Analysis
-
max time kernel
288s -
max time network
302s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12-10-2022 05:29
Static task
static1
Behavioral task
behavioral1
Sample
6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
300 seconds
General
-
Target
6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe
-
Size
1.2MB
-
MD5
e70c8bbbd8faa7cb8fb555f6bbe98a12
-
SHA1
c6c1d1fa31fe1d2906ef7837c1151a1d13a80679
-
SHA256
6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960
-
SHA512
3029d003a4d59dff4549959a030407f47136cfd8b85c985bd55aa800590579e95183d50de740c09cacc7fe2e9113d162c3b1296d7b2dff679c4a77ab7aded0ef
-
SSDEEP
24576:xImPENtb1LF4cCysOYImXOO9u8TFYFfZd4rj9YlmAxOZppvOGTJ/u:xLsfAIo40S9ZeRkmAxOHpvOG1G
Malware Config
Extracted
Family
danabot
C2
198.15.112.179:443
185.62.56.245:443
153.92.223.225:443
192.119.70.159:443
Attributes
-
embedded_hash
6618C163D57D6441FCCA65D86C4D380D
-
type
loader
Signatures
-
Blocklisted process makes network request 17 IoCs
flow pid Process 3 1716 rundll32.exe 5 1716 rundll32.exe 6 1716 rundll32.exe 7 1716 rundll32.exe 10 1716 rundll32.exe 11 1716 rundll32.exe 13 1716 rundll32.exe 14 1716 rundll32.exe 15 1716 rundll32.exe 16 1716 rundll32.exe 17 1716 rundll32.exe 18 1716 rundll32.exe 19 1716 rundll32.exe 20 1716 rundll32.exe 21 1716 rundll32.exe 22 1716 rundll32.exe 23 1716 rundll32.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1672 wrote to memory of 696 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 27 PID 1672 wrote to memory of 696 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 27 PID 1672 wrote to memory of 696 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 27 PID 1672 wrote to memory of 696 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 27 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28 PID 1672 wrote to memory of 1716 1672 6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe"C:\Users\Admin\AppData\Local\Temp\6563565af9b7b4e106e8687f64a80922b10dc33e3f4020b07b8b640575d35960.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\AdapterTroubleshooter.exeC:\Windows\system32\AdapterTroubleshooter.exe2⤵PID:696
-
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:1716
-