Analysis
-
max time kernel
111s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 07:03
Static task
static1
Behavioral task
behavioral1
Sample
16f97dff35d06b1be12cdfd3a2da0a2542250f4ab1889f3be3a4108b1e784071N.dll
Resource
win7-20240708-en
General
-
Target
16f97dff35d06b1be12cdfd3a2da0a2542250f4ab1889f3be3a4108b1e784071N.dll
-
Size
4.3MB
-
MD5
0099b73da216db9e77b1fd1029d03e80
-
SHA1
d27f8294dacf3ea724af00bc28ab0e67da5101fb
-
SHA256
16f97dff35d06b1be12cdfd3a2da0a2542250f4ab1889f3be3a4108b1e784071
-
SHA512
9491a29d83e0b567d58f8485d249502783cd967c638e77e25396be7ad7999ea3c731bced7041163493b11f8b896ee8efae47dc640e1cfbbad0736727f83ee1fa
-
SSDEEP
98304:7D5gnLHf9/uXEjQIYmwjc3ebCgkonupIlmWAVqMQM/:7DynLHf9/aEjQIYmwjc3ebCgkOudWA4W
Malware Config
Extracted
danabot
104.234.239.223:443
104.234.119.237:443
104.156.149.14:443
104.234.119.246:443
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 14 IoCs
Processes:
rundll32.exeflow pid Process 3 1728 rundll32.exe 6 1728 rundll32.exe 7 1728 rundll32.exe 23 1728 rundll32.exe 24 1728 rundll32.exe 25 1728 rundll32.exe 26 1728 rundll32.exe 41 1728 rundll32.exe 42 1728 rundll32.exe 43 1728 rundll32.exe 44 1728 rundll32.exe 47 1728 rundll32.exe 51 1728 rundll32.exe 52 1728 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 3344 wrote to memory of 1728 3344 rundll32.exe 83 PID 3344 wrote to memory of 1728 3344 rundll32.exe 83 PID 3344 wrote to memory of 1728 3344 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16f97dff35d06b1be12cdfd3a2da0a2542250f4ab1889f3be3a4108b1e784071N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16f97dff35d06b1be12cdfd3a2da0a2542250f4ab1889f3be3a4108b1e784071N.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1728
-