Analysis
-
max time kernel
155s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 21:16
Behavioral task
behavioral1
Sample
c6e03fe261880f32b1d07c3e0215257a.dll
Resource
win7-20240221-en
3 signatures
150 seconds
General
-
Target
c6e03fe261880f32b1d07c3e0215257a.dll
-
Size
1.3MB
-
MD5
c6e03fe261880f32b1d07c3e0215257a
-
SHA1
850cd9178fec877341514e8c78b3f951676733e7
-
SHA256
cb0ead96e47c2a53d1d8ce8d6982c85dec0f103011924e58fffea13a83eb9654
-
SHA512
5cbbe55e5671a847b8f12b5d9458e3af3638c10527130def2b7905c86ef8a7e4bc7acd619f487668f03a1b462ed4f298abca8559f9fdb2e72c252d059efe1c7e
-
SSDEEP
24576:RcF2ddLBEH/yuGeb3+yPbduheDDx0OJ16TPWi+D:SQ3yhugD2Tu5D
Malware Config
Extracted
Family
danabot
Botnet
4
C2
104.168.148.6:443
5.9.224.204:443
192.210.222.81:443
23.229.29.48:443
Attributes
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
rsa_pubkey.plain
rsa_privkey.plain
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 2496 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2496 2920 rundll32.exe 28 PID 2920 wrote to memory of 2496 2920 rundll32.exe 28 PID 2920 wrote to memory of 2496 2920 rundll32.exe 28 PID 2920 wrote to memory of 2496 2920 rundll32.exe 28 PID 2920 wrote to memory of 2496 2920 rundll32.exe 28 PID 2920 wrote to memory of 2496 2920 rundll32.exe 28 PID 2920 wrote to memory of 2496 2920 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6e03fe261880f32b1d07c3e0215257a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6e03fe261880f32b1d07c3e0215257a.dll,#12⤵
- Blocklisted process makes network request
PID:2496
-