Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-01-2024 00:09
Behavioral task
behavioral1
Sample
813777679e335833f55a26be8703cdfe.dll
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
813777679e335833f55a26be8703cdfe.dll
-
Size
1.3MB
-
MD5
813777679e335833f55a26be8703cdfe
-
SHA1
b507fa5808389ffcad69491899ef9693b853e116
-
SHA256
ebb10d92e26aa37bed1933b8726cba0379e044f989619d4077d39739b1792c17
-
SHA512
fe7f32cf02e0470a66f86d3423087acbcc8bbc2c3d39f6eeb013d5bccf628f016955b1063fbe7bb388245c841fd5142ce94385301b3f830172eed2df432086f6
-
SSDEEP
24576:Z8FG0TfXWkUIxxxR8gOaoMze81GT1Gr80:6XXWAR7ONTg
Malware Config
Extracted
Family
danabot
Botnet
4
C2
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
Attributes
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1888 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2480 wrote to memory of 1888 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 1888 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 1888 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 1888 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 1888 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 1888 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 1888 2480 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\813777679e335833f55a26be8703cdfe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\813777679e335833f55a26be8703cdfe.dll,#12⤵
- Blocklisted process makes network request
PID:1888