Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-01-2024 04:24
Static task
static1
Behavioral task
behavioral1
Sample
7ee0c1c8f76bd87982f5e238d7cf44d3.exe
Resource
win7-20231215-en
General
-
Target
7ee0c1c8f76bd87982f5e238d7cf44d3.exe
-
Size
1.1MB
-
MD5
7ee0c1c8f76bd87982f5e238d7cf44d3
-
SHA1
6f476c2ac0b7e83605ed9eeafdd0461c807240ac
-
SHA256
987f20ff829ea4c324d87ca9b55860111b827d0fdb01499bb704074d9d220016
-
SHA512
a0eefc162bd60a1c7a6770f9b017a94ba185c9802acb975f56372026851b1fff5192f5faed61aff1a4854587c5941fd1456821621fc72bf6fdc0f46e379ed06c
-
SSDEEP
24576:27l+B6syClv2eGZCFNJ0/CuDOAzKskZJFdyjxzpJDgmvNsXL:eRCl9GZqs/CgxyFI17kmvaXL
Malware Config
Extracted
danabot
4
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 2980 rundll32.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
7ee0c1c8f76bd87982f5e238d7cf44d3.exedescription pid process target process PID 3012 wrote to memory of 2980 3012 7ee0c1c8f76bd87982f5e238d7cf44d3.exe rundll32.exe PID 3012 wrote to memory of 2980 3012 7ee0c1c8f76bd87982f5e238d7cf44d3.exe rundll32.exe PID 3012 wrote to memory of 2980 3012 7ee0c1c8f76bd87982f5e238d7cf44d3.exe rundll32.exe PID 3012 wrote to memory of 2980 3012 7ee0c1c8f76bd87982f5e238d7cf44d3.exe rundll32.exe PID 3012 wrote to memory of 2980 3012 7ee0c1c8f76bd87982f5e238d7cf44d3.exe rundll32.exe PID 3012 wrote to memory of 2980 3012 7ee0c1c8f76bd87982f5e238d7cf44d3.exe rundll32.exe PID 3012 wrote to memory of 2980 3012 7ee0c1c8f76bd87982f5e238d7cf44d3.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ee0c1c8f76bd87982f5e238d7cf44d3.exe"C:\Users\Admin\AppData\Local\Temp\7ee0c1c8f76bd87982f5e238d7cf44d3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\7EE0C1~1.DLL,s C:\Users\Admin\AppData\Local\Temp\7EE0C1~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2980
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
857KB
MD5ff8e1b1d905f4e3e92f9844192d7cb36
SHA18278a8bd4d5d4b4883872f6939938f4a16ae8066
SHA256195901fd26584a95e7851f93df8d21bb51328dad8c4eb2e92bdbae220ab018d6
SHA5127053f9021026d10f06cb7ee7b6880b6d8cfdfac46f89bb4e128ee3d6c5e321f9d9639394be739e819172ca03ebeb2be89af949fce8eb64f798bb00f9d09842ba
-
Filesize
200KB
MD55caf1eb57c3efd67b774c509c43739a1
SHA17d84ff3efbf98b024d5886322cd32de96f9aed94
SHA25603cab90f7e002834e22cc826e01c37f1d81623e9f65e5dfab6ab591fc54f99f7
SHA5127dae6c9452def66d2af95d7810fc56e87b245a700b246c6d8bcd396c57bd6fc3f6b9157f3b6a59694ad478fc32d2fd30eb1c923000e762eae90a7e984298e7d0
-
Filesize
129KB
MD5d016f3e44b1e9e0c2ac74dea34a1d392
SHA13991345c926597a96b90c23a8111d37cbf744433
SHA2562725fc65da527a545f4b8a31a959c290048254d828e745434e11d1f610f90a4c
SHA512307fa3e0c246a64b5e3545cec225b7be307855fea3681be1f4095e3a40198357a9be2d891a5b17ca4f5713b1d69b985f448a63e3453834d30a971c9b59c56da9
-
Filesize
123KB
MD5295dc34770ba49bcb23f9c80eea7830f
SHA1a5eed3d00ebc06242943d736dcb04681c633c62d
SHA2566f4cfaa9d6647c81b5f190381c956aa27c57e69ae94e121aefb15adbe30a8346
SHA5126fd011e393a7d809e8cee90d3eae1149caa5b37ba24030ff310c949217c8b4cc2a066890188634140487d9f0d01957d54b154e983ee1cf83be466ef5a8adb511
-
Filesize
125KB
MD56ec6a40190161b95c184941d28d5efd6
SHA118a8f39396b713f9287dc24fb7170d86f48eb5a4
SHA25619495a3aac0f4cdc06aab461ccf5d10922764266de594b5b627d8c25475f6f78
SHA5127cc63910f6e70355cc6bd7ef4e7a16cb5e26c4529371bf944c16c09afa12fc5a5ac90bf6148378191a9fa15b874d563b91b332e9c573576ac62bd1427414171e