Analysis
-
max time kernel
109s -
max time network
114s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
19/10/2022, 12:35
Static task
static1
General
-
Target
abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe
-
Size
1.3MB
-
MD5
76382b7d0f6adf19177349a6bba70871
-
SHA1
aebd1817e812aba0256e6601dc0d6b50422f6978
-
SHA256
abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af
-
SHA512
905f20366cceb2e6768ce2c918b08f2876a23065517351fc5d6bd67af62297ae3acd77c7083a78b9d83415517dab5fa95a5734536a743ba31c8834848f9e3537
-
SSDEEP
24576:4T0rUloXAX1f/E6Afb7r2kfFDih9OAUPkYuaatFz+cGMmaXG+mu9pjRjdQ5:4TEUOE1PAfJFOh9OAkk9vFRG0vVBdQ5
Malware Config
Extracted
Family
danabot
C2
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
Attributes
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 3796 3040 WerFault.exe 65 1996 3040 WerFault.exe 65 -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 3040 wrote to memory of 4788 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 66 PID 3040 wrote to memory of 4788 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 66 PID 3040 wrote to memory of 4788 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 66 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70 PID 3040 wrote to memory of 4536 3040 abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe"C:\Users\Admin\AppData\Local\Temp\abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\appidtel.exeC:\Windows\system32\appidtel.exe2⤵PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 6122⤵
- Program crash
PID:3796
-
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 6362⤵
- Program crash
PID:1996
-