Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
cdde04dcbb4608116a3f579c10ca05c2.exe
Resource
win7-20240220-en
General
-
Target
cdde04dcbb4608116a3f579c10ca05c2.exe
-
Size
1.1MB
-
MD5
cdde04dcbb4608116a3f579c10ca05c2
-
SHA1
b9eb3a0b4b57682ebd950b4418a240950850756b
-
SHA256
f88e0b67f660fac89b18d3fa165e105fd3293735a104fb2b2fc9e4fbc5e8ecc5
-
SHA512
42ec2ea0a0d058442391313fe3b6af0475380b676e47003c959b64d0262c1c3c3cc19111013b7dc1c2214d96606d2799ce540ca17733ea846e6eb40819b7916f
-
SSDEEP
24576:N8oVxVB6tm3C5pXIYpTBgrLaHu3Id66E3s97:N8IxL6VNSrLd3JNg
Malware Config
Extracted
danabot
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Signatures
-
Danabot Loader Component 5 IoCs
resource yara_rule behavioral2/memory/488-8-0x0000000002360000-0x00000000024BD000-memory.dmp DanabotLoader2021 behavioral2/files/0x0008000000023208-7.dat DanabotLoader2021 behavioral2/memory/488-12-0x0000000002360000-0x00000000024BD000-memory.dmp DanabotLoader2021 behavioral2/memory/488-20-0x0000000002360000-0x00000000024BD000-memory.dmp DanabotLoader2021 behavioral2/memory/488-21-0x0000000002360000-0x00000000024BD000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
flow pid Process 48 488 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 488 rundll32.exe 488 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3264 1944 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1944 wrote to memory of 488 1944 cdde04dcbb4608116a3f579c10ca05c2.exe 86 PID 1944 wrote to memory of 488 1944 cdde04dcbb4608116a3f579c10ca05c2.exe 86 PID 1944 wrote to memory of 488 1944 cdde04dcbb4608116a3f579c10ca05c2.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdde04dcbb4608116a3f579c10ca05c2.exe"C:\Users\Admin\AppData\Local\Temp\cdde04dcbb4608116a3f579c10ca05c2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\CDDE04~1.TMP,S C:\Users\Admin\AppData\Local\Temp\CDDE04~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 3922⤵
- Program crash
PID:3264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1944 -ip 19441⤵PID:1688
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5978ca1ee18d48f8200390cb0df026c9a
SHA1c5e7f7316504e2d80999a42b80d127774167ce88
SHA256971185ac1a90b720446b38e8ae74ec5cd4809b09d1e1ed422883db977ddab316
SHA512771f4ccd233c7ffedb7f51d21dbb50cfb3bd2f176ea0e0794df0970dfdba8cf0c64cdc9db7afb0871fe8b30fd56eaaaca09f42e434e68eb70e76af1079a8a278