Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
10-10-2022 14:50
Static task
static1
General
-
Target
fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe
-
Size
1.3MB
-
MD5
a3239e7df1bfb004caf752e494c8eccf
-
SHA1
6b1d840b21a1df3c5ef1c1488f21109cdb4a6c6b
-
SHA256
fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7
-
SHA512
724ac4e3bab9856ae2ae433726c6d3f369881fea36fd28edb19aec04e893006149e0c459128900bd136a439f6149ba8aba5d6d96478bada68d7258b1336f5b3e
-
SSDEEP
24576:UjnHBfXpFET6ubBp3eVp7hzM4uLUC2fANyPQ6s5yir7yu0av6CfgmVpie1QxE+vi:UjnhfXpFET3BpCpdt0l2fSyPClyCfLV8
Malware Config
Extracted
Family
danabot
C2
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
Attributes
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 3584 3828 WerFault.exe 65 2020 3828 WerFault.exe 65 -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3828 wrote to memory of 4784 3828 fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe 66 PID 3828 wrote to memory of 4784 3828 fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe 66 PID 3828 wrote to memory of 4784 3828 fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe 66 PID 3828 wrote to memory of 4656 3828 fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe 69 PID 3828 wrote to memory of 4656 3828 fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe 69 PID 3828 wrote to memory of 4656 3828 fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe 69 PID 3828 wrote to memory of 4656 3828 fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe 69 PID 3828 wrote to memory of 4656 3828 fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe 69 PID 3828 wrote to memory of 4656 3828 fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe 69 PID 3828 wrote to memory of 4656 3828 fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe 69 PID 3828 wrote to memory of 4656 3828 fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe 69 PID 3828 wrote to memory of 4656 3828 fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe 69 PID 3828 wrote to memory of 4656 3828 fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe 69 PID 3828 wrote to memory of 4656 3828 fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe 69 PID 3828 wrote to memory of 4656 3828 fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe 69 PID 3828 wrote to memory of 4656 3828 fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe"C:\Users\Admin\AppData\Local\Temp\fe6e6d5a27213b800e118188f7e0375537ed109c2c5ded0c9e3915f70be64ed7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\appidtel.exeC:\Windows\system32\appidtel.exe2⤵PID:4784
-
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 6042⤵
- Program crash
PID:3584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 5802⤵
- Program crash
PID:2020
-