Analysis
-
max time kernel
110s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 18:16
Static task
static1
Behavioral task
behavioral1
Sample
46b165002c61b435c7e0e20c58aeed34d51a8166ddffe61be6931ac2d1dad3d6N.dll
Resource
win7-20240903-en
General
-
Target
46b165002c61b435c7e0e20c58aeed34d51a8166ddffe61be6931ac2d1dad3d6N.dll
-
Size
4.3MB
-
MD5
4a0ad493456a8c94ae03ecb2824c2ea0
-
SHA1
78d764f9744217ec38e18a7d2886506495778462
-
SHA256
46b165002c61b435c7e0e20c58aeed34d51a8166ddffe61be6931ac2d1dad3d6
-
SHA512
82244b19144ea5807e23cd40e3eac55eb1f869318cd4fdc9c034b33e83709552655dfdbc5690d1d012c2bd4dca9db87aa9d66f9522c74efa3ee826ccbaf94dde
-
SSDEEP
49152:iTyK/OPbLAZXqo49wC8yn0CN4i9ejIRCX/jgYpCTNalA07b2Mg7Wxzx4pAS5KLLe:UpO6y0O9UCUkemNUPb2MHNvnGiuqC
Malware Config
Extracted
danabot
23.236.181.126:443
142.11.226.233:443
23.254.224.247:443
23.254.231.10:443
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 14 IoCs
flow pid Process 3 2520 rundll32.exe 5 2520 rundll32.exe 6 2520 rundll32.exe 7 2520 rundll32.exe 8 2520 rundll32.exe 9 2520 rundll32.exe 10 2520 rundll32.exe 11 2520 rundll32.exe 12 2520 rundll32.exe 13 2520 rundll32.exe 14 2520 rundll32.exe 15 2520 rundll32.exe 16 2520 rundll32.exe 17 2520 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2520 2712 rundll32.exe 30 PID 2712 wrote to memory of 2520 2712 rundll32.exe 30 PID 2712 wrote to memory of 2520 2712 rundll32.exe 30 PID 2712 wrote to memory of 2520 2712 rundll32.exe 30 PID 2712 wrote to memory of 2520 2712 rundll32.exe 30 PID 2712 wrote to memory of 2520 2712 rundll32.exe 30 PID 2712 wrote to memory of 2520 2712 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46b165002c61b435c7e0e20c58aeed34d51a8166ddffe61be6931ac2d1dad3d6N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46b165002c61b435c7e0e20c58aeed34d51a8166ddffe61be6931ac2d1dad3d6N.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2520
-