Analysis
-
max time kernel
74s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
23-09-2022 06:50
Static task
static1
General
-
Target
dd8f4f5fba1053b26b3622f83917751fc4513f3af73dafda36d4dbd33c732028.exe
-
Size
1.3MB
-
MD5
1c4b7ed2eb6ce196468f88be8a163f59
-
SHA1
978a72fde9c7dbfd7f660714bbc81c3cd5231735
-
SHA256
dd8f4f5fba1053b26b3622f83917751fc4513f3af73dafda36d4dbd33c732028
-
SHA512
111ba7fb637f4c02d08a750f656d16aacddd42e328784a330ecfb936a6e68b7b24a5e8be10a313ea943dbc45d9cf1b06c656ed548462719b101ecaad0de1d119
-
SSDEEP
24576:9nOHlC9jLVh+MuCuSRpwQXU0kgMQw9TD49oD:tOnBSUXQw9SoD
Malware Config
Extracted
danabot
198.15.112.179:443
185.62.56.245:443
153.92.223.225:443
192.119.70.159:443
-
embedded_hash
6618C163D57D6441FCCA65D86C4D380D
-
type
loader
Signatures
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3572 2740 WerFault.exe dd8f4f5fba1053b26b3622f83917751fc4513f3af73dafda36d4dbd33c732028.exe 2028 2740 WerFault.exe dd8f4f5fba1053b26b3622f83917751fc4513f3af73dafda36d4dbd33c732028.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
dd8f4f5fba1053b26b3622f83917751fc4513f3af73dafda36d4dbd33c732028.exedescription pid process target process PID 2740 wrote to memory of 960 2740 dd8f4f5fba1053b26b3622f83917751fc4513f3af73dafda36d4dbd33c732028.exe appidtel.exe PID 2740 wrote to memory of 960 2740 dd8f4f5fba1053b26b3622f83917751fc4513f3af73dafda36d4dbd33c732028.exe appidtel.exe PID 2740 wrote to memory of 960 2740 dd8f4f5fba1053b26b3622f83917751fc4513f3af73dafda36d4dbd33c732028.exe appidtel.exe PID 2740 wrote to memory of 3312 2740 dd8f4f5fba1053b26b3622f83917751fc4513f3af73dafda36d4dbd33c732028.exe rundll32.exe PID 2740 wrote to memory of 3312 2740 dd8f4f5fba1053b26b3622f83917751fc4513f3af73dafda36d4dbd33c732028.exe rundll32.exe PID 2740 wrote to memory of 3312 2740 dd8f4f5fba1053b26b3622f83917751fc4513f3af73dafda36d4dbd33c732028.exe rundll32.exe PID 2740 wrote to memory of 3312 2740 dd8f4f5fba1053b26b3622f83917751fc4513f3af73dafda36d4dbd33c732028.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd8f4f5fba1053b26b3622f83917751fc4513f3af73dafda36d4dbd33c732028.exe"C:\Users\Admin\AppData\Local\Temp\dd8f4f5fba1053b26b3622f83917751fc4513f3af73dafda36d4dbd33c732028.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\appidtel.exeC:\Windows\system32\appidtel.exe2⤵
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 6002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 6242⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/960-148-0x0000000000000000-mapping.dmp
-
memory/960-160-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/960-159-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/960-158-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/960-157-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/960-156-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/960-155-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/960-154-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/960-152-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/960-150-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/960-151-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/960-149-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-146-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-124-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-130-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-132-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-133-0x0000000002600000-0x0000000002735000-memory.dmpFilesize
1.2MB
-
memory/2740-134-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-135-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-136-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-137-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-139-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-138-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-140-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-141-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-142-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-143-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-144-0x0000000002740000-0x0000000002A1B000-memory.dmpFilesize
2.9MB
-
memory/2740-145-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-116-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-147-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-128-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-127-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-126-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-121-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-125-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-153-0x0000000000400000-0x00000000006E8000-memory.dmpFilesize
2.9MB
-
memory/2740-129-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-123-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-122-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-120-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-119-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-118-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-117-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-161-0x0000000002600000-0x0000000002735000-memory.dmpFilesize
1.2MB
-
memory/2740-162-0x0000000002740000-0x0000000002A1B000-memory.dmpFilesize
2.9MB
-
memory/2740-163-0x0000000000400000-0x00000000006E8000-memory.dmpFilesize
2.9MB
-
memory/2740-164-0x0000000000400000-0x00000000006E8000-memory.dmpFilesize
2.9MB
-
memory/2740-165-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-166-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-167-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-169-0x0000000000400000-0x00000000006E8000-memory.dmpFilesize
2.9MB
-
memory/2740-168-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-170-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-171-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-172-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-173-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-174-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-175-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-176-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2740-177-0x0000000000400000-0x00000000006E8000-memory.dmpFilesize
2.9MB