Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2024 14:52
Static task
static1
Behavioral task
behavioral1
Sample
6ab90e18ff874ea42ede213f7c09da53.dll
Resource
win7-20231215-en
General
-
Target
6ab90e18ff874ea42ede213f7c09da53.dll
-
Size
1.5MB
-
MD5
6ab90e18ff874ea42ede213f7c09da53
-
SHA1
d7ebf67c32c5f61f73902206bbc770b1e9088b38
-
SHA256
4736d24aa94d36bbcce3e251bb39cde25e85440460fba55b4ae959fced09557e
-
SHA512
05e195e3baee9104cde2821fa227e028a3da831f57a0b9b9706226717500aa415243407c073c8d2011c000e1c4d1c5d4136c2215636e0d07b775dd817c166d6b
-
SSDEEP
24576:NiefPX096ZbBI9a2V/YZTShjCfAFJcNsF5KiIBuZ0vbFaiLWsqPACEoGgt:Ieff+689a2V/YhYjuAFigOBuZ0jwqWAs
Malware Config
Extracted
danabot
11
35.226.27.224:443
178.62.118.134:443
34.129.5.173:443
-
embedded_hash
3492DFC41EECF90D1A225ED6289D9813
-
type
loader
Signatures
-
Danabot Loader Component 16 IoCs
Processes:
resource yara_rule behavioral2/memory/3812-2-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/3812-3-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/3812-4-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/3812-5-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/3812-7-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/3812-8-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/3812-9-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/3812-10-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/3812-11-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/3812-12-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/3812-13-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/3812-14-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/3812-15-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/3812-16-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/3812-17-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/3812-18-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4064 wrote to memory of 3812 4064 regsvr32.exe regsvr32.exe PID 4064 wrote to memory of 3812 4064 regsvr32.exe regsvr32.exe PID 4064 wrote to memory of 3812 4064 regsvr32.exe regsvr32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3812-0-0x0000000010000000-0x0000000010235000-memory.dmpFilesize
2.2MB
-
memory/3812-1-0x0000000000990000-0x0000000000991000-memory.dmpFilesize
4KB
-
memory/3812-2-0x0000000010000000-0x0000000010235000-memory.dmpFilesize
2.2MB
-
memory/3812-3-0x0000000010000000-0x0000000010235000-memory.dmpFilesize
2.2MB
-
memory/3812-4-0x0000000010000000-0x0000000010235000-memory.dmpFilesize
2.2MB
-
memory/3812-5-0x0000000010000000-0x0000000010235000-memory.dmpFilesize
2.2MB
-
memory/3812-6-0x0000000000990000-0x0000000000991000-memory.dmpFilesize
4KB
-
memory/3812-7-0x0000000010000000-0x0000000010235000-memory.dmpFilesize
2.2MB
-
memory/3812-8-0x0000000010000000-0x0000000010235000-memory.dmpFilesize
2.2MB
-
memory/3812-9-0x0000000010000000-0x0000000010235000-memory.dmpFilesize
2.2MB
-
memory/3812-10-0x0000000010000000-0x0000000010235000-memory.dmpFilesize
2.2MB
-
memory/3812-11-0x0000000010000000-0x0000000010235000-memory.dmpFilesize
2.2MB
-
memory/3812-12-0x0000000010000000-0x0000000010235000-memory.dmpFilesize
2.2MB
-
memory/3812-13-0x0000000010000000-0x0000000010235000-memory.dmpFilesize
2.2MB
-
memory/3812-14-0x0000000010000000-0x0000000010235000-memory.dmpFilesize
2.2MB
-
memory/3812-15-0x0000000010000000-0x0000000010235000-memory.dmpFilesize
2.2MB
-
memory/3812-16-0x0000000010000000-0x0000000010235000-memory.dmpFilesize
2.2MB
-
memory/3812-17-0x0000000010000000-0x0000000010235000-memory.dmpFilesize
2.2MB
-
memory/3812-18-0x0000000010000000-0x0000000010235000-memory.dmpFilesize
2.2MB