Analysis
-
max time kernel
188s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 10:34
Static task
static1
Behavioral task
behavioral1
Sample
6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.exe
Resource
win7-20220414-en
General
-
Target
6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.exe
-
Size
998KB
-
MD5
695a4122879652c1a3d32bddb0957b35
-
SHA1
6375f5a1a70fc999dc760734cca1ce248e9b53fa
-
SHA256
6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9
-
SHA512
db8ae2b5b1af341dc040a16719753d833914b9737d37fa9237b62f8023e0e8f6f35089b3072822e28b02a4a84dc109ddf49d4daef4ad6c7e72ec7b48d1c6fd84
Malware Config
Extracted
danabot
5.61.58.130
2.56.213.39
2.56.212.4
5.61.56.192
Signatures
-
Danabot x86 payload 4 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.dll family_danabot C:\Users\Admin\AppData\Local\Temp\6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.dll family_danabot C:\Users\Admin\AppData\Local\Temp\6F6A2A~1.DLL family_danabot C:\Users\Admin\AppData\Local\Temp\6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.dll family_danabot -
Blocklisted process makes network request 10 IoCs
Processes:
rundll32.exeflow pid process 26 772 rundll32.exe 36 772 rundll32.exe 37 772 rundll32.exe 39 772 rundll32.exe 49 772 rundll32.exe 55 772 rundll32.exe 66 772 rundll32.exe 77 772 rundll32.exe 78 772 rundll32.exe 79 772 rundll32.exe -
Loads dropped DLL 3 IoCs
Processes:
regsvr32.exerundll32.exepid process 4628 regsvr32.exe 4628 regsvr32.exe 772 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4104 2220 WerFault.exe 6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.exeregsvr32.exedescription pid process target process PID 2220 wrote to memory of 4628 2220 6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.exe regsvr32.exe PID 2220 wrote to memory of 4628 2220 6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.exe regsvr32.exe PID 2220 wrote to memory of 4628 2220 6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.exe regsvr32.exe PID 4628 wrote to memory of 772 4628 regsvr32.exe rundll32.exe PID 4628 wrote to memory of 772 4628 regsvr32.exe rundll32.exe PID 4628 wrote to memory of 772 4628 regsvr32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.exe"C:\Users\Admin\AppData\Local\Temp\6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\6F6A2A~1.DLL f1 C:\Users\Admin\AppData\Local\Temp\6F6A2A~1.EXE@22202⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\6F6A2A~1.DLL,f03⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 4602⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2220 -ip 22201⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6F6A2A~1.DLLFilesize
725KB
MD531c151abf0e267dcbf59687f5eaea977
SHA1504c905865348144068a2b7bf3249e8c1d3ce8d7
SHA256e6b99e7a0925e5b5c1ac08f9af988dd4682f47dbf6fa698decf1285a1ee062f3
SHA512473c968fd7507b708cb7a4357f0655b8fc9e139548048dee9201db1ef7900a0a8f393cc20a34c9d6a2c2ec346651a1bd676de5fdd0da7473f6b4106f221b11d5
-
C:\Users\Admin\AppData\Local\Temp\6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.dllFilesize
725KB
MD531c151abf0e267dcbf59687f5eaea977
SHA1504c905865348144068a2b7bf3249e8c1d3ce8d7
SHA256e6b99e7a0925e5b5c1ac08f9af988dd4682f47dbf6fa698decf1285a1ee062f3
SHA512473c968fd7507b708cb7a4357f0655b8fc9e139548048dee9201db1ef7900a0a8f393cc20a34c9d6a2c2ec346651a1bd676de5fdd0da7473f6b4106f221b11d5
-
C:\Users\Admin\AppData\Local\Temp\6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.dllFilesize
725KB
MD531c151abf0e267dcbf59687f5eaea977
SHA1504c905865348144068a2b7bf3249e8c1d3ce8d7
SHA256e6b99e7a0925e5b5c1ac08f9af988dd4682f47dbf6fa698decf1285a1ee062f3
SHA512473c968fd7507b708cb7a4357f0655b8fc9e139548048dee9201db1ef7900a0a8f393cc20a34c9d6a2c2ec346651a1bd676de5fdd0da7473f6b4106f221b11d5
-
C:\Users\Admin\AppData\Local\Temp\6f6a2ab9d85173b049ed2654e9efda2332b215ba4480618177a789ff0af1d0f9.dllFilesize
725KB
MD531c151abf0e267dcbf59687f5eaea977
SHA1504c905865348144068a2b7bf3249e8c1d3ce8d7
SHA256e6b99e7a0925e5b5c1ac08f9af988dd4682f47dbf6fa698decf1285a1ee062f3
SHA512473c968fd7507b708cb7a4357f0655b8fc9e139548048dee9201db1ef7900a0a8f393cc20a34c9d6a2c2ec346651a1bd676de5fdd0da7473f6b4106f221b11d5
-
memory/772-138-0x0000000000000000-mapping.dmp
-
memory/2220-130-0x0000000002383000-0x000000000244F000-memory.dmpFilesize
816KB
-
memory/2220-131-0x0000000002450000-0x0000000002530000-memory.dmpFilesize
896KB
-
memory/2220-132-0x0000000000400000-0x0000000000566000-memory.dmpFilesize
1.4MB
-
memory/2220-140-0x0000000000400000-0x0000000000566000-memory.dmpFilesize
1.4MB
-
memory/4628-133-0x0000000000000000-mapping.dmp
-
memory/4628-137-0x00000000020E0000-0x00000000021A3000-memory.dmpFilesize
780KB