Analysis
-
max time kernel
184s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-05-2022 13:54
Static task
static1
Behavioral task
behavioral1
Sample
a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.exe
Resource
win7-20220414-en
General
-
Target
a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.exe
-
Size
2.2MB
-
MD5
73c81633573ad5f1d30f16bbace78256
-
SHA1
075c68a77646235b5e3972207fe8766a13b47f9c
-
SHA256
a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06
-
SHA512
0524aa6a83f67d3478ea46cf2d9f27878d1fa0377408eb045c1726c3ade60050e5d37390f8dbad8b898290b6298523681d6d63699116f40bddf1cdb0d6cffd93
Malware Config
Extracted
danabot
89.44.9.132
64.188.23.70
179.43.133.35
45.147.231.218
89.45.4.126
Signatures
-
Danabot x86 payload 4 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\A85658~1.DLL family_danabot C:\Users\Admin\AppData\Local\Temp\a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.dll family_danabot C:\Users\Admin\AppData\Local\Temp\a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.dll family_danabot C:\Users\Admin\AppData\Local\Temp\a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.dll family_danabot -
Blocklisted process makes network request 8 IoCs
Processes:
rundll32.exeflow pid process 30 4696 rundll32.exe 43 4696 rundll32.exe 58 4696 rundll32.exe 72 4696 rundll32.exe 73 4696 rundll32.exe 82 4696 rundll32.exe 87 4696 rundll32.exe 90 4696 rundll32.exe -
Loads dropped DLL 3 IoCs
Processes:
regsvr32.exerundll32.exepid process 1908 regsvr32.exe 4696 rundll32.exe 4696 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3804 1888 WerFault.exe a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.exeregsvr32.exedescription pid process target process PID 1888 wrote to memory of 1908 1888 a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.exe regsvr32.exe PID 1888 wrote to memory of 1908 1888 a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.exe regsvr32.exe PID 1888 wrote to memory of 1908 1888 a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.exe regsvr32.exe PID 1908 wrote to memory of 4696 1908 regsvr32.exe rundll32.exe PID 1908 wrote to memory of 4696 1908 regsvr32.exe rundll32.exe PID 1908 wrote to memory of 4696 1908 regsvr32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.exe"C:\Users\Admin\AppData\Local\Temp\a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\A85658~1.DLL f1 C:\Users\Admin\AppData\Local\Temp\A85658~1.EXE@18882⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\A85658~1.DLL,f03⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 4882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1888 -ip 18881⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\A85658~1.DLLFilesize
2.0MB
MD5f44d1c7820bb02b486871ba9eab2f226
SHA1d040d7b886002f37924536425b43091f21a3844b
SHA25624bba101da3da6aefc2b1d454ede986180a5ac31c00ec601cc2d6827b00b26c2
SHA512b633e8f09b12178da24e4dbd022289d4fdf0061175cd685e8357cef51183247da436deb81fd3672f8839b581428c3c46547c5dd3fcf4f726bc72dc070fc02baf
-
C:\Users\Admin\AppData\Local\Temp\a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.dllFilesize
2.0MB
MD5f44d1c7820bb02b486871ba9eab2f226
SHA1d040d7b886002f37924536425b43091f21a3844b
SHA25624bba101da3da6aefc2b1d454ede986180a5ac31c00ec601cc2d6827b00b26c2
SHA512b633e8f09b12178da24e4dbd022289d4fdf0061175cd685e8357cef51183247da436deb81fd3672f8839b581428c3c46547c5dd3fcf4f726bc72dc070fc02baf
-
C:\Users\Admin\AppData\Local\Temp\a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.dllFilesize
2.0MB
MD5f44d1c7820bb02b486871ba9eab2f226
SHA1d040d7b886002f37924536425b43091f21a3844b
SHA25624bba101da3da6aefc2b1d454ede986180a5ac31c00ec601cc2d6827b00b26c2
SHA512b633e8f09b12178da24e4dbd022289d4fdf0061175cd685e8357cef51183247da436deb81fd3672f8839b581428c3c46547c5dd3fcf4f726bc72dc070fc02baf
-
C:\Users\Admin\AppData\Local\Temp\a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06.dllFilesize
2.0MB
MD5f44d1c7820bb02b486871ba9eab2f226
SHA1d040d7b886002f37924536425b43091f21a3844b
SHA25624bba101da3da6aefc2b1d454ede986180a5ac31c00ec601cc2d6827b00b26c2
SHA512b633e8f09b12178da24e4dbd022289d4fdf0061175cd685e8357cef51183247da436deb81fd3672f8839b581428c3c46547c5dd3fcf4f726bc72dc070fc02baf
-
memory/1888-130-0x0000000002697000-0x00000000028B8000-memory.dmpFilesize
2.1MB
-
memory/1888-131-0x00000000028C0000-0x0000000002AF6000-memory.dmpFilesize
2.2MB
-
memory/1888-132-0x0000000000400000-0x000000000098B000-memory.dmpFilesize
5.5MB
-
memory/1908-133-0x0000000000000000-mapping.dmp
-
memory/4696-136-0x0000000000000000-mapping.dmp
-
memory/4696-139-0x0000000001EE0000-0x00000000020F6000-memory.dmpFilesize
2.1MB