Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 10:32
Static task
static1
Behavioral task
behavioral1
Sample
07828a66286c07d883d03fbac1c7d628.exe
Resource
win7-20231215-en
General
-
Target
07828a66286c07d883d03fbac1c7d628.exe
-
Size
1.1MB
-
MD5
07828a66286c07d883d03fbac1c7d628
-
SHA1
64721c7e154f07841dd2e30a95dcf3a23033590f
-
SHA256
79c78c566a3eef320ab9b6df4da247462250acd908e98be22461929b3fe4ec39
-
SHA512
2c9638990c8088442d2847f3f45d7ccebeed4d0bef0a52f7761a8a4e81be53e683aa3350c617456e10c4d4bb18a205627f7b7169d1f69330cb57a2c5e13cfd6f
-
SSDEEP
24576:rhxjcpMRNv57ENuzPFUob5/qFKGtd8HjW0YBXoX+jE:rNR77EoX5/qwGjk+Y+jE
Malware Config
Extracted
danabot
4
142.11.192.232:443
192.119.110.73:443
142.11.242.31:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Signatures
-
Danabot Loader Component 11 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\07828A~1.DLL DanabotLoader2021 behavioral1/memory/1720-13-0x0000000000550000-0x00000000006B1000-memory.dmp DanabotLoader2021 behavioral1/memory/1720-14-0x0000000000550000-0x00000000006B1000-memory.dmp DanabotLoader2021 behavioral1/memory/1720-22-0x0000000000550000-0x00000000006B1000-memory.dmp DanabotLoader2021 behavioral1/memory/1720-23-0x0000000000550000-0x00000000006B1000-memory.dmp DanabotLoader2021 behavioral1/memory/1720-24-0x0000000000550000-0x00000000006B1000-memory.dmp DanabotLoader2021 behavioral1/memory/1720-25-0x0000000000550000-0x00000000006B1000-memory.dmp DanabotLoader2021 behavioral1/memory/1720-26-0x0000000000550000-0x00000000006B1000-memory.dmp DanabotLoader2021 behavioral1/memory/1720-27-0x0000000000550000-0x00000000006B1000-memory.dmp DanabotLoader2021 behavioral1/memory/1720-28-0x0000000000550000-0x00000000006B1000-memory.dmp DanabotLoader2021 behavioral1/memory/1720-29-0x0000000000550000-0x00000000006B1000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1720 rundll32.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 1720 rundll32.exe 1720 rundll32.exe 1720 rundll32.exe 1720 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
07828a66286c07d883d03fbac1c7d628.exedescription pid process target process PID 1572 wrote to memory of 1720 1572 07828a66286c07d883d03fbac1c7d628.exe rundll32.exe PID 1572 wrote to memory of 1720 1572 07828a66286c07d883d03fbac1c7d628.exe rundll32.exe PID 1572 wrote to memory of 1720 1572 07828a66286c07d883d03fbac1c7d628.exe rundll32.exe PID 1572 wrote to memory of 1720 1572 07828a66286c07d883d03fbac1c7d628.exe rundll32.exe PID 1572 wrote to memory of 1720 1572 07828a66286c07d883d03fbac1c7d628.exe rundll32.exe PID 1572 wrote to memory of 1720 1572 07828a66286c07d883d03fbac1c7d628.exe rundll32.exe PID 1572 wrote to memory of 1720 1572 07828a66286c07d883d03fbac1c7d628.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07828a66286c07d883d03fbac1c7d628.exe"C:\Users\Admin\AppData\Local\Temp\07828a66286c07d883d03fbac1c7d628.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\07828A~1.DLL,s C:\Users\Admin\AppData\Local\Temp\07828A~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\07828A~1.DLLFilesize
1.3MB
MD53c0e7683048f8b9fa2e994bac9f0cdd6
SHA12465736294a69d6527b204bb13df01a4f187382f
SHA2561e42a88d963e3855f106ca031aece2f473e816e5060fef59a0221fde58fd0ca8
SHA51242ac823111f489fc89b469e615a1ee0abfdafe48569d43c0045a5a33f85181e07e8cb6b9c20477a7b97c0d19ac26055437ff6a339b2775ab09f621525a7bad79
-
memory/1572-0-0x00000000009C0000-0x0000000000AAE000-memory.dmpFilesize
952KB
-
memory/1572-1-0x00000000009C0000-0x0000000000AAE000-memory.dmpFilesize
952KB
-
memory/1572-2-0x0000000000B60000-0x0000000000C65000-memory.dmpFilesize
1.0MB
-
memory/1572-3-0x0000000000400000-0x000000000094F000-memory.dmpFilesize
5.3MB
-
memory/1572-6-0x0000000000400000-0x000000000094F000-memory.dmpFilesize
5.3MB
-
memory/1572-7-0x0000000000B60000-0x0000000000C65000-memory.dmpFilesize
1.0MB
-
memory/1720-14-0x0000000000550000-0x00000000006B1000-memory.dmpFilesize
1.4MB
-
memory/1720-13-0x0000000000550000-0x00000000006B1000-memory.dmpFilesize
1.4MB
-
memory/1720-22-0x0000000000550000-0x00000000006B1000-memory.dmpFilesize
1.4MB
-
memory/1720-23-0x0000000000550000-0x00000000006B1000-memory.dmpFilesize
1.4MB
-
memory/1720-24-0x0000000000550000-0x00000000006B1000-memory.dmpFilesize
1.4MB
-
memory/1720-25-0x0000000000550000-0x00000000006B1000-memory.dmpFilesize
1.4MB
-
memory/1720-26-0x0000000000550000-0x00000000006B1000-memory.dmpFilesize
1.4MB
-
memory/1720-27-0x0000000000550000-0x00000000006B1000-memory.dmpFilesize
1.4MB
-
memory/1720-28-0x0000000000550000-0x00000000006B1000-memory.dmpFilesize
1.4MB
-
memory/1720-29-0x0000000000550000-0x00000000006B1000-memory.dmpFilesize
1.4MB