Analysis

  • max time kernel
    63s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 10:34

General

  • Target

    6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.exe

  • Size

    998KB

  • MD5

    695a4122879652c1a3d32bddb0957b35

  • SHA1

    6375f5a1a70fc999dc760734cca1ce248e9b53fa

  • SHA256

    6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9

  • SHA512

    db8ae2b5b1af341dc040a16719753d833914b9737d37fa9237b62f8023e0e8f6f35089b3072822e28b02a4a84dc109ddf49d4daef4ad6c7e72ec7b48d1c6fd84

Malware Config

Extracted

Family

danabot

C2

5.61.58.130

2.56.213.39

2.56.212.4

5.61.56.192

rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot x86 payload 6 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

  • Blocklisted process makes network request 10 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.exe
    "C:\Users\Admin\AppData\Local\Temp\6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\6F6A2A~1.DLL f1 C:\Users\Admin\AppData\Local\Temp\6F6A2A~1.EXE@1672
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1460
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\6F6A2A~1.DLL,f0
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        PID:1928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6F6A2A~1.DLL
    Filesize

    725KB

    MD5

    8dcdfd72fd6e33ec7d7d03466b06fcad

    SHA1

    f2589526876aea35da17af31e15b3d3f66158e6a

    SHA256

    df80e4bf59b1751482aa28225f435c48c7e4c239b522049bb8f835947cb37fba

    SHA512

    71b2f84cd5be2af0f92bfc34c4ae0912b4cc607f3bcf88d69e60c394f94b21904b7fd0baee2e3572e000eb8774fc9aad2c3b818120300498458ecf7e7613fde2

  • \Users\Admin\AppData\Local\Temp\6F6A2A~1.DLL
    Filesize

    725KB

    MD5

    8dcdfd72fd6e33ec7d7d03466b06fcad

    SHA1

    f2589526876aea35da17af31e15b3d3f66158e6a

    SHA256

    df80e4bf59b1751482aa28225f435c48c7e4c239b522049bb8f835947cb37fba

    SHA512

    71b2f84cd5be2af0f92bfc34c4ae0912b4cc607f3bcf88d69e60c394f94b21904b7fd0baee2e3572e000eb8774fc9aad2c3b818120300498458ecf7e7613fde2

  • \Users\Admin\AppData\Local\Temp\6F6A2A~1.DLL
    Filesize

    725KB

    MD5

    8dcdfd72fd6e33ec7d7d03466b06fcad

    SHA1

    f2589526876aea35da17af31e15b3d3f66158e6a

    SHA256

    df80e4bf59b1751482aa28225f435c48c7e4c239b522049bb8f835947cb37fba

    SHA512

    71b2f84cd5be2af0f92bfc34c4ae0912b4cc607f3bcf88d69e60c394f94b21904b7fd0baee2e3572e000eb8774fc9aad2c3b818120300498458ecf7e7613fde2

  • \Users\Admin\AppData\Local\Temp\6F6A2A~1.DLL
    Filesize

    725KB

    MD5

    8dcdfd72fd6e33ec7d7d03466b06fcad

    SHA1

    f2589526876aea35da17af31e15b3d3f66158e6a

    SHA256

    df80e4bf59b1751482aa28225f435c48c7e4c239b522049bb8f835947cb37fba

    SHA512

    71b2f84cd5be2af0f92bfc34c4ae0912b4cc607f3bcf88d69e60c394f94b21904b7fd0baee2e3572e000eb8774fc9aad2c3b818120300498458ecf7e7613fde2

  • \Users\Admin\AppData\Local\Temp\6F6A2A~1.DLL
    Filesize

    725KB

    MD5

    8dcdfd72fd6e33ec7d7d03466b06fcad

    SHA1

    f2589526876aea35da17af31e15b3d3f66158e6a

    SHA256

    df80e4bf59b1751482aa28225f435c48c7e4c239b522049bb8f835947cb37fba

    SHA512

    71b2f84cd5be2af0f92bfc34c4ae0912b4cc607f3bcf88d69e60c394f94b21904b7fd0baee2e3572e000eb8774fc9aad2c3b818120300498458ecf7e7613fde2

  • \Users\Admin\AppData\Local\Temp\6F6A2A~1.DLL
    Filesize

    725KB

    MD5

    8dcdfd72fd6e33ec7d7d03466b06fcad

    SHA1

    f2589526876aea35da17af31e15b3d3f66158e6a

    SHA256

    df80e4bf59b1751482aa28225f435c48c7e4c239b522049bb8f835947cb37fba

    SHA512

    71b2f84cd5be2af0f92bfc34c4ae0912b4cc607f3bcf88d69e60c394f94b21904b7fd0baee2e3572e000eb8774fc9aad2c3b818120300498458ecf7e7613fde2

  • memory/1460-58-0x0000000000000000-mapping.dmp
  • memory/1460-60-0x00000000763C1000-0x00000000763C3000-memory.dmp
    Filesize

    8KB

  • memory/1460-63-0x0000000000A00000-0x0000000000AC3000-memory.dmp
    Filesize

    780KB

  • memory/1672-59-0x0000000000400000-0x0000000000566000-memory.dmp
    Filesize

    1.4MB

  • memory/1672-54-0x0000000000250000-0x000000000031C000-memory.dmp
    Filesize

    816KB

  • memory/1672-57-0x0000000000400000-0x0000000000566000-memory.dmp
    Filesize

    1.4MB

  • memory/1672-56-0x0000000001E20000-0x0000000001F00000-memory.dmp
    Filesize

    896KB

  • memory/1672-55-0x0000000000250000-0x000000000031C000-memory.dmp
    Filesize

    816KB

  • memory/1928-64-0x0000000000000000-mapping.dmp
  • memory/1928-70-0x0000000000210000-0x00000000002D3000-memory.dmp
    Filesize

    780KB