Analysis Overview
SHA256
f8c983fce1af5b6e17289a88d19a70fb5a67c6bc32d7aa4f3bc3ce1ffcddc282
Threat Level: Known bad
The file a40b8f61420b24835c93f7974f39a23e.exe was found to be: Known bad.
Malicious Activity Summary
Danabot
Danabot Loader Component
Blocklisted process makes network request
Loads dropped DLL
Program crash
Unsigned PE
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-01-07 19:20
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-01-07 19:20
Reported
2024-01-07 19:23
Platform
win7-20231215-en
Max time kernel
143s
Max time network
124s
Command Line
Signatures
Danabot
Danabot Loader Component
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\a40b8f61420b24835c93f7974f39a23e.exe
"C:\Users\Admin\AppData\Local\Temp\a40b8f61420b24835c93f7974f39a23e.exe"
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\A40B8F~1.TMP,S C:\Users\Admin\AppData\Local\Temp\A40B8F~1.EXE
Network
| Country | Destination | Domain | Proto |
| US | 142.11.244.124:443 | tcp |
Files
memory/1936-0-0x0000000001ED0000-0x0000000001FBA000-memory.dmp
memory/1936-1-0x0000000001ED0000-0x0000000001FBA000-memory.dmp
memory/1936-2-0x0000000001FC0000-0x00000000020C0000-memory.dmp
memory/1936-3-0x0000000000400000-0x0000000000547000-memory.dmp
memory/1936-7-0x0000000001FC0000-0x00000000020C0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\A40B8F~1.TMP
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
memory/2856-10-0x00000000008F0000-0x0000000000A4E000-memory.dmp
memory/1936-6-0x0000000000400000-0x0000000000547000-memory.dmp
memory/2856-11-0x00000000008F0000-0x0000000000A4E000-memory.dmp
memory/2856-19-0x00000000008F0000-0x0000000000A4E000-memory.dmp
memory/2856-20-0x00000000008F0000-0x0000000000A4E000-memory.dmp
memory/2856-21-0x00000000008F0000-0x0000000000A4E000-memory.dmp
memory/2856-22-0x00000000008F0000-0x0000000000A4E000-memory.dmp
memory/2856-23-0x00000000008F0000-0x0000000000A4E000-memory.dmp
memory/2856-24-0x00000000008F0000-0x0000000000A4E000-memory.dmp
memory/2856-25-0x00000000008F0000-0x0000000000A4E000-memory.dmp
memory/2856-26-0x00000000008F0000-0x0000000000A4E000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-01-07 19:20
Reported
2024-01-07 19:23
Platform
win10v2004-20231215-en
Max time kernel
142s
Max time network
152s
Command Line
Signatures
Danabot
Danabot Loader Component
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\a40b8f61420b24835c93f7974f39a23e.exe |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4784 wrote to memory of 2076 | N/A | C:\Users\Admin\AppData\Local\Temp\a40b8f61420b24835c93f7974f39a23e.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4784 wrote to memory of 2076 | N/A | C:\Users\Admin\AppData\Local\Temp\a40b8f61420b24835c93f7974f39a23e.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4784 wrote to memory of 2076 | N/A | C:\Users\Admin\AppData\Local\Temp\a40b8f61420b24835c93f7974f39a23e.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\a40b8f61420b24835c93f7974f39a23e.exe
"C:\Users\Admin\AppData\Local\Temp\a40b8f61420b24835c93f7974f39a23e.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4784 -ip 4784
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 536
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\A40B8F~1.TMP,S C:\Users\Admin\AppData\Local\Temp\A40B8F~1.EXE
Network
| Country | Destination | Domain | Proto |
| US | 138.91.171.81:80 | tcp | |
| US | 8.8.8.8:53 | 19.177.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 146.78.124.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 64.179.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.200:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 59.128.231.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 100.5.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.71.91.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 119.110.54.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 45.179.17.96.in-addr.arpa | udp |
| US | 142.11.244.124:443 | tcp | |
| US | 8.8.8.8:53 | 124.244.11.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 60.179.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.160.77.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
Files
memory/4784-1-0x00000000021F0000-0x00000000022E4000-memory.dmp
memory/4784-2-0x0000000002350000-0x0000000002450000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\A40B8F~1.EXE.tmp
| MD5 | 2fcb7f519121181adb2eaf66ede0017d |
| SHA1 | bf2b23f518dd9a2d2322d1a1b4ce5e7dffa633bb |
| SHA256 | 4777c2f27a596b32b7f4d8541f3516aca4581d10ad6acd5fb0e808642cc6b267 |
| SHA512 | b66dea0b2999607e126f9c3dce496af4f31366ded02bf21458f49901d995313ac41e331ba5508208faa582d21d3af8fe80c18132f238e159bce7b18fd6a992c4 |
C:\Users\Admin\AppData\Local\Temp\A40B8F~1.TMP
| MD5 | 7b5ede02c3ea81de3ff0c52ee4917e88 |
| SHA1 | 8bae4a5175a4d8083a8e3b1acd61f8c05d9e45c2 |
| SHA256 | 4858068018bc59007a87e7d982ec0550e733670473e5da66fae3ce55db932972 |
| SHA512 | 5df573ba56ea6aca8b102ea76e30caad4b547b5f6816a3538d06bc501e5e1fef5ee880c8487712411a6fba7412194ebe3d32619b15e4a4894969b18d54c19cf0 |
memory/4784-3-0x0000000000400000-0x0000000000547000-memory.dmp
memory/4784-9-0x0000000002350000-0x0000000002450000-memory.dmp
memory/4784-8-0x0000000000400000-0x0000000000547000-memory.dmp
memory/2076-10-0x0000000000400000-0x000000000055E000-memory.dmp
memory/2076-18-0x0000000000400000-0x000000000055E000-memory.dmp
memory/2076-19-0x0000000000400000-0x000000000055E000-memory.dmp
memory/2076-20-0x0000000000400000-0x000000000055E000-memory.dmp
memory/2076-21-0x0000000000400000-0x000000000055E000-memory.dmp
memory/2076-22-0x0000000000400000-0x000000000055E000-memory.dmp
memory/2076-23-0x0000000000400000-0x000000000055E000-memory.dmp
memory/2076-24-0x0000000000400000-0x000000000055E000-memory.dmp
memory/2076-25-0x0000000000400000-0x000000000055E000-memory.dmp