Analysis
-
max time kernel
110s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
91e0264d2e01c67d0c2c6a20b76ac8145a33af88ea0562cc277ca01b537dd02f.dll
Resource
win7-20240903-en
General
-
Target
91e0264d2e01c67d0c2c6a20b76ac8145a33af88ea0562cc277ca01b537dd02f.dll
-
Size
4.3MB
-
MD5
c31f67bf101c806210a916d659cd9b0d
-
SHA1
d2f1760d4b4021eb49ddadd332ec3630f6babfed
-
SHA256
91e0264d2e01c67d0c2c6a20b76ac8145a33af88ea0562cc277ca01b537dd02f
-
SHA512
5e11e4845056b42a1de1d2a6406e53c84cabeafc86e813c46e2941f889c4739a0cced6b9cc66d72e2b89d161c650a245d3e294bbfeff5a8cd9b0a36376bed2f9
-
SSDEEP
98304:7D5gnLHf9/uXEjQIYmwjc3ebCgkonupIlmWAVqMQM/g:7DynLHf9/aEjQIYmwjc3ebCgkOudWA4X
Malware Config
Extracted
danabot
104.234.239.223:443
104.234.119.237:443
104.156.149.14:443
104.234.119.246:443
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 14 IoCs
flow pid Process 5 4628 rundll32.exe 6 4628 rundll32.exe 7 4628 rundll32.exe 22 4628 rundll32.exe 27 4628 rundll32.exe 28 4628 rundll32.exe 34 4628 rundll32.exe 39 4628 rundll32.exe 40 4628 rundll32.exe 41 4628 rundll32.exe 42 4628 rundll32.exe 45 4628 rundll32.exe 48 4628 rundll32.exe 52 4628 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3784 wrote to memory of 4628 3784 rundll32.exe 83 PID 3784 wrote to memory of 4628 3784 rundll32.exe 83 PID 3784 wrote to memory of 4628 3784 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\91e0264d2e01c67d0c2c6a20b76ac8145a33af88ea0562cc277ca01b537dd02f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\91e0264d2e01c67d0c2c6a20b76ac8145a33af88ea0562cc277ca01b537dd02f.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:4628
-