Malware Analysis Report

2024-11-30 14:44

Sample ID 240107-x195xsdbh6
Target a40b8f61420b24835c93f7974f39a23e.exe
SHA256 f8c983fce1af5b6e17289a88d19a70fb5a67c6bc32d7aa4f3bc3ce1ffcddc282
Tags
danabot 4 banker trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f8c983fce1af5b6e17289a88d19a70fb5a67c6bc32d7aa4f3bc3ce1ffcddc282

Threat Level: Known bad

The file a40b8f61420b24835c93f7974f39a23e.exe was found to be: Known bad.

Malicious Activity Summary

danabot 4 banker trojan

Danabot

Danabot Loader Component

Blocklisted process makes network request

Loads dropped DLL

Program crash

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-01-07 19:20

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-01-07 19:20

Reported

2024-01-07 19:23

Platform

win7-20231215-en

Max time kernel

143s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a40b8f61420b24835c93f7974f39a23e.exe"

Signatures

Danabot

trojan banker danabot

Danabot Loader Component

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a40b8f61420b24835c93f7974f39a23e.exe

"C:\Users\Admin\AppData\Local\Temp\a40b8f61420b24835c93f7974f39a23e.exe"

C:\Windows\SysWOW64\rundll32.exe

C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\A40B8F~1.TMP,S C:\Users\Admin\AppData\Local\Temp\A40B8F~1.EXE

Network

Country Destination Domain Proto
US 142.11.244.124:443 tcp

Files

memory/1936-0-0x0000000001ED0000-0x0000000001FBA000-memory.dmp

memory/1936-1-0x0000000001ED0000-0x0000000001FBA000-memory.dmp

memory/1936-2-0x0000000001FC0000-0x00000000020C0000-memory.dmp

memory/1936-3-0x0000000000400000-0x0000000000547000-memory.dmp

memory/1936-7-0x0000000001FC0000-0x00000000020C0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\A40B8F~1.TMP

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/2856-10-0x00000000008F0000-0x0000000000A4E000-memory.dmp

memory/1936-6-0x0000000000400000-0x0000000000547000-memory.dmp

memory/2856-11-0x00000000008F0000-0x0000000000A4E000-memory.dmp

memory/2856-19-0x00000000008F0000-0x0000000000A4E000-memory.dmp

memory/2856-20-0x00000000008F0000-0x0000000000A4E000-memory.dmp

memory/2856-21-0x00000000008F0000-0x0000000000A4E000-memory.dmp

memory/2856-22-0x00000000008F0000-0x0000000000A4E000-memory.dmp

memory/2856-23-0x00000000008F0000-0x0000000000A4E000-memory.dmp

memory/2856-24-0x00000000008F0000-0x0000000000A4E000-memory.dmp

memory/2856-25-0x00000000008F0000-0x0000000000A4E000-memory.dmp

memory/2856-26-0x00000000008F0000-0x0000000000A4E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-01-07 19:20

Reported

2024-01-07 19:23

Platform

win10v2004-20231215-en

Max time kernel

142s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a40b8f61420b24835c93f7974f39a23e.exe"

Signatures

Danabot

trojan banker danabot

Danabot Loader Component

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a40b8f61420b24835c93f7974f39a23e.exe

"C:\Users\Admin\AppData\Local\Temp\a40b8f61420b24835c93f7974f39a23e.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4784 -ip 4784

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 536

C:\Windows\SysWOW64\rundll32.exe

C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\A40B8F~1.TMP,S C:\Users\Admin\AppData\Local\Temp\A40B8F~1.EXE

Network

Country Destination Domain Proto
US 138.91.171.81:80 tcp
US 8.8.8.8:53 19.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 64.179.17.96.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 100.5.17.2.in-addr.arpa udp
US 8.8.8.8:53 134.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 45.179.17.96.in-addr.arpa udp
US 142.11.244.124:443 tcp
US 8.8.8.8:53 124.244.11.142.in-addr.arpa udp
US 8.8.8.8:53 60.179.17.96.in-addr.arpa udp
US 8.8.8.8:53 28.160.77.104.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp

Files

memory/4784-1-0x00000000021F0000-0x00000000022E4000-memory.dmp

memory/4784-2-0x0000000002350000-0x0000000002450000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\A40B8F~1.EXE.tmp

MD5 2fcb7f519121181adb2eaf66ede0017d
SHA1 bf2b23f518dd9a2d2322d1a1b4ce5e7dffa633bb
SHA256 4777c2f27a596b32b7f4d8541f3516aca4581d10ad6acd5fb0e808642cc6b267
SHA512 b66dea0b2999607e126f9c3dce496af4f31366ded02bf21458f49901d995313ac41e331ba5508208faa582d21d3af8fe80c18132f238e159bce7b18fd6a992c4

C:\Users\Admin\AppData\Local\Temp\A40B8F~1.TMP

MD5 7b5ede02c3ea81de3ff0c52ee4917e88
SHA1 8bae4a5175a4d8083a8e3b1acd61f8c05d9e45c2
SHA256 4858068018bc59007a87e7d982ec0550e733670473e5da66fae3ce55db932972
SHA512 5df573ba56ea6aca8b102ea76e30caad4b547b5f6816a3538d06bc501e5e1fef5ee880c8487712411a6fba7412194ebe3d32619b15e4a4894969b18d54c19cf0

memory/4784-3-0x0000000000400000-0x0000000000547000-memory.dmp

memory/4784-9-0x0000000002350000-0x0000000002450000-memory.dmp

memory/4784-8-0x0000000000400000-0x0000000000547000-memory.dmp

memory/2076-10-0x0000000000400000-0x000000000055E000-memory.dmp

memory/2076-18-0x0000000000400000-0x000000000055E000-memory.dmp

memory/2076-19-0x0000000000400000-0x000000000055E000-memory.dmp

memory/2076-20-0x0000000000400000-0x000000000055E000-memory.dmp

memory/2076-21-0x0000000000400000-0x000000000055E000-memory.dmp

memory/2076-22-0x0000000000400000-0x000000000055E000-memory.dmp

memory/2076-23-0x0000000000400000-0x000000000055E000-memory.dmp

memory/2076-24-0x0000000000400000-0x000000000055E000-memory.dmp

memory/2076-25-0x0000000000400000-0x000000000055E000-memory.dmp