Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 07:08
Static task
static1
Behavioral task
behavioral1
Sample
ab4cf6181cfb102ec86c66d56af2d229.exe
Resource
win7-20240221-en
General
-
Target
ab4cf6181cfb102ec86c66d56af2d229.exe
-
Size
1.1MB
-
MD5
ab4cf6181cfb102ec86c66d56af2d229
-
SHA1
ac756cbff2887e804e9957898b0d6450a33a0aa1
-
SHA256
f7c566ca7413a1259a7bcc120bc431a5ad129438b1e8b9b51c398d5eecfc51a5
-
SHA512
dec2910e395b1714966c85741f1062f6a4b62a9a1ab3f8f92c573a2b44a49ced2a963f383247b871eb90ec7cc795a4226dc0944b8bce3e74bb3f5bd2024b0a2f
-
SSDEEP
24576:RtrUusPn8AAsDdRY+KBXRLR6YD1kl6YfaWAy0BPA:RtvsP9JRY+KBB96YKIsFn0BI
Malware Config
Extracted
danabot
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 54 1580 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1580 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3384 2980 WerFault.exe ab4cf6181cfb102ec86c66d56af2d229.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
ab4cf6181cfb102ec86c66d56af2d229.exedescription pid process target process PID 2980 wrote to memory of 1580 2980 ab4cf6181cfb102ec86c66d56af2d229.exe rundll32.exe PID 2980 wrote to memory of 1580 2980 ab4cf6181cfb102ec86c66d56af2d229.exe rundll32.exe PID 2980 wrote to memory of 1580 2980 ab4cf6181cfb102ec86c66d56af2d229.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab4cf6181cfb102ec86c66d56af2d229.exe"C:\Users\Admin\AppData\Local\Temp\ab4cf6181cfb102ec86c66d56af2d229.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\AB4CF6~1.TMP,S C:\Users\Admin\AppData\Local\Temp\AB4CF6~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 4442⤵
- Program crash
PID:3384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2980 -ip 29801⤵PID:1848
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5279fd5be1ef6f78dceaea9160797d3ca
SHA102d83bb9752b2f9cb205fbba5ef084069204ce5c
SHA25679e7f889f4d8c8475bef4a94124ffcdc68d1b2f8b632a6f3539179945f481477
SHA5129459221ca625f4969ca4dbf68c9765f01b71d36b90cb5c0cee863e764da6c2fd2317581bdfdbfb0440133ed3435b90516ea36e06b20efd1267ca22bfe34bb216