Analysis
-
max time kernel
84s -
max time network
59s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
06/10/2022, 15:02
Static task
static1
General
-
Target
99ff77d2dd4c686a7e9b1a1c64187b97e9e5631b9e72bbd88d16ab0c94bc78c3.exe
-
Size
4.5MB
-
MD5
b359054ea037356741088d19fe85c353
-
SHA1
005a81a52243baed19f7c6cf61b461f09eaa7ef0
-
SHA256
99ff77d2dd4c686a7e9b1a1c64187b97e9e5631b9e72bbd88d16ab0c94bc78c3
-
SHA512
54b14d73c914082cb7179e114963bfccb6424b0ec3d6ea3414284cb1208b4fcd9651fd44f28b1e3ab9bc2cf547a680ffe3990ff11d110770ae6d4b8f04c59f6e
-
SSDEEP
98304:ENJssLJHPIEBnh9+vNsCfkSdWJymnokAg32VU1iCj1sT/Yusl:Es4tPjnh968YgokA3Z5sl
Malware Config
Extracted
Family
danabot
Attributes
-
embedded_hash
EAD30BF58E340E9E105B328F524565E0
-
type
loader
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3068 wrote to memory of 3952 3068 99ff77d2dd4c686a7e9b1a1c64187b97e9e5631b9e72bbd88d16ab0c94bc78c3.exe 66 PID 3068 wrote to memory of 3952 3068 99ff77d2dd4c686a7e9b1a1c64187b97e9e5631b9e72bbd88d16ab0c94bc78c3.exe 66 PID 3068 wrote to memory of 3952 3068 99ff77d2dd4c686a7e9b1a1c64187b97e9e5631b9e72bbd88d16ab0c94bc78c3.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\99ff77d2dd4c686a7e9b1a1c64187b97e9e5631b9e72bbd88d16ab0c94bc78c3.exe"C:\Users\Admin\AppData\Local\Temp\99ff77d2dd4c686a7e9b1a1c64187b97e9e5631b9e72bbd88d16ab0c94bc78c3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\appidtel.exeC:\Windows\system32\appidtel.exe2⤵PID:3952
-