Analysis
-
max time kernel
110s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 07:15
Static task
static1
Behavioral task
behavioral1
Sample
9b928d461f92ebec072598b42dcca580N.dll
Resource
win7-20240705-en
General
-
Target
9b928d461f92ebec072598b42dcca580N.dll
-
Size
4.3MB
-
MD5
9b928d461f92ebec072598b42dcca580
-
SHA1
351c3e2ab0c7db448f38e7a512d0e237706b88b5
-
SHA256
b2a1f1d3add12ea02f00c2405f1ce53c851fcea25d6d0434c4d2129e34945394
-
SHA512
619d3ca040b78eede38561331ebadae71ecd6b03bb580362fa9c7b5be979ff27c445487a0482374723a9d8b9964f47585dc9f406a0de53700c35f4fd0ba52e4f
-
SSDEEP
98304:2Ekp3AUUgGFofLw++PxAbc5rh5Ar/04TAiP:gp31UtFmLw95Abc5rh5Ar/NTA
Malware Config
Extracted
danabot
172.93.193.231:443
192.236.163.13:443
152.89.247.216:443
103.144.139.157:443
-
type
loader
Signatures
-
Blocklisted process makes network request 12 IoCs
Processes:
rundll32.exeflow pid Process 23 5012 rundll32.exe 30 5012 rundll32.exe 31 5012 rundll32.exe 32 5012 rundll32.exe 43 5012 rundll32.exe 47 5012 rundll32.exe 52 5012 rundll32.exe 55 5012 rundll32.exe 56 5012 rundll32.exe 57 5012 rundll32.exe 64 5012 rundll32.exe 76 5012 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 4752 wrote to memory of 5012 4752 rundll32.exe 84 PID 4752 wrote to memory of 5012 4752 rundll32.exe 84 PID 4752 wrote to memory of 5012 4752 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9b928d461f92ebec072598b42dcca580N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9b928d461f92ebec072598b42dcca580N.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:5012
-