Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 21:15
Static task
static1
Behavioral task
behavioral1
Sample
123321.js
Resource
win7-20240705-en
General
-
Target
123321.js
-
Size
1.1MB
-
MD5
fe9946e628607b7d1f5b975bdd863000
-
SHA1
91fec6fb060ecb82fad71200cd75d11c8a610e40
-
SHA256
95abee4d159f541d81c84f6eb33a9bba7b5d1d7293e89857390b15498e138e51
-
SHA512
8882ef3f7629dd0372e4d03f9098c323544f7e38758ccccb0e66e3f3bccf8b90e4672a76a606c5938603d9190899894916975b1ca3ba0eaa067ed57968f682cc
-
SSDEEP
1536:DrOuB1MsFjui78aIe5TP4IdXYNVjPazZS8qR0/5T/TGXNHY4KQ4au9Pvj1B2gNAA:ALa
Malware Config
Extracted
danabot
89.144.25.243
14.123.141.112
91.121.17.109
97.144.123.166
89.144.25.104
37.96.21.198
26.18.85.30
88.132.191.2
106.9.214.152
161.145.156.168
Signatures
-
Danabot x86 payload 1 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
resource yara_rule behavioral2/files/0x0007000000023428-1.dat family_danabot -
Blocklisted process makes network request 8 IoCs
flow pid Process 19 1044 rundll32.exe 32 1044 rundll32.exe 57 1044 rundll32.exe 62 1044 rundll32.exe 63 1044 rundll32.exe 68 1044 rundll32.exe 70 1044 rundll32.exe 71 1044 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation wscript.exe -
Loads dropped DLL 4 IoCs
pid Process 2788 regsvr32.exe 2788 regsvr32.exe 1044 rundll32.exe 1044 rundll32.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4496 wrote to memory of 4848 4496 wscript.exe 87 PID 4496 wrote to memory of 4848 4496 wscript.exe 87 PID 4848 wrote to memory of 2788 4848 regsvr32.exe 88 PID 4848 wrote to memory of 2788 4848 regsvr32.exe 88 PID 4848 wrote to memory of 2788 4848 regsvr32.exe 88 PID 2788 wrote to memory of 1044 2788 regsvr32.exe 89 PID 2788 wrote to memory of 1044 2788 regsvr32.exe 89 PID 2788 wrote to memory of 1044 2788 regsvr32.exe 89
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\123321.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\\IdkVEIfkVWId.dll2⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\regsvr32.exe-s C:\Users\Admin\AppData\Local\Temp\\IdkVEIfkVWId.dll3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\IdkVEIfkVWId.dll,f04⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1044
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD57f73b06d9a8810e735bafaab1c5cc7a5
SHA18e46c8f4a78e510c30558a25846fa3819c101f3b
SHA2567a218d6ea68caee18ad95c861d057baf0b44d593fe59e2231ed1f0916df5f1d6
SHA5123cd5253f696f54fd025981af21536888f729730246275111159e0c54036a556fa57c6af27ac156bf19f79a381de776384a5ef88472acb9496956bbad932ef9c9