Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 18:28
Static task
static1
Behavioral task
behavioral1
Sample
54415694e11467be54aa0e5fc0c63ee5.exe
Resource
win7-20231129-en
General
-
Target
54415694e11467be54aa0e5fc0c63ee5.exe
-
Size
1.0MB
-
MD5
54415694e11467be54aa0e5fc0c63ee5
-
SHA1
adb1fa18fc275e98e26660621b74ee188fb0b66b
-
SHA256
1e51f18092d8b33ce540f0be383e973e3bb962de84630144d4a40f70d74551f3
-
SHA512
cebffcba8a75b2cac7ecbca1b62c1e1862f364d24ded2ab4541bb92cd1448bcad30d03b01b3faaf94d1602f56ca1bd720d76da782762df35f90f54191c69ec42
-
SSDEEP
24576:mZlJEIt2wdfQlda/BnHUmdtqqAqMenRFNEuA5u0u5XjO+MG1c:mZ3EIt2wdyElnAqMekiX
Malware Config
Extracted
danabot
5
192.210.222.81:443
23.229.29.48:443
5.9.224.204:443
192.255.166.212:443
-
embedded_hash
100700D372965A717E89B8C909E1D8D4
-
type
loader
Signatures
-
Danabot Loader Component 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\544156~1.DLL DanabotLoader2021 behavioral2/memory/1812-11-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/1812-25-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/1812-26-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 285 1812 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1812 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
54415694e11467be54aa0e5fc0c63ee5.exedescription pid process target process PID 1436 wrote to memory of 1812 1436 54415694e11467be54aa0e5fc0c63ee5.exe rundll32.exe PID 1436 wrote to memory of 1812 1436 54415694e11467be54aa0e5fc0c63ee5.exe rundll32.exe PID 1436 wrote to memory of 1812 1436 54415694e11467be54aa0e5fc0c63ee5.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\54415694e11467be54aa0e5fc0c63ee5.exe"C:\Users\Admin\AppData\Local\Temp\54415694e11467be54aa0e5fc0c63ee5.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\544156~1.DLL,s C:\Users\Admin\AppData\Local\Temp\544156~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\544156~1.DLLFilesize
1.3MB
MD50355b6cd756a4a8cb264ed389e1855f1
SHA19576c92d3fa4989d3194b53346acab139b81ff34
SHA25631a167b2bf229c744f335083b1757f410a5e453e5bac05d9afbac15655e1d7af
SHA512e87b5513035c8cbdb66763efb1c1d128e084b8ef12496126924daa3921bcff60614ea725080031a03ed1c239610f390aea600bb15655e58bacffa295ef63046d
-
memory/1436-2-0x0000000000400000-0x0000000000511000-memory.dmpFilesize
1.1MB
-
memory/1436-10-0x0000000000400000-0x0000000000511000-memory.dmpFilesize
1.1MB
-
memory/1436-22-0x0000000000400000-0x0000000000511000-memory.dmpFilesize
1.1MB
-
memory/1812-11-0x0000000000400000-0x0000000000561000-memory.dmpFilesize
1.4MB
-
memory/1812-25-0x0000000000400000-0x0000000000561000-memory.dmpFilesize
1.4MB
-
memory/1812-26-0x0000000000400000-0x0000000000561000-memory.dmpFilesize
1.4MB