Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 23:52
Static task
static1
Behavioral task
behavioral1
Sample
8708a256d09ca02b886e7c90f38b8d8f392b21b7b2941c09992adb5c1ae7ed0d.dll
Resource
win7-20240903-en
General
-
Target
8708a256d09ca02b886e7c90f38b8d8f392b21b7b2941c09992adb5c1ae7ed0d.dll
-
Size
1.9MB
-
MD5
32ea1e434879bd24a6f4d39c997aa10f
-
SHA1
0c8c0afb879c95af9f771fc8b50897f3410a7274
-
SHA256
8708a256d09ca02b886e7c90f38b8d8f392b21b7b2941c09992adb5c1ae7ed0d
-
SHA512
70d139abd902134a948131d68336779b5b2c41ae8690b41e563f426fd3de95255a9cbb7758745b8bc104f32454f5f5c3f514beea67f4be2e47b29be3c64a0f49
-
SSDEEP
49152:IQU1aLhQhG5NUAgoOa8nBc0SmmdWwMLwktw4Bzetqfn8+nFFQCxEsJwKQG:IfaNQh+NUABO/c0Y9Adktqf8+gqJW
Malware Config
Extracted
danabot
40
185.117.90.36:443
193.42.36.59:443
193.56.146.53:443
185.106.123.228:443
-
embedded_hash
07284E2A3AB3C2E1FFFBD425849BE150
-
type
loader
Signatures
-
Danabot Loader Component 3 IoCs
Processes:
resource yara_rule behavioral1/memory/584-4-0x0000000002080000-0x0000000002274000-memory.dmp DanabotLoader2021 behavioral1/memory/584-5-0x0000000002080000-0x0000000002274000-memory.dmp DanabotLoader2021 behavioral1/memory/584-9-0x0000000002080000-0x0000000002274000-memory.dmp DanabotLoader2021 -
Danabot family
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 584 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2448 wrote to memory of 584 2448 rundll32.exe rundll32.exe PID 2448 wrote to memory of 584 2448 rundll32.exe rundll32.exe PID 2448 wrote to memory of 584 2448 rundll32.exe rundll32.exe PID 2448 wrote to memory of 584 2448 rundll32.exe rundll32.exe PID 2448 wrote to memory of 584 2448 rundll32.exe rundll32.exe PID 2448 wrote to memory of 584 2448 rundll32.exe rundll32.exe PID 2448 wrote to memory of 584 2448 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8708a256d09ca02b886e7c90f38b8d8f392b21b7b2941c09992adb5c1ae7ed0d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8708a256d09ca02b886e7c90f38b8d8f392b21b7b2941c09992adb5c1ae7ed0d.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:584
-