Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 21:19
Behavioral task
behavioral1
Sample
c1a13a3d34662408484cbc94d0a9b149.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
c1a13a3d34662408484cbc94d0a9b149.dll
-
Size
1.3MB
-
MD5
c1a13a3d34662408484cbc94d0a9b149
-
SHA1
b100ff2e84550a0e3cae7d34623489311b560651
-
SHA256
b00c027286c3f38a6733ec8df69ef917fa366ee306136fe689510576b8891578
-
SHA512
39c576c1af926e048cf6043170eb91a6b116439abbf6d2ec210f2e70e182d1c9897dda34fead84a6b5e3adf48196a17138e2660da17e817910c4327528f51033
-
SSDEEP
24576:98FPiQGaAYVNkHm3xm9TPGmBJP35oTIs:etRI9TPHJPJoT
Malware Config
Extracted
Family
danabot
Botnet
4
C2
142.11.244.124:443
142.11.206.50:443
Attributes
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
rsa_pubkey.plain
rsa_privkey.plain
Signatures
-
Danabot Loader Component 15 IoCs
resource yara_rule behavioral1/memory/1712-0-0x0000000002130000-0x000000000228E000-memory.dmp DanabotLoader2021 behavioral1/memory/1712-1-0x0000000002130000-0x000000000228E000-memory.dmp DanabotLoader2021 behavioral1/memory/1712-2-0x0000000002130000-0x000000000228E000-memory.dmp DanabotLoader2021 behavioral1/memory/1712-3-0x0000000002130000-0x000000000228E000-memory.dmp DanabotLoader2021 behavioral1/memory/1712-4-0x0000000002130000-0x000000000228E000-memory.dmp DanabotLoader2021 behavioral1/memory/1712-5-0x0000000002130000-0x000000000228E000-memory.dmp DanabotLoader2021 behavioral1/memory/1712-6-0x0000000002130000-0x000000000228E000-memory.dmp DanabotLoader2021 behavioral1/memory/1712-7-0x0000000002130000-0x000000000228E000-memory.dmp DanabotLoader2021 behavioral1/memory/1712-8-0x0000000002130000-0x000000000228E000-memory.dmp DanabotLoader2021 behavioral1/memory/1712-9-0x0000000002130000-0x000000000228E000-memory.dmp DanabotLoader2021 behavioral1/memory/1712-10-0x0000000002130000-0x000000000228E000-memory.dmp DanabotLoader2021 behavioral1/memory/1712-11-0x0000000002130000-0x000000000228E000-memory.dmp DanabotLoader2021 behavioral1/memory/1712-12-0x0000000002130000-0x000000000228E000-memory.dmp DanabotLoader2021 behavioral1/memory/1712-13-0x0000000002130000-0x000000000228E000-memory.dmp DanabotLoader2021 behavioral1/memory/1712-14-0x0000000002130000-0x000000000228E000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
flow pid Process 2 1712 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1712 1724 rundll32.exe 28 PID 1724 wrote to memory of 1712 1724 rundll32.exe 28 PID 1724 wrote to memory of 1712 1724 rundll32.exe 28 PID 1724 wrote to memory of 1712 1724 rundll32.exe 28 PID 1724 wrote to memory of 1712 1724 rundll32.exe 28 PID 1724 wrote to memory of 1712 1724 rundll32.exe 28 PID 1724 wrote to memory of 1712 1724 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1a13a3d34662408484cbc94d0a9b149.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1a13a3d34662408484cbc94d0a9b149.dll,#12⤵
- Blocklisted process makes network request
PID:1712
-