Analysis
-
max time kernel
141s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 13:46
Behavioral task
behavioral1
Sample
1d47b772005f6f964a7629b014a6d1c9a1206df5a3cacbd0d06e35e3e53cc185N.dll
Resource
win7-20240903-en
General
-
Target
1d47b772005f6f964a7629b014a6d1c9a1206df5a3cacbd0d06e35e3e53cc185N.dll
-
Size
1.3MB
-
MD5
79f2b8a7e04e78c54efa66a770b2a6f0
-
SHA1
2045d73cfa6e2de12ecf2d88f1754cef40427218
-
SHA256
1d47b772005f6f964a7629b014a6d1c9a1206df5a3cacbd0d06e35e3e53cc185
-
SHA512
680a794e83acbb08c926ee36640412dbbf98510773743bf8061d5d121fed9abe44cf018d4503983df26575bcd3590a066bb6599daf56f59b5d41effeff70487b
-
SSDEEP
24576:RcF2ddLBEH/yuGeb3+yPbduheDDx0OJ1fTPWi+D:SQ3yhugDzTu5D
Malware Config
Extracted
danabot
4
104.168.148.6:443
5.9.224.204:443
192.210.222.81:443
23.229.29.48:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 1 2896 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2840 wrote to memory of 2896 2840 rundll32.exe rundll32.exe PID 2840 wrote to memory of 2896 2840 rundll32.exe rundll32.exe PID 2840 wrote to memory of 2896 2840 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1d47b772005f6f964a7629b014a6d1c9a1206df5a3cacbd0d06e35e3e53cc185N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1d47b772005f6f964a7629b014a6d1c9a1206df5a3cacbd0d06e35e3e53cc185N.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2896
-