Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 01:01
Static task
static1
Behavioral task
behavioral1
Sample
9aa1374234a1e7ceb98ab263aa4124786ad7ec87e7a1ca945470c00d7160cc11.dll
Resource
win7-20240221-en
General
-
Target
9aa1374234a1e7ceb98ab263aa4124786ad7ec87e7a1ca945470c00d7160cc11.dll
-
Size
5.5MB
-
MD5
3db919a39a4f78d41d760479e9b850fc
-
SHA1
8e0e32db18f56dc47b6205cef7c58373605822cc
-
SHA256
9aa1374234a1e7ceb98ab263aa4124786ad7ec87e7a1ca945470c00d7160cc11
-
SHA512
9a5f6cd6960638bd62ef6ca48e5bcfb0958d58b0bbab25195bc65aa451cb792e7f58fd8e782f3e334cd626d81647e176e7870e2c7821b02a63a009f32010631d
-
SSDEEP
98304:juzJRlT3NYn5UD/1Z/jqxjBH7SeNWDhdXWu2L8+aU/S/VQQPXmqskC:juJRlbHD/7jUjBH7SeNWDDXWu2j7Qfm1
Malware Config
Extracted
danabot
23.254.253.134:443
104.234.10.89:443
104.234.119.29:443
142.11.244.14:443
-
embedded_hash
89B90FCAE14E80221BEFC7F02C3615D6
-
type
loader
Signatures
-
Blocklisted process makes network request 10 IoCs
flow pid Process 3 4756 rundll32.exe 7 4756 rundll32.exe 14 4756 rundll32.exe 17 4756 rundll32.exe 18 4756 rundll32.exe 19 4756 rundll32.exe 20 4756 rundll32.exe 21 4756 rundll32.exe 22 4756 rundll32.exe 23 4756 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2276 wrote to memory of 4756 2276 rundll32.exe 82 PID 2276 wrote to memory of 4756 2276 rundll32.exe 82 PID 2276 wrote to memory of 4756 2276 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9aa1374234a1e7ceb98ab263aa4124786ad7ec87e7a1ca945470c00d7160cc11.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9aa1374234a1e7ceb98ab263aa4124786ad7ec87e7a1ca945470c00d7160cc11.dll,#12⤵
- Blocklisted process makes network request
PID:4756
-