Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
15-10-2022 13:40
Static task
static1
General
-
Target
7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe
-
Size
1.3MB
-
MD5
e485a261c9368af069b3cb7582030fa9
-
SHA1
89723ca58ae2b6d40f75cb3a0bedb3afc85e894b
-
SHA256
7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0
-
SHA512
611d8aa204f0abd8d760e28b191642d9039ca7a56f1880818bd9d5f307652a5df61c35f109e6cdef717158a1caca4c4e3460eba70a402433c08227051e332ce4
-
SSDEEP
24576:M8pCIlF/FcqUyzcIWSGYhWQSB/WNEfQ+z5aENSqIlLUNfA8AZmz6/SLRVP1/Ufmc:3/PU0W3YqWNe1KflUmtZmW/0NclTjbj
Malware Config
Extracted
Family
danabot
C2
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
Attributes
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 348 2772 WerFault.exe 65 1120 2772 WerFault.exe 65 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2772 wrote to memory of 4756 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 66 PID 2772 wrote to memory of 4756 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 66 PID 2772 wrote to memory of 4756 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 66 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70 PID 2772 wrote to memory of 4204 2772 7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe"C:\Users\Admin\AppData\Local\Temp\7cdcea9fb45bdbbf0019db23d02628e7aabd68695d532a74961bafaf871788d0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\appidtel.exeC:\Windows\system32\appidtel.exe2⤵PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 6162⤵
- Program crash
PID:348
-
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 5882⤵
- Program crash
PID:1120
-