Analysis
-
max time kernel
110s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 05:49
Behavioral task
behavioral1
Sample
1b6d955b893be0e5bbd2e79407b90dee4e9277a87eb303c3e123dc5fd93f8001.dll
Resource
win7-20241010-en
General
-
Target
1b6d955b893be0e5bbd2e79407b90dee4e9277a87eb303c3e123dc5fd93f8001.dll
-
Size
1.3MB
-
MD5
08077c0cbc7bbe2320b1d07a9cd475ab
-
SHA1
273ea1d057e4bfb80849ff53aa948ed7ed08fb17
-
SHA256
1b6d955b893be0e5bbd2e79407b90dee4e9277a87eb303c3e123dc5fd93f8001
-
SHA512
9ecf36bd8d47b5357ef63a95e8a3a3195ca2401c5923d343dba0c34ec0f1bcdd7ad0fdc5e845dd558758ec6ae3492d7b196272aef3b13fd416fb01492c9c6f17
-
SSDEEP
24576:58FG/L98qXKTVfl8B0Y1ewAfj3xCV2D3qyzITrQB79te:a7VSNAfj3xCoayzIT0je
Malware Config
Extracted
danabot
4
192.119.110.73:443
192.236.147.159:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Signatures
-
Danabot Loader Component 2 IoCs
resource yara_rule behavioral2/memory/4816-0-0x00000000020C0000-0x0000000002220000-memory.dmp DanabotLoader2021 behavioral2/memory/4816-1-0x00000000020C0000-0x0000000002220000-memory.dmp DanabotLoader2021 -
Danabot family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 4816 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2036 wrote to memory of 4816 2036 rundll32.exe 82 PID 2036 wrote to memory of 4816 2036 rundll32.exe 82 PID 2036 wrote to memory of 4816 2036 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1b6d955b893be0e5bbd2e79407b90dee4e9277a87eb303c3e123dc5fd93f8001.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1b6d955b893be0e5bbd2e79407b90dee4e9277a87eb303c3e123dc5fd93f8001.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:4816
-