132-0x0000000000000000-mapping.dmp
        • memory/3084-135-0x0000000001100000-0x0000000001103000-memory.dmp
          Filesize

          12KB

        • memory/3084-134-0x00000000010F0000-0x00000000010F3000-memory.dmp
          Filesize

          12KB

        • memory/3084-136-0x0000000001110000-0x0000000001113000-memory.dmp
          Filesize

          12KB

        • memory/3084-137-0x0000000001120000-0x0000000001123000-memory.dmp
          Filesize

          12KB

        • memory/3084-138-0x0000000001130000-0x0000000001133000-memory.dmp
          Filesize

          12KB

        • memory/3084-139-0x0000000001140000-0x0000000001143000-memory.dmp
          Filesize

          12KB

        • memory/3084-140-0x0000000001150000-0x0000000001153000-memory.dmp
          Filesize

          12KB

        • memory/3084-141-0x0000000001160000-0x0000000001163000-memory.dmp
          Filesize

          12KB