Analysis
-
max time kernel
151s -
max time network
190s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 14:15
Static task
static1
Behavioral task
behavioral1
Sample
malware_smoke_1895150882.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
malware_smoke_1895150882.exe
-
Size
1.0MB
-
MD5
c53c1a89163132347f76dd22ab3741cc
-
SHA1
026cd76399273a5691555bf058f6b5c0aa56cc50
-
SHA256
e10640bc90b1c9fe36be71c79b107140b95a541611358c2627b516f3ae58e397
-
SHA512
4fd035370232c85fb04f0af16742e5ecbb51235a5adfebf2bf2568637a39d2614165274caceaf0bc6cbdaa9fad977a5e7470d55287cc0a1eecde6362175f3864
-
SSDEEP
24576:JgMcEVieKUHklvhYLSlVf/Ja4rITxX0x8kKMsyNv:JPcAimElw6enTxkx8kK7yN
Malware Config
Extracted
Family
danabot
Botnet
5
C2
23.254.133.7:443
213.227.155.102:443
Attributes
-
embedded_hash
12DF5314C5FDA13D9BF397EE140FD5E8
-
type
loader
Signatures
-
Blocklisted process makes network request 47 IoCs
Processes:
rundll32.exeflow pid process 2 1660 rundll32.exe 5 1660 rundll32.exe 6 1660 rundll32.exe 7 1660 rundll32.exe 8 1660 rundll32.exe 9 1660 rundll32.exe 10 1660 rundll32.exe 11 1660 rundll32.exe 12 1660 rundll32.exe 13 1660 rundll32.exe 14 1660 rundll32.exe 15 1660 rundll32.exe 16 1660 rundll32.exe 17 1660 rundll32.exe 18 1660 rundll32.exe 19 1660 rundll32.exe 20 1660 rundll32.exe 21 1660 rundll32.exe 22 1660 rundll32.exe 23 1660 rundll32.exe 24 1660 rundll32.exe 25 1660 rundll32.exe 26 1660 rundll32.exe 27 1660 rundll32.exe 28 1660 rundll32.exe 29 1660 rundll32.exe 30 1660 rundll32.exe 31 1660 rundll32.exe 32 1660 rundll32.exe 33 1660 rundll32.exe 34 1660 rundll32.exe 35 1660 rundll32.exe 36 1660 rundll32.exe 37 1660 rundll32.exe 38 1660 rundll32.exe 39 1660 rundll32.exe 40 1660 rundll32.exe 41 1660 rundll32.exe 42 1660 rundll32.exe 43 1660 rundll32.exe 44 1660 rundll32.exe 45 1660 rundll32.exe 46 1660 rundll32.exe 47 1660 rundll32.exe 48 1660 rundll32.exe 49 1660 rundll32.exe 50 1660 rundll32.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
malware_smoke_1895150882.exedescription pid process target process PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe PID 1956 wrote to memory of 1660 1956 malware_smoke_1895150882.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\malware_smoke_1895150882.exe"C:\Users\Admin\AppData\Local\Temp\malware_smoke_1895150882.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1660-77-0x0000000000170000-0x0000000000172000-memory.dmpFilesize
8KB
-
memory/1660-85-0x0000000000230000-0x0000000000232000-memory.dmpFilesize
8KB
-
memory/1660-88-0x0000000000240000-0x0000000000242000-memory.dmpFilesize
8KB
-
memory/1660-63-0x0000000000090000-0x0000000000092000-memory.dmpFilesize
8KB
-
memory/1660-64-0x00000000000A0000-0x00000000000A2000-memory.dmpFilesize
8KB
-
memory/1660-59-0x00000000002F0000-0x00000000002F2000-memory.dmpFilesize
8KB
-
memory/1660-61-0x0000000000000000-mapping.dmp
-
memory/1660-76-0x0000000000160000-0x0000000000162000-memory.dmpFilesize
8KB
-
memory/1660-84-0x0000000000220000-0x0000000000222000-memory.dmpFilesize
8KB
-
memory/1660-86-0x0000000000240000-0x0000000000242000-memory.dmpFilesize
8KB
-
memory/1660-83-0x00000000001D0000-0x00000000001D2000-memory.dmpFilesize
8KB
-
memory/1660-82-0x00000000001C0000-0x00000000001C2000-memory.dmpFilesize
8KB
-
memory/1660-81-0x00000000001B0000-0x00000000001B2000-memory.dmpFilesize
8KB
-
memory/1660-75-0x0000000000150000-0x0000000000152000-memory.dmpFilesize
8KB
-
memory/1660-79-0x0000000000190000-0x0000000000192000-memory.dmpFilesize
8KB
-
memory/1660-78-0x0000000000180000-0x0000000000182000-memory.dmpFilesize
8KB
-
memory/1660-65-0x00000000000B0000-0x00000000000B2000-memory.dmpFilesize
8KB
-
memory/1660-66-0x00000000000C0000-0x00000000000C2000-memory.dmpFilesize
8KB
-
memory/1660-80-0x00000000001A0000-0x00000000001A2000-memory.dmpFilesize
8KB
-
memory/1660-74-0x0000000000140000-0x0000000000142000-memory.dmpFilesize
8KB
-
memory/1660-73-0x0000000000130000-0x0000000000132000-memory.dmpFilesize
8KB
-
memory/1660-72-0x0000000000120000-0x0000000000122000-memory.dmpFilesize
8KB
-
memory/1660-71-0x0000000000110000-0x0000000000112000-memory.dmpFilesize
8KB
-
memory/1660-70-0x0000000000100000-0x0000000000102000-memory.dmpFilesize
8KB
-
memory/1660-69-0x00000000000F0000-0x00000000000F2000-memory.dmpFilesize
8KB
-
memory/1660-68-0x00000000000E0000-0x00000000000E2000-memory.dmpFilesize
8KB
-
memory/1660-67-0x00000000000D0000-0x00000000000D2000-memory.dmpFilesize
8KB
-
memory/1956-55-0x0000000000670000-0x000000000073A000-memory.dmpFilesize
808KB
-
memory/1956-57-0x0000000000400000-0x00000000005FE000-memory.dmpFilesize
2.0MB
-
memory/1956-58-0x0000000074F01000-0x0000000074F03000-memory.dmpFilesize
8KB
-
memory/1956-54-0x0000000000670000-0x000000000073A000-memory.dmpFilesize
808KB
-
memory/1956-87-0x0000000000400000-0x00000000005FE000-memory.dmpFilesize
2.0MB
-
memory/1956-56-0x0000000001EB0000-0x00000000020A3000-memory.dmpFilesize
1.9MB