Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-01-2024 16:36
Static task
static1
Behavioral task
behavioral1
Sample
7abd12f4c0935b02395fed41d3eabb22.exe
Resource
win7-20231215-en
General
-
Target
7abd12f4c0935b02395fed41d3eabb22.exe
-
Size
1.1MB
-
MD5
7abd12f4c0935b02395fed41d3eabb22
-
SHA1
ce09d720002bb05e8c0353dcd472c5cd10ce49df
-
SHA256
d3657dd474e857255ae3ea6f0faabb6f9a6f7bf77423042e5eb827a9cb72d17a
-
SHA512
edb16078ae88ee21306a7c3737a5dc67fc3a32483edd28fc78f95b578f9c3cd0003ad3c61d595a6177ae652528cc423b43bcb7bc890862025aac862b14c01fc3
-
SSDEEP
24576:5j3U3V+/lHGb+KKbLJzh7pgyB92I4cl6vZPMUgl:58MphbLJztlcI4Yccl
Malware Config
Extracted
danabot
4
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Signatures
-
Danabot Loader Component 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7ABD12~1.DLL DanabotLoader2021 behavioral1/memory/2364-19-0x00000000021C0000-0x0000000002322000-memory.dmp DanabotLoader2021 behavioral1/memory/2364-21-0x00000000021C0000-0x0000000002322000-memory.dmp DanabotLoader2021 behavioral1/memory/2364-33-0x00000000021C0000-0x0000000002322000-memory.dmp DanabotLoader2021 behavioral1/memory/2364-34-0x00000000021C0000-0x0000000002322000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 2364 rundll32.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
7abd12f4c0935b02395fed41d3eabb22.exedescription pid process target process PID 1236 wrote to memory of 2364 1236 7abd12f4c0935b02395fed41d3eabb22.exe rundll32.exe PID 1236 wrote to memory of 2364 1236 7abd12f4c0935b02395fed41d3eabb22.exe rundll32.exe PID 1236 wrote to memory of 2364 1236 7abd12f4c0935b02395fed41d3eabb22.exe rundll32.exe PID 1236 wrote to memory of 2364 1236 7abd12f4c0935b02395fed41d3eabb22.exe rundll32.exe PID 1236 wrote to memory of 2364 1236 7abd12f4c0935b02395fed41d3eabb22.exe rundll32.exe PID 1236 wrote to memory of 2364 1236 7abd12f4c0935b02395fed41d3eabb22.exe rundll32.exe PID 1236 wrote to memory of 2364 1236 7abd12f4c0935b02395fed41d3eabb22.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7abd12f4c0935b02395fed41d3eabb22.exe"C:\Users\Admin\AppData\Local\Temp\7abd12f4c0935b02395fed41d3eabb22.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\7ABD12~1.DLL,s C:\Users\Admin\AppData\Local\Temp\7ABD12~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2364
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD54f87d546bc12eb3f5e062c9af64714a9
SHA124af09bea214cf8930b9a16de11161a997e1f00d
SHA2567fadb01015e2bae0bfa054d48490814d64becee47d072d81bce43da6987f09d0
SHA5120022878fb7c7d25ac8a6963c06634720326743e640381ac280c22986747af6c34e366fdb420a7607d2d11526d890f5072b0e9265bce172ed2cb277d4159f80b1