Analysis
-
max time kernel
114s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 15:09
Static task
static1
Behavioral task
behavioral1
Sample
de158e86683f201a2c8e54cfa6cfb8479b9876a097141912937f32908975f324N.dll
Resource
win7-20240729-en
General
-
Target
de158e86683f201a2c8e54cfa6cfb8479b9876a097141912937f32908975f324N.dll
-
Size
1.3MB
-
MD5
80ac174a24937baf8bb3fdd781ca8c50
-
SHA1
5592c616f56827bceea0ba74147d03b6b3dbd1a7
-
SHA256
de158e86683f201a2c8e54cfa6cfb8479b9876a097141912937f32908975f324
-
SHA512
46620a5bfeeefcbc1a2bc445104c0e536756d5f82ecd7a5ba4af0d7b61e8a4893a38c8f30e3c3f2a1396a8b00c9028888ca02b99cb988880f72c957882750ac2
-
SSDEEP
24576:pbX7jHgZPGXo6M+QhlE5gp980MZAVsBgTlB47lH32Wq2tdMKeB1gSggIw:pPbgZPGX/M+GCm8vrB5ZZYBI
Malware Config
Extracted
danabot
53.128.18.18
98.171.58.197
192.71.249.51
225.74.56.39
37.65.171.19
112.253.42.12
176.177.153.116
15.154.247.162
151.236.14.84
140.90.53.163
Signatures
-
Danabot family
-
Blocklisted process makes network request 5 IoCs
flow pid Process 23 672 rundll32.exe 37 672 rundll32.exe 38 672 rundll32.exe 41 672 rundll32.exe 47 672 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1588 wrote to memory of 1680 1588 regsvr32.exe 83 PID 1588 wrote to memory of 1680 1588 regsvr32.exe 83 PID 1588 wrote to memory of 1680 1588 regsvr32.exe 83 PID 1680 wrote to memory of 672 1680 regsvr32.exe 93 PID 1680 wrote to memory of 672 1680 regsvr32.exe 93 PID 1680 wrote to memory of 672 1680 regsvr32.exe 93
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\de158e86683f201a2c8e54cfa6cfb8479b9876a097141912937f32908975f324N.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\de158e86683f201a2c8e54cfa6cfb8479b9876a097141912937f32908975f324N.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\de158e86683f201a2c8e54cfa6cfb8479b9876a097141912937f32908975f324N.dll,f03⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:672
-
-