Overview
overview
10Static
static
70hS8ndFapM...Jf.exe
windows7-x64
100hS8ndFapM...Jf.exe
windows10-2004-x64
100rr48RlGuy...xg.exe
windows7-x64
80rr48RlGuy...xg.exe
windows10-2004-x64
821oenuW1qn...e5.exe
windows7-x64
1021oenuW1qn...e5.exe
windows10-2004-x64
1025jZMPTiQq...9r.exe
windows7-x64
1025jZMPTiQq...9r.exe
windows10-2004-x64
1028NEs4WOAb...Dx.exe
windows7-x64
928NEs4WOAb...Dx.exe
windows10-2004-x64
92DWwzYoIDs...wH.exe
windows7-x64
102DWwzYoIDs...wH.exe
windows10-2004-x64
104sqg3EO3n4...E3.exe
windows7-x64
104sqg3EO3n4...E3.exe
windows10-2004-x64
106IvhC9RrHt...Qm.exe
windows7-x64
106IvhC9RrHt...Qm.exe
windows10-2004-x64
106K69WRpYoP...wA.exe
windows7-x64
36K69WRpYoP...wA.exe
windows10-2004-x64
76RVcR1WSzn...fp.exe
windows7-x64
36RVcR1WSzn...fp.exe
windows10-2004-x64
77UwyHmKx00...KA.exe
windows7-x64
97UwyHmKx00...KA.exe
windows10-2004-x64
988wncypnTK...tt.exe
windows7-x64
88wncypnTK...tt.exe
windows10-2004-x64
18Jw_RggGj5...71.exe
windows7-x64
78Jw_RggGj5...71.exe
windows10-2004-x64
7A04WVFPeCH...H9.exe
windows7-x64
10A04WVFPeCH...H9.exe
windows10-2004-x64
10A5ulgq_bFX...0Z.exe
windows7-x64
10A5ulgq_bFX...0Z.exe
windows10-2004-x64
10AU3ie6Mv1v...zZ.exe
windows7-x64
10AU3ie6Mv1v...zZ.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 12:00
Behavioral task
behavioral1
Sample
0hS8ndFapMyi9bpBTCoeqfJf.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0hS8ndFapMyi9bpBTCoeqfJf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
0rr48RlGuyf8MbsABD4Fd5xg.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
0rr48RlGuyf8MbsABD4Fd5xg.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
21oenuW1qnqk7qUsHH7Z2We5.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
21oenuW1qnqk7qUsHH7Z2We5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
25jZMPTiQqNIVH0Cs2hi6z9r.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
25jZMPTiQqNIVH0Cs2hi6z9r.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
28NEs4WOAbFCrw46bjrvW6Dx.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
28NEs4WOAbFCrw46bjrvW6Dx.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
2DWwzYoIDsZeXAHrWMUgq7wH.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
2DWwzYoIDsZeXAHrWMUgq7wH.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
4sqg3EO3n4bilXTOwELzdyE3.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
4sqg3EO3n4bilXTOwELzdyE3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
6IvhC9RrHtvRf0BCVttVUFQm.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
6IvhC9RrHtvRf0BCVttVUFQm.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
6K69WRpYoPgt3vIoWRXmpAwA.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
6K69WRpYoPgt3vIoWRXmpAwA.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
6RVcR1WSznUXUS8RtLypZMfp.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
6RVcR1WSznUXUS8RtLypZMfp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
7UwyHmKx00aB7vI0W6MvnkKA.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
7UwyHmKx00aB7vI0W6MvnkKA.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
88wncypnTKvKj7Uwab0iiutt.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
88wncypnTKvKj7Uwab0iiutt.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
8Jw_RggGj5lBX2auQAnIQe71.exe
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
8Jw_RggGj5lBX2auQAnIQe71.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
A04WVFPeCHaejSnQmBHCogH9.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
A04WVFPeCHaejSnQmBHCogH9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
A5ulgq_bFXMyWAYNZZbTBZ0Z.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
A5ulgq_bFXMyWAYNZZbTBZ0Z.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
AU3ie6Mv1vmus72LuhNF2jzZ.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
AU3ie6Mv1vmus72LuhNF2jzZ.exe
Resource
win10v2004-20241007-en
General
-
Target
A5ulgq_bFXMyWAYNZZbTBZ0Z.exe
-
Size
1.1MB
-
MD5
2b0e445c62830c383077959a8f07289e
-
SHA1
40c24d7e6dc8fcb68b00b0e8c21a2dc0aed0e34b
-
SHA256
9a9903020d8134184e850dd7069d26734ca07cb0dd87bbde15919587ced1d3a1
-
SHA512
6a20481b88c9f124b2fb8f620e2e6adcc53116f8d2829c5cf915fbfcba4ce0b45e053ebd547918b7a7c95615508f1dcf89f274b3430ea3d0b6de995edb9c644c
-
SSDEEP
24576:OF+drpnEdh3f7/zqT3bdDtm3I00oigJf34hbHnSPmfqXRJ:OkWd1/mbdg32SJ0bo
Malware Config
Extracted
danabot
4
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Signatures
-
Danabot Loader Component 5 IoCs
resource yara_rule behavioral29/files/0x0007000000012117-15.dat DanabotLoader2021 behavioral29/memory/2752-20-0x00000000008F0000-0x0000000000A51000-memory.dmp DanabotLoader2021 behavioral29/memory/2752-22-0x00000000008F0000-0x0000000000A51000-memory.dmp DanabotLoader2021 behavioral29/memory/2752-38-0x00000000008F0000-0x0000000000A51000-memory.dmp DanabotLoader2021 behavioral29/memory/2752-39-0x00000000008F0000-0x0000000000A51000-memory.dmp DanabotLoader2021 -
Danabot family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 2752 rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 2752 rundll32.exe 2752 rundll32.exe 2752 rundll32.exe 2752 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A5ulgq_bFXMyWAYNZZbTBZ0Z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2752 1048 A5ulgq_bFXMyWAYNZZbTBZ0Z.exe 30 PID 1048 wrote to memory of 2752 1048 A5ulgq_bFXMyWAYNZZbTBZ0Z.exe 30 PID 1048 wrote to memory of 2752 1048 A5ulgq_bFXMyWAYNZZbTBZ0Z.exe 30 PID 1048 wrote to memory of 2752 1048 A5ulgq_bFXMyWAYNZZbTBZ0Z.exe 30 PID 1048 wrote to memory of 2752 1048 A5ulgq_bFXMyWAYNZZbTBZ0Z.exe 30 PID 1048 wrote to memory of 2752 1048 A5ulgq_bFXMyWAYNZZbTBZ0Z.exe 30 PID 1048 wrote to memory of 2752 1048 A5ulgq_bFXMyWAYNZZbTBZ0Z.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\A5ulgq_bFXMyWAYNZZbTBZ0Z.exe"C:\Users\Admin\AppData\Local\Temp\A5ulgq_bFXMyWAYNZZbTBZ0Z.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\A5ULGQ~1.DLL,s C:\Users\Admin\AppData\Local\Temp\A5ULGQ~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5d77f5d0d287781b1bd9ece6ebbdd6a9b
SHA1a45a85515987203d88ea5e846bc4b65985396be7
SHA256e062a9882f3f24523b9492554dffee8165ba71642cb00ffa7809b85ed8f44c14
SHA51273356d0a37f5cabb563f3c193a7d0dd5ec35888019f4819701346799446f42f437301add4559568a681e210242aa5f942abb82fbcacb680e388ed6ce0e51f8d7