Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 18:17
Static task
static1
Behavioral task
behavioral1
Sample
DanaBot.exe
Resource
win7-20240221-en
General
-
Target
DanaBot.exe
-
Size
2.7MB
-
MD5
48d8f7bbb500af66baa765279ce58045
-
SHA1
2cdb5fdeee4e9c7bd2e5f744150521963487eb71
-
SHA256
db0d72bc7d10209f7fa354ec100d57abbb9fe2e57ce72789f5f88257c5d3ebd1
-
SHA512
aef8aa8e0d16aab35b5cc19487e53583691e4471064bc556a2ee13e94a0546b54a33995739f0fa3c4de6ff4c6abf02014aef3efb0d93ca6847bad2220c3302bd
-
SSDEEP
49152:bbevayZlMTWkygVy0nQZfVY2BtZzpPL4PuQ65+6Dv7m0KXTn:bbexZlMQcEVY2BtZzpPL4WQI9U
Malware Config
Extracted
danabot
51.178.195.151
51.222.39.81
149.255.35.125
38.68.50.179
51.77.7.204
Signatures
-
Danabot x86 payload 1 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
resource yara_rule behavioral2/files/0x000900000001e443-5.dat family_danabot -
Blocklisted process makes network request 7 IoCs
flow pid Process 26 1376 rundll32.exe 33 1376 rundll32.exe 46 1376 rundll32.exe 54 1376 rundll32.exe 55 1376 rundll32.exe 73 1376 rundll32.exe 74 1376 rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 4348 regsvr32.exe 4348 regsvr32.exe 1376 rundll32.exe 1376 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2296 3144 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3144 wrote to memory of 4348 3144 DanaBot.exe 93 PID 3144 wrote to memory of 4348 3144 DanaBot.exe 93 PID 3144 wrote to memory of 4348 3144 DanaBot.exe 93 PID 4348 wrote to memory of 1376 4348 regsvr32.exe 97 PID 4348 wrote to memory of 1376 4348 regsvr32.exe 97 PID 4348 wrote to memory of 1376 4348 regsvr32.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\DanaBot.exe"C:\Users\Admin\AppData\Local\Temp\DanaBot.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\DanaBot.dll f1 C:\Users\Admin\AppData\Local\Temp\DanaBot.exe@31442⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\DanaBot.dll,f03⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1376
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 4642⤵
- Program crash
PID:2296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3144 -ip 31441⤵PID:2640
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD57e76f7a5c55a5bc5f5e2d7a9e886782b
SHA1fc500153dba682e53776bef53123086f00c0e041
SHA256abd75572f897cdda88cec22922d15b509ee8c840fa5894b0aecbef6de23908a3
SHA5120318e0040f4dbf954f27fb10a69bce2248e785a31d855615a1eaf303a772ad51d47906a113605d7bfd3c2b2265bf83c61538f78b071f85ee3c4948f5cde3fb24