Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 22:55
Static task
static1
Behavioral task
behavioral1
Sample
7f87c8327acfc6ca350781a2ec84254eb5e759fc83a65dd13db2cbdca44d6165N.dll
Resource
win7-20240903-en
General
-
Target
7f87c8327acfc6ca350781a2ec84254eb5e759fc83a65dd13db2cbdca44d6165N.dll
-
Size
4.3MB
-
MD5
973b3f23a7dc1a79c5a1d63941a1cbd0
-
SHA1
0644bb719b3a2a64c32a8096de47f0305d7b11fe
-
SHA256
7f87c8327acfc6ca350781a2ec84254eb5e759fc83a65dd13db2cbdca44d6165
-
SHA512
0a13d6dfbc4fdd330ce67217bb92ad68e283912c298f624c4be258a867c490afe4da267fb986be281749c6e111bfbf9473daa9d097f1f13b75d70fe4df93ce07
-
SSDEEP
49152:qMpitQoS/YAgJUCwC4PH2DIi4UtrXnQ7cf0ju5WSLqvezCnKaqlrDTk95XeDP:7stQoS/YPfn4PWUctrQ7cf0jRDWreX
Malware Config
Extracted
danabot
104.234.239.223:443
104.234.119.237:443
104.156.149.14:443
104.234.119.246:443
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 15 IoCs
flow pid Process 14 1596 rundll32.exe 15 1596 rundll32.exe 16 1596 rundll32.exe 24 1596 rundll32.exe 25 1596 rundll32.exe 38 1596 rundll32.exe 39 1596 rundll32.exe 40 1596 rundll32.exe 42 1596 rundll32.exe 46 1596 rundll32.exe 47 1596 rundll32.exe 48 1596 rundll32.exe 49 1596 rundll32.exe 55 1596 rundll32.exe 56 1596 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1596 2360 rundll32.exe 82 PID 2360 wrote to memory of 1596 2360 rundll32.exe 82 PID 2360 wrote to memory of 1596 2360 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f87c8327acfc6ca350781a2ec84254eb5e759fc83a65dd13db2cbdca44d6165N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f87c8327acfc6ca350781a2ec84254eb5e759fc83a65dd13db2cbdca44d6165N.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1596
-