Analysis
-
max time kernel
84s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
27/09/2022, 12:26
Static task
static1
General
-
Target
287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748.exe
-
Size
1.4MB
-
MD5
a59ef7b3cc1f268b5b690d1adb70eaea
-
SHA1
5e23e9da8be9808620ed16bc139dae0d90219c70
-
SHA256
287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748
-
SHA512
84e58d976758629cac4bad8c8ed457f91b937ed8df6115bc187a1926107603d7ea45c58bde17808c4075020ec3762db95f4957c16a05dc1b1c4585a1e91c37e8
-
SSDEEP
24576:37TPLeD9dEc7QE0hhwC8PAtpcWpas53zX63WGIu/w6sP0fm2LzDEbPD/hA9fCCzD:rTPCD9K5hgAXcWpJzXvLb6O0rr8hA9fP
Malware Config
Extracted
Family
danabot
C2
198.15.112.179:443
185.62.56.245:443
153.92.223.225:443
192.119.70.159:443
Attributes
-
embedded_hash
6618C163D57D6441FCCA65D86C4D380D
-
type
loader
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 3136 2656 WerFault.exe 65 1928 2656 WerFault.exe 65 -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2656 wrote to memory of 3596 2656 287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748.exe 66 PID 2656 wrote to memory of 3596 2656 287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748.exe 66 PID 2656 wrote to memory of 3596 2656 287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748.exe 66 PID 2656 wrote to memory of 4088 2656 287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748.exe 69 PID 2656 wrote to memory of 4088 2656 287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748.exe 69 PID 2656 wrote to memory of 4088 2656 287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748.exe 69 PID 2656 wrote to memory of 4088 2656 287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748.exe 69 PID 2656 wrote to memory of 4088 2656 287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748.exe 69 PID 2656 wrote to memory of 4088 2656 287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748.exe 69 PID 2656 wrote to memory of 4088 2656 287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748.exe 69 PID 2656 wrote to memory of 4088 2656 287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748.exe 69 PID 2656 wrote to memory of 4088 2656 287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748.exe 69 PID 2656 wrote to memory of 4088 2656 287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748.exe 69 PID 2656 wrote to memory of 4088 2656 287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748.exe"C:\Users\Admin\AppData\Local\Temp\287a450c85acd94eb44313b69ee9f2926cfeb3359251efbface372e8e60e0748.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\appidtel.exeC:\Windows\system32\appidtel.exe2⤵PID:3596
-
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 6162⤵
- Program crash
PID:3136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 5842⤵
- Program crash
PID:1928
-