Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 21:15
Static task
static1
Behavioral task
behavioral1
Sample
123321.js
Resource
win7-20240705-en
General
-
Target
123321.js
-
Size
1.1MB
-
MD5
fe9946e628607b7d1f5b975bdd863000
-
SHA1
91fec6fb060ecb82fad71200cd75d11c8a610e40
-
SHA256
95abee4d159f541d81c84f6eb33a9bba7b5d1d7293e89857390b15498e138e51
-
SHA512
8882ef3f7629dd0372e4d03f9098c323544f7e38758ccccb0e66e3f3bccf8b90e4672a76a606c5938603d9190899894916975b1ca3ba0eaa067ed57968f682cc
-
SSDEEP
1536:DrOuB1MsFjui78aIe5TP4IdXYNVjPazZS8qR0/5T/TGXNHY4KQ4au9Pvj1B2gNAA:ALa
Malware Config
Extracted
danabot
89.144.25.243
14.123.141.112
91.121.17.109
97.144.123.166
89.144.25.104
37.96.21.198
26.18.85.30
88.132.191.2
106.9.214.152
161.145.156.168
Signatures
-
Danabot x86 payload 1 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
Processes:
resource yara_rule behavioral1/files/0x0007000000019246-1.dat family_danabot -
Blocklisted process makes network request 8 IoCs
Processes:
rundll32.exeflow pid Process 2 2896 rundll32.exe 3 2896 rundll32.exe 4 2896 rundll32.exe 5 2896 rundll32.exe 6 2896 rundll32.exe 7 2896 rundll32.exe 8 2896 rundll32.exe 9 2896 rundll32.exe -
Loads dropped DLL 5 IoCs
Processes:
regsvr32.exerundll32.exepid Process 2352 regsvr32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exerundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
wscript.exeregsvr32.exeregsvr32.exedescription pid Process procid_target PID 2536 wrote to memory of 3056 2536 wscript.exe 30 PID 2536 wrote to memory of 3056 2536 wscript.exe 30 PID 2536 wrote to memory of 3056 2536 wscript.exe 30 PID 2536 wrote to memory of 3056 2536 wscript.exe 30 PID 2536 wrote to memory of 3056 2536 wscript.exe 30 PID 3056 wrote to memory of 2352 3056 regsvr32.exe 31 PID 3056 wrote to memory of 2352 3056 regsvr32.exe 31 PID 3056 wrote to memory of 2352 3056 regsvr32.exe 31 PID 3056 wrote to memory of 2352 3056 regsvr32.exe 31 PID 3056 wrote to memory of 2352 3056 regsvr32.exe 31 PID 3056 wrote to memory of 2352 3056 regsvr32.exe 31 PID 3056 wrote to memory of 2352 3056 regsvr32.exe 31 PID 2352 wrote to memory of 2896 2352 regsvr32.exe 32 PID 2352 wrote to memory of 2896 2352 regsvr32.exe 32 PID 2352 wrote to memory of 2896 2352 regsvr32.exe 32 PID 2352 wrote to memory of 2896 2352 regsvr32.exe 32 PID 2352 wrote to memory of 2896 2352 regsvr32.exe 32 PID 2352 wrote to memory of 2896 2352 regsvr32.exe 32 PID 2352 wrote to memory of 2896 2352 regsvr32.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\123321.js1⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\\IdkVEIfkVWId.dll2⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\regsvr32.exe-s C:\Users\Admin\AppData\Local\Temp\\IdkVEIfkVWId.dll3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\IdkVEIfkVWId.dll,f04⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2896
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD57f73b06d9a8810e735bafaab1c5cc7a5
SHA18e46c8f4a78e510c30558a25846fa3819c101f3b
SHA2567a218d6ea68caee18ad95c861d057baf0b44d593fe59e2231ed1f0916df5f1d6
SHA5123cd5253f696f54fd025981af21536888f729730246275111159e0c54036a556fa57c6af27ac156bf19f79a381de776384a5ef88472acb9496956bbad932ef9c9