Analysis
-
max time kernel
111s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 18:16
Static task
static1
Behavioral task
behavioral1
Sample
46b165002c61b435c7e0e20c58aeed34d51a8166ddffe61be6931ac2d1dad3d6N.dll
Resource
win7-20240903-en
General
-
Target
46b165002c61b435c7e0e20c58aeed34d51a8166ddffe61be6931ac2d1dad3d6N.dll
-
Size
4.3MB
-
MD5
4a0ad493456a8c94ae03ecb2824c2ea0
-
SHA1
78d764f9744217ec38e18a7d2886506495778462
-
SHA256
46b165002c61b435c7e0e20c58aeed34d51a8166ddffe61be6931ac2d1dad3d6
-
SHA512
82244b19144ea5807e23cd40e3eac55eb1f869318cd4fdc9c034b33e83709552655dfdbc5690d1d012c2bd4dca9db87aa9d66f9522c74efa3ee826ccbaf94dde
-
SSDEEP
49152:iTyK/OPbLAZXqo49wC8yn0CN4i9ejIRCX/jgYpCTNalA07b2Mg7Wxzx4pAS5KLLe:UpO6y0O9UCUkemNUPb2MHNvnGiuqC
Malware Config
Extracted
danabot
23.236.181.126:443
142.11.226.233:443
23.254.224.247:443
23.254.231.10:443
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 10 IoCs
Processes:
rundll32.exeflow pid Process 10 2472 rundll32.exe 15 2472 rundll32.exe 33 2472 rundll32.exe 35 2472 rundll32.exe 36 2472 rundll32.exe 38 2472 rundll32.exe 41 2472 rundll32.exe 42 2472 rundll32.exe 47 2472 rundll32.exe 48 2472 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 4880 wrote to memory of 2472 4880 rundll32.exe 82 PID 4880 wrote to memory of 2472 4880 rundll32.exe 82 PID 4880 wrote to memory of 2472 4880 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46b165002c61b435c7e0e20c58aeed34d51a8166ddffe61be6931ac2d1dad3d6N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46b165002c61b435c7e0e20c58aeed34d51a8166ddffe61be6931ac2d1dad3d6N.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2472
-