Analysis
-
max time kernel
172s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 19:43
Static task
static1
Behavioral task
behavioral1
Sample
388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03.exe
Resource
win7-20220414-en
General
-
Target
388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03.exe
-
Size
1.0MB
-
MD5
fee86ee228084c3126a596d9f375f960
-
SHA1
9ef35a4fd88dcf47fcfdad492543c908b320a511
-
SHA256
388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03
-
SHA512
123ebbf1cc27ea7e042c1ed5f5c7dcb85f47d7f543cbca0953e84d6318159d0262d21ab2b48e8eb68c7dbc1d62f996ef77cda9c5673cb3a7ec5690169a0c569c
Malware Config
Extracted
danabot
5.61.58.130
2.56.213.39
2.56.212.4
5.61.56.192
Signatures
-
Danabot x86 payload 3 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\388B0F~1.DLL family_danabot C:\Users\Admin\AppData\Local\Temp\388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03.dll family_danabot C:\Users\Admin\AppData\Local\Temp\388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03.dll family_danabot -
Blocklisted process makes network request 6 IoCs
Processes:
rundll32.exeflow pid process 44 2172 rundll32.exe 45 2172 rundll32.exe 50 2172 rundll32.exe 51 2172 rundll32.exe 52 2172 rundll32.exe 53 2172 rundll32.exe -
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exerundll32.exepid process 3016 regsvr32.exe 2172 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1516 1984 WerFault.exe 388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03.exeregsvr32.exedescription pid process target process PID 1984 wrote to memory of 3016 1984 388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03.exe regsvr32.exe PID 1984 wrote to memory of 3016 1984 388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03.exe regsvr32.exe PID 1984 wrote to memory of 3016 1984 388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03.exe regsvr32.exe PID 3016 wrote to memory of 2172 3016 regsvr32.exe rundll32.exe PID 3016 wrote to memory of 2172 3016 regsvr32.exe rundll32.exe PID 3016 wrote to memory of 2172 3016 regsvr32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03.exe"C:\Users\Admin\AppData\Local\Temp\388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\388B0F~1.DLL f1 C:\Users\Admin\AppData\Local\Temp\388B0F~1.EXE@19842⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\388B0F~1.DLL,f03⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 4762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1984 -ip 19841⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\388B0F~1.DLLFilesize
725KB
MD531c151abf0e267dcbf59687f5eaea977
SHA1504c905865348144068a2b7bf3249e8c1d3ce8d7
SHA256e6b99e7a0925e5b5c1ac08f9af988dd4682f47dbf6fa698decf1285a1ee062f3
SHA512473c968fd7507b708cb7a4357f0655b8fc9e139548048dee9201db1ef7900a0a8f393cc20a34c9d6a2c2ec346651a1bd676de5fdd0da7473f6b4106f221b11d5
-
C:\Users\Admin\AppData\Local\Temp\388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03.dllFilesize
725KB
MD531c151abf0e267dcbf59687f5eaea977
SHA1504c905865348144068a2b7bf3249e8c1d3ce8d7
SHA256e6b99e7a0925e5b5c1ac08f9af988dd4682f47dbf6fa698decf1285a1ee062f3
SHA512473c968fd7507b708cb7a4357f0655b8fc9e139548048dee9201db1ef7900a0a8f393cc20a34c9d6a2c2ec346651a1bd676de5fdd0da7473f6b4106f221b11d5
-
C:\Users\Admin\AppData\Local\Temp\388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03.dllFilesize
725KB
MD531c151abf0e267dcbf59687f5eaea977
SHA1504c905865348144068a2b7bf3249e8c1d3ce8d7
SHA256e6b99e7a0925e5b5c1ac08f9af988dd4682f47dbf6fa698decf1285a1ee062f3
SHA512473c968fd7507b708cb7a4357f0655b8fc9e139548048dee9201db1ef7900a0a8f393cc20a34c9d6a2c2ec346651a1bd676de5fdd0da7473f6b4106f221b11d5
-
memory/1984-130-0x0000000004A15000-0x0000000004AE1000-memory.dmpFilesize
816KB
-
memory/1984-131-0x0000000004AF0000-0x0000000004BD0000-memory.dmpFilesize
896KB
-
memory/1984-132-0x0000000000400000-0x00000000047A0000-memory.dmpFilesize
67.6MB
-
memory/1984-138-0x0000000000400000-0x00000000047A0000-memory.dmpFilesize
67.6MB
-
memory/2172-136-0x0000000000000000-mapping.dmp
-
memory/3016-133-0x0000000000000000-mapping.dmp