Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 07:03
Static task
static1
Behavioral task
behavioral1
Sample
16f97dff35d06b1be12cdfd3a2da0a2542250f4ab1889f3be3a4108b1e784071N.dll
Resource
win7-20240708-en
General
-
Target
16f97dff35d06b1be12cdfd3a2da0a2542250f4ab1889f3be3a4108b1e784071N.dll
-
Size
4.3MB
-
MD5
0099b73da216db9e77b1fd1029d03e80
-
SHA1
d27f8294dacf3ea724af00bc28ab0e67da5101fb
-
SHA256
16f97dff35d06b1be12cdfd3a2da0a2542250f4ab1889f3be3a4108b1e784071
-
SHA512
9491a29d83e0b567d58f8485d249502783cd967c638e77e25396be7ad7999ea3c731bced7041163493b11f8b896ee8efae47dc640e1cfbbad0736727f83ee1fa
-
SSDEEP
98304:7D5gnLHf9/uXEjQIYmwjc3ebCgkonupIlmWAVqMQM/:7DynLHf9/aEjQIYmwjc3ebCgkOudWA4W
Malware Config
Extracted
danabot
104.234.239.223:443
104.234.119.237:443
104.156.149.14:443
104.234.119.246:443
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 2040 rundll32.exe 3 2040 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16f97dff35d06b1be12cdfd3a2da0a2542250f4ab1889f3be3a4108b1e784071N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16f97dff35d06b1be12cdfd3a2da0a2542250f4ab1889f3be3a4108b1e784071N.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2040
-