Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 10:59
Behavioral task
behavioral1
Sample
991e4bb9fc6c41d905b0af6c0eb788deda66306401915eec64f25f2ba79ecd0b.dll
Resource
win7-20241010-en
General
-
Target
991e4bb9fc6c41d905b0af6c0eb788deda66306401915eec64f25f2ba79ecd0b.dll
-
Size
1.3MB
-
MD5
3d93c5977d3b4b9f8b706d67d6b10e77
-
SHA1
4f4a8822a8952bb7bafde02fd1c9fa4d97d90858
-
SHA256
991e4bb9fc6c41d905b0af6c0eb788deda66306401915eec64f25f2ba79ecd0b
-
SHA512
45734cfdb1c4ba117c127b9228a6bb92b4d754e46e33e3d9e60165d2c64f73eec8e62e565dbb421ce4013978137b8d116ba25c60651b32194be4ebca316886e4
-
SSDEEP
24576:qncFdcHdOgxk3F8TGFnnH0vySpIfAls7JcTUqqZm1W:hcEHn9IIfbqTRKmQ
Malware Config
Extracted
danabot
4
192.119.110.73:443
192.236.147.159:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Signatures
-
Danabot Loader Component 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2816-0-0x0000000000930000-0x0000000000A94000-memory.dmp DanabotLoader2021 behavioral1/memory/2816-1-0x0000000000930000-0x0000000000A94000-memory.dmp DanabotLoader2021 -
Danabot family
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 2816 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2808 wrote to memory of 2816 2808 rundll32.exe rundll32.exe PID 2808 wrote to memory of 2816 2808 rundll32.exe rundll32.exe PID 2808 wrote to memory of 2816 2808 rundll32.exe rundll32.exe PID 2808 wrote to memory of 2816 2808 rundll32.exe rundll32.exe PID 2808 wrote to memory of 2816 2808 rundll32.exe rundll32.exe PID 2808 wrote to memory of 2816 2808 rundll32.exe rundll32.exe PID 2808 wrote to memory of 2816 2808 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\991e4bb9fc6c41d905b0af6c0eb788deda66306401915eec64f25f2ba79ecd0b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\991e4bb9fc6c41d905b0af6c0eb788deda66306401915eec64f25f2ba79ecd0b.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2816
-