Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
91e0264d2e01c67d0c2c6a20b76ac8145a33af88ea0562cc277ca01b537dd02f.dll
Resource
win7-20240903-en
General
-
Target
91e0264d2e01c67d0c2c6a20b76ac8145a33af88ea0562cc277ca01b537dd02f.dll
-
Size
4.3MB
-
MD5
c31f67bf101c806210a916d659cd9b0d
-
SHA1
d2f1760d4b4021eb49ddadd332ec3630f6babfed
-
SHA256
91e0264d2e01c67d0c2c6a20b76ac8145a33af88ea0562cc277ca01b537dd02f
-
SHA512
5e11e4845056b42a1de1d2a6406e53c84cabeafc86e813c46e2941f889c4739a0cced6b9cc66d72e2b89d161c650a245d3e294bbfeff5a8cd9b0a36376bed2f9
-
SSDEEP
98304:7D5gnLHf9/uXEjQIYmwjc3ebCgkonupIlmWAVqMQM/g:7DynLHf9/aEjQIYmwjc3ebCgkOudWA4X
Malware Config
Extracted
danabot
104.234.239.223:443
104.234.119.237:443
104.156.149.14:443
104.234.119.246:443
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 16 IoCs
flow pid Process 3 2672 rundll32.exe 4 2672 rundll32.exe 5 2672 rundll32.exe 6 2672 rundll32.exe 8 2672 rundll32.exe 9 2672 rundll32.exe 10 2672 rundll32.exe 11 2672 rundll32.exe 12 2672 rundll32.exe 13 2672 rundll32.exe 14 2672 rundll32.exe 15 2672 rundll32.exe 16 2672 rundll32.exe 17 2672 rundll32.exe 18 2672 rundll32.exe 19 2672 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2672 2240 rundll32.exe 31 PID 2240 wrote to memory of 2672 2240 rundll32.exe 31 PID 2240 wrote to memory of 2672 2240 rundll32.exe 31 PID 2240 wrote to memory of 2672 2240 rundll32.exe 31 PID 2240 wrote to memory of 2672 2240 rundll32.exe 31 PID 2240 wrote to memory of 2672 2240 rundll32.exe 31 PID 2240 wrote to memory of 2672 2240 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\91e0264d2e01c67d0c2c6a20b76ac8145a33af88ea0562cc277ca01b537dd02f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\91e0264d2e01c67d0c2c6a20b76ac8145a33af88ea0562cc277ca01b537dd02f.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2672
-