Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/02/2025, 06:35
Static task
static1
Behavioral task
behavioral1
Sample
meitneriumatm.dll
Resource
win7-20240903-en
General
-
Target
meitneriumatm.dll
-
Size
7.7MB
-
MD5
043dae1b817ae561da9d6654b6354696
-
SHA1
a9f62f9ca8faa6023c4ef755d3b1f5aed2914516
-
SHA256
9de78011f776d2f3c963c6c3f77bc7af98ac51b4dbd11350850a8416bf767c36
-
SHA512
b7b44df89e93de8f31a35a22ed7b2d292cbad83ef564281af8e50aedade2f3ed4560b1e2ee9d91a5f1b270c407eafbef0f983895f8ed6651428ec5fe7389198e
-
SSDEEP
196608:H1HUS2bBcMYpFirD1s+KHONOXNAEbbTNk3S:HFUSw3o4lstuY9/
Malware Config
Extracted
danabot
-
embedded_hash
5059953BB045843A520147F73664DC78
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 5 IoCs
flow pid Process 2 1724 rundll32.exe 3 1724 rundll32.exe 4 1724 rundll32.exe 5 1724 rundll32.exe 6 1724 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1724 1268 rundll32.exe 30 PID 1268 wrote to memory of 1724 1268 rundll32.exe 30 PID 1268 wrote to memory of 1724 1268 rundll32.exe 30 PID 1268 wrote to memory of 1724 1268 rundll32.exe 30 PID 1268 wrote to memory of 1724 1268 rundll32.exe 30 PID 1268 wrote to memory of 1724 1268 rundll32.exe 30 PID 1268 wrote to memory of 1724 1268 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\meitneriumatm.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\meitneriumatm.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD55ad3b8753a03b062928ea9735a766d49
SHA178bca65e201bf8a1eb59a821bed267c0d4a8d8dc
SHA25631e94b89351780341c5fee89d61916f9aeac67d8b89d591627f87b0996d0e21a
SHA5124f1ef4450098646e4b86956ab7ff357111592fcee32840980128f6ebc360e50d02afc0368a8dc18cf8154e9733cc805497135a1d4a1ff26646e0f9f82744be13
-
Filesize
347B
MD5d3d052f6c0a816eaba1dd06a6b8e5185
SHA1f532133f127cb05f7095b1a2920c7bdadf4138fd
SHA256f42b1e43290465067dfede17bad3992294104879db15d6d9eee1d032e69e293c
SHA51250370d6db345f03d5f9f7e633963cf483bfd9149b72a536cbe1710c720fbf746fdb4e7856266de9b32d95216a4acafa03cfe71b5d38d6f4671106fb91ab760e4
-
Filesize
242KB
MD5541f52e24fe1ef9f8e12377a6ccae0c0
SHA1189898bb2dcae7d5a6057bc2d98b8b450afaebb6
SHA25681e3a4d43a73699e1b7781723f56b8717175c536685c5450122b30789464ad82
SHA512d779d78a15c5efca51ebd6b96a7ccb6d718741bdf7d9a37f53b2eb4b98aa1a78bc4cfa57d6e763aab97276c8f9088940ac0476690d4d46023ff4bf52f3326c88