Analysis
-
max time kernel
110s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 22:55
Static task
static1
Behavioral task
behavioral1
Sample
7f87c8327acfc6ca350781a2ec84254eb5e759fc83a65dd13db2cbdca44d6165N.dll
Resource
win7-20240903-en
General
-
Target
7f87c8327acfc6ca350781a2ec84254eb5e759fc83a65dd13db2cbdca44d6165N.dll
-
Size
4.3MB
-
MD5
973b3f23a7dc1a79c5a1d63941a1cbd0
-
SHA1
0644bb719b3a2a64c32a8096de47f0305d7b11fe
-
SHA256
7f87c8327acfc6ca350781a2ec84254eb5e759fc83a65dd13db2cbdca44d6165
-
SHA512
0a13d6dfbc4fdd330ce67217bb92ad68e283912c298f624c4be258a867c490afe4da267fb986be281749c6e111bfbf9473daa9d097f1f13b75d70fe4df93ce07
-
SSDEEP
49152:qMpitQoS/YAgJUCwC4PH2DIi4UtrXnQ7cf0ju5WSLqvezCnKaqlrDTk95XeDP:7stQoS/YPfn4PWUctrQ7cf0jRDWreX
Malware Config
Extracted
danabot
104.234.239.223:443
104.234.119.237:443
104.156.149.14:443
104.234.119.246:443
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 17 IoCs
flow pid Process 3 2668 rundll32.exe 4 2668 rundll32.exe 5 2668 rundll32.exe 7 2668 rundll32.exe 8 2668 rundll32.exe 9 2668 rundll32.exe 10 2668 rundll32.exe 11 2668 rundll32.exe 12 2668 rundll32.exe 13 2668 rundll32.exe 14 2668 rundll32.exe 15 2668 rundll32.exe 16 2668 rundll32.exe 17 2668 rundll32.exe 18 2668 rundll32.exe 19 2668 rundll32.exe 20 2668 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2668 1600 rundll32.exe 30 PID 1600 wrote to memory of 2668 1600 rundll32.exe 30 PID 1600 wrote to memory of 2668 1600 rundll32.exe 30 PID 1600 wrote to memory of 2668 1600 rundll32.exe 30 PID 1600 wrote to memory of 2668 1600 rundll32.exe 30 PID 1600 wrote to memory of 2668 1600 rundll32.exe 30 PID 1600 wrote to memory of 2668 1600 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f87c8327acfc6ca350781a2ec84254eb5e759fc83a65dd13db2cbdca44d6165N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f87c8327acfc6ca350781a2ec84254eb5e759fc83a65dd13db2cbdca44d6165N.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2668
-