Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 07:15
Static task
static1
Behavioral task
behavioral1
Sample
9b928d461f92ebec072598b42dcca580N.dll
Resource
win7-20240705-en
General
-
Target
9b928d461f92ebec072598b42dcca580N.dll
-
Size
4.3MB
-
MD5
9b928d461f92ebec072598b42dcca580
-
SHA1
351c3e2ab0c7db448f38e7a512d0e237706b88b5
-
SHA256
b2a1f1d3add12ea02f00c2405f1ce53c851fcea25d6d0434c4d2129e34945394
-
SHA512
619d3ca040b78eede38561331ebadae71ecd6b03bb580362fa9c7b5be979ff27c445487a0482374723a9d8b9964f47585dc9f406a0de53700c35f4fd0ba52e4f
-
SSDEEP
98304:2Ekp3AUUgGFofLw++PxAbc5rh5Ar/04TAiP:gp31UtFmLw95Abc5rh5Ar/NTA
Malware Config
Extracted
danabot
172.93.193.231:443
192.236.163.13:443
152.89.247.216:443
103.144.139.157:443
-
type
loader
Signatures
-
Blocklisted process makes network request 14 IoCs
Processes:
rundll32.exeflow pid Process 3 1072 rundll32.exe 5 1072 rundll32.exe 6 1072 rundll32.exe 7 1072 rundll32.exe 8 1072 rundll32.exe 9 1072 rundll32.exe 10 1072 rundll32.exe 13 1072 rundll32.exe 14 1072 rundll32.exe 15 1072 rundll32.exe 16 1072 rundll32.exe 17 1072 rundll32.exe 18 1072 rundll32.exe 19 1072 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 2508 wrote to memory of 1072 2508 rundll32.exe 29 PID 2508 wrote to memory of 1072 2508 rundll32.exe 29 PID 2508 wrote to memory of 1072 2508 rundll32.exe 29 PID 2508 wrote to memory of 1072 2508 rundll32.exe 29 PID 2508 wrote to memory of 1072 2508 rundll32.exe 29 PID 2508 wrote to memory of 1072 2508 rundll32.exe 29 PID 2508 wrote to memory of 1072 2508 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9b928d461f92ebec072598b42dcca580N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9b928d461f92ebec072598b42dcca580N.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1072
-