Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 17:08 UTC

General

  • Target

    4.dll

  • Size

    2.4MB

  • MD5

    986d769a639a877a9b8f4fb3c8616911

  • SHA1

    ba1cc29d845d958bd60c989eaa36fdaf9db7ea41

  • SHA256

    c94374155dded12d9f90d16f03470b12b14c4df109a9cf8dbf26e9cd66850457

  • SHA512

    3a1e2a6b57278071906ee2d7b1f9ca6d1ed98084c80512da854e5c1f73e480b92f2b1cceccf87523184bf34250e3cb6a0e1172d7f5478777570f807820d9a187

  • SSDEEP

    24576:yqUUcYHqhhW1bCYo9mvn9YDq+0as+MqYrtaBwSbx3jMUAlZSVV4VHa4k3NkZpyM4:yJmFyqC4aeSN3oRlZyA/o7I3fOis

Score
10/10

Malware Config

Extracted

Family

danabot

C2

92.204.160.54

2.56.213.179

45.153.186.47

93.115.21.29

185.45.193.50

193.34.166.247

rsa_pubkey.plain
1
-----BEGIN PUBLIC KEY-----
2
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCyJo2aXOQNP+KeAnWlpOiuMk5W
3
l1An5GorPHqEyFAlRyv6sEylQDjAuSLGsy2LCvKmuzx2AFQ+3IMfqFf3JacY1HmY
4
WuiL1V+R910TohM+6hnLnWx7JNbfzB3S7D1JC/WNUwlVv5NnIIX1i+zIW5BTanU1
5
yQ97xjvokjvZHCHe2wIDAQAB
6
-----END PUBLIC KEY-----

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 8 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\4.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4560
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\4.dll,f0
        3⤵
        • Blocklisted process makes network request
        PID:3148
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4560 -s 800
        3⤵
        • Program crash
        PID:3496
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4560 -ip 4560
    1⤵
      PID:2328

    Network

    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
    • 2.56.213.179:443
      rundll32.exe
      260 B
      5
    • 45.153.186.47:443
      rundll32.exe
      260 B
      5
    • 193.34.166.247:443
      rundll32.exe
      260 B
      5
    • 193.34.166.247:443
      rundll32.exe
      260 B
      5
    • 193.34.166.247:443
      rundll32.exe
      260 B
      5
    • 193.34.166.247:443
      rundll32.exe
      260 B
      5
    • 193.34.166.247:443
      rundll32.exe
      260 B
      5
    • 92.204.160.54:443
      rundll32.exe
      104 B
      2
    • 8.8.8.8:53
      8.8.8.8.in-addr.arpa
      dns
      330 B
      5

      DNS Request

      8.8.8.8.in-addr.arpa

      DNS Request

      8.8.8.8.in-addr.arpa

      DNS Request

      8.8.8.8.in-addr.arpa

      DNS Request

      8.8.8.8.in-addr.arpa

      DNS Request

      8.8.8.8.in-addr.arpa

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3148-1-0x0000000000400000-0x000000000066B000-memory.dmp

      Filesize

      2.4MB

    • memory/3148-3-0x0000000000400000-0x000000000066B000-memory.dmp

      Filesize

      2.4MB

    • memory/4560-0-0x0000000000400000-0x000000000066B000-memory.dmp

      Filesize

      2.4MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.