Analysis
-
max time kernel
147s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 10:32
Static task
static1
Behavioral task
behavioral1
Sample
07828a66286c07d883d03fbac1c7d628.exe
Resource
win7-20231215-en
General
-
Target
07828a66286c07d883d03fbac1c7d628.exe
-
Size
1.1MB
-
MD5
07828a66286c07d883d03fbac1c7d628
-
SHA1
64721c7e154f07841dd2e30a95dcf3a23033590f
-
SHA256
79c78c566a3eef320ab9b6df4da247462250acd908e98be22461929b3fe4ec39
-
SHA512
2c9638990c8088442d2847f3f45d7ccebeed4d0bef0a52f7761a8a4e81be53e683aa3350c617456e10c4d4bb18a205627f7b7169d1f69330cb57a2c5e13cfd6f
-
SSDEEP
24576:rhxjcpMRNv57ENuzPFUob5/qFKGtd8HjW0YBXoX+jE:rNR77EoX5/qwGjk+Y+jE
Malware Config
Extracted
danabot
4
142.11.192.232:443
192.119.110.73:443
142.11.242.31:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Signatures
-
Danabot Loader Component 11 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\07828A~1.DLL DanabotLoader2021 C:\Users\Admin\AppData\Local\Temp\07828A~1.EXE.dll DanabotLoader2021 behavioral2/memory/3544-10-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3544-18-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3544-19-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3544-20-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3544-21-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3544-22-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3544-23-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3544-24-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3544-25-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 55 3544 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3544 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2044 3492 WerFault.exe 07828a66286c07d883d03fbac1c7d628.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
07828a66286c07d883d03fbac1c7d628.exedescription pid process target process PID 3492 wrote to memory of 3544 3492 07828a66286c07d883d03fbac1c7d628.exe rundll32.exe PID 3492 wrote to memory of 3544 3492 07828a66286c07d883d03fbac1c7d628.exe rundll32.exe PID 3492 wrote to memory of 3544 3492 07828a66286c07d883d03fbac1c7d628.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07828a66286c07d883d03fbac1c7d628.exe"C:\Users\Admin\AppData\Local\Temp\07828a66286c07d883d03fbac1c7d628.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\07828A~1.DLL,s C:\Users\Admin\AppData\Local\Temp\07828A~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 4442⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3492 -ip 34921⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\07828A~1.DLLFilesize
972KB
MD52283d4a369852960860f0ca7ddddda64
SHA1fceacc1ee4cdd063797ec8fc0de457aa01b74627
SHA2561894be690fbf48707b7d41421237a051567943fe90ad08073733912d1c568323
SHA5123340fd25972dea22ad64867aa8c0c65a9fd1d1ebbfcb047a6b92a73f638d61e3aa048f628ac760ffad45571a1ae24ccc07a066c97d7ba9721e26fe30f945bd44
-
C:\Users\Admin\AppData\Local\Temp\07828A~1.EXE.dllFilesize
1022KB
MD5f4832305a9306f0745577839aa158b0a
SHA141c5f6650df38b78a50e4a2a218d46fb8a3105cf
SHA25676bcdf51b3d1815bc56752f8451adcede20a2ceb4172e6e5882843d0ee3aa0c9
SHA512fb0c8f197eea0f1e339a2808edb0c6e9b8369329980af0b47c8983565de2b466a02cef839c52bc26b72ddce441a1842cc44248942fcabfa77b0651d71ee131d3
-
memory/3492-1-0x0000000000B50000-0x0000000000C47000-memory.dmpFilesize
988KB
-
memory/3492-2-0x0000000000E00000-0x0000000000F05000-memory.dmpFilesize
1.0MB
-
memory/3492-3-0x0000000000400000-0x000000000094F000-memory.dmpFilesize
5.3MB
-
memory/3492-8-0x0000000000400000-0x000000000094F000-memory.dmpFilesize
5.3MB
-
memory/3492-9-0x0000000000E00000-0x0000000000F05000-memory.dmpFilesize
1.0MB
-
memory/3544-18-0x0000000000400000-0x0000000000561000-memory.dmpFilesize
1.4MB
-
memory/3544-10-0x0000000000400000-0x0000000000561000-memory.dmpFilesize
1.4MB
-
memory/3544-19-0x0000000000400000-0x0000000000561000-memory.dmpFilesize
1.4MB
-
memory/3544-20-0x0000000000400000-0x0000000000561000-memory.dmpFilesize
1.4MB
-
memory/3544-21-0x0000000000400000-0x0000000000561000-memory.dmpFilesize
1.4MB
-
memory/3544-22-0x0000000000400000-0x0000000000561000-memory.dmpFilesize
1.4MB
-
memory/3544-23-0x0000000000400000-0x0000000000561000-memory.dmpFilesize
1.4MB
-
memory/3544-24-0x0000000000400000-0x0000000000561000-memory.dmpFilesize
1.4MB
-
memory/3544-25-0x0000000000400000-0x0000000000561000-memory.dmpFilesize
1.4MB