Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05-02-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
914572ae32ea3b7fda9860a619373534.exe
Resource
win7-20231215-en
General
-
Target
914572ae32ea3b7fda9860a619373534.exe
-
Size
1.1MB
-
MD5
914572ae32ea3b7fda9860a619373534
-
SHA1
afcd7d7280d9a19e69c056f8699283b4b92e435d
-
SHA256
fe7ce2b5ac19e2fc93436e1eddab8bc79043c518078559b8f9a2984a601b36cd
-
SHA512
b732d245509d13d98b23fd0b21878a03a0451db10f22334c2f8fd16f930ed961ae6ae1947a327001d3b4b76cf092a5fb9702df1f596452c9d3affd594d5577d7
-
SSDEEP
24576:Fmi/0mAnPFpGJD02Ev/J9IMYRys50FCs5p1ISI:96PFpKDKXJeks50FCstIl
Malware Config
Extracted
danabot
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Signatures
-
Danabot Loader Component 11 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\914572~1.TMP DanabotLoader2021 behavioral1/memory/2700-9-0x0000000001E90000-0x0000000001FEE000-memory.dmp DanabotLoader2021 behavioral1/memory/2700-11-0x0000000001E90000-0x0000000001FEE000-memory.dmp DanabotLoader2021 behavioral1/memory/2700-19-0x0000000001E90000-0x0000000001FEE000-memory.dmp DanabotLoader2021 behavioral1/memory/2700-20-0x0000000001E90000-0x0000000001FEE000-memory.dmp DanabotLoader2021 behavioral1/memory/2700-21-0x0000000001E90000-0x0000000001FEE000-memory.dmp DanabotLoader2021 behavioral1/memory/2700-22-0x0000000001E90000-0x0000000001FEE000-memory.dmp DanabotLoader2021 behavioral1/memory/2700-23-0x0000000001E90000-0x0000000001FEE000-memory.dmp DanabotLoader2021 behavioral1/memory/2700-24-0x0000000001E90000-0x0000000001FEE000-memory.dmp DanabotLoader2021 behavioral1/memory/2700-25-0x0000000001E90000-0x0000000001FEE000-memory.dmp DanabotLoader2021 behavioral1/memory/2700-26-0x0000000001E90000-0x0000000001FEE000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 2700 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2700 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
914572ae32ea3b7fda9860a619373534.exedescription pid process target process PID 1108 wrote to memory of 2700 1108 914572ae32ea3b7fda9860a619373534.exe rundll32.exe PID 1108 wrote to memory of 2700 1108 914572ae32ea3b7fda9860a619373534.exe rundll32.exe PID 1108 wrote to memory of 2700 1108 914572ae32ea3b7fda9860a619373534.exe rundll32.exe PID 1108 wrote to memory of 2700 1108 914572ae32ea3b7fda9860a619373534.exe rundll32.exe PID 1108 wrote to memory of 2700 1108 914572ae32ea3b7fda9860a619373534.exe rundll32.exe PID 1108 wrote to memory of 2700 1108 914572ae32ea3b7fda9860a619373534.exe rundll32.exe PID 1108 wrote to memory of 2700 1108 914572ae32ea3b7fda9860a619373534.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\914572ae32ea3b7fda9860a619373534.exe"C:\Users\Admin\AppData\Local\Temp\914572ae32ea3b7fda9860a619373534.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\914572~1.TMP,S C:\Users\Admin\AppData\Local\Temp\914572~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2700
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD500ad9c8b149b8e232e36c5823d73dcb4
SHA1c8e1a519720ab5acb40766a0f985448e83a5a241
SHA25623c285510f0c90b0905e5b48efff7bfa34697cca098296e68d16aa391e0d42c7
SHA512472c1c518221d730a9206b02028fe4f191de4c3cc0003b624ea70795ec2292f8c7522442f8ea4d81a4c0667dc1b7087e463e8abd6d35465ae456d66f4c2d09a4