Analysis
-
max time kernel
289s -
max time network
317s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12-10-2022 05:26
Static task
static1
Behavioral task
behavioral1
Sample
3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe
Resource
win7-20220812-en
General
-
Target
3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe
-
Size
1.3MB
-
MD5
5e7f14e77375a2684af2efbf2f563e0e
-
SHA1
712ab6e9506e2d681e0f0a7d8bda6932f519153f
-
SHA256
3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8
-
SHA512
9dfead057ae2a253aaa33c030c6be68c3595fd604c80452fa713115bb724a4a55ebe812092ee29382a6de7979cefafe3e6da2e49bded0f3628829473de65cc27
-
SSDEEP
24576:J17E6Hri5ZlI3cj+4K/w9BR1jSQU0rVJhjHmrPZadY6JS+3vTCTKyyPRXCUW:f7E6HG5Zap4QqVHrhmrOJSWSVyPRV
Malware Config
Extracted
danabot
198.15.112.179:443
185.62.56.245:443
153.92.223.225:443
192.119.70.159:443
-
embedded_hash
6618C163D57D6441FCCA65D86C4D380D
-
type
loader
Signatures
-
Blocklisted process makes network request 17 IoCs
flow pid Process 3 1584 rundll32.exe 5 1584 rundll32.exe 6 1584 rundll32.exe 7 1584 rundll32.exe 10 1584 rundll32.exe 11 1584 rundll32.exe 13 1584 rundll32.exe 14 1584 rundll32.exe 15 1584 rundll32.exe 16 1584 rundll32.exe 17 1584 rundll32.exe 18 1584 rundll32.exe 19 1584 rundll32.exe 20 1584 rundll32.exe 21 1584 rundll32.exe 22 1584 rundll32.exe 23 1584 rundll32.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1912 wrote to memory of 992 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 28 PID 1912 wrote to memory of 992 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 28 PID 1912 wrote to memory of 992 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 28 PID 1912 wrote to memory of 992 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 28 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29 PID 1912 wrote to memory of 1584 1912 3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe"C:\Users\Admin\AppData\Local\Temp\3e83ffc07aba1a81fac2a85969c813581ff5083a1b17023bf87817cfba3c1bc8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\AdapterTroubleshooter.exeC:\Windows\system32\AdapterTroubleshooter.exe2⤵PID:992
-
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:1584
-