Analysis
-
max time kernel
143s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
76b7125cafff8d6b77629def5a86199d912e7d76.exe
Resource
win7-20240903-en
General
-
Target
76b7125cafff8d6b77629def5a86199d912e7d76.exe
-
Size
1.2MB
-
MD5
0cd7b22bfcd2ae0ee4994e82b54fcf81
-
SHA1
76b7125cafff8d6b77629def5a86199d912e7d76
-
SHA256
d79c1cf0eb9bae702ffb9d6b9f571ad6ca15f5e3c532616b35895561a30335ed
-
SHA512
1987b54d334523f89eaa9fa4084357062c86893d23d1cfd54cf10d10a58e41eace3d7f0cd3d075bf29d0d068225df38de09b89a3b55dad647770f13c6558fa50
-
SSDEEP
24576:tqv8Vv5zCjHuU4izn7QRXDr1a0MIdYxJylZL6L9:tq0ZUlnkRXDr1xMIqLy2x
Malware Config
Extracted
danabot
4
142.11.192.232:443
142.11.242.31:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Signatures
-
Danabot Loader Component 11 IoCs
resource yara_rule behavioral2/files/0x000400000001da71-6.dat DanabotLoader2021 behavioral2/memory/5020-9-0x0000000002370000-0x00000000024D2000-memory.dmp DanabotLoader2021 behavioral2/memory/5020-13-0x0000000002370000-0x00000000024D2000-memory.dmp DanabotLoader2021 behavioral2/memory/5020-21-0x0000000002370000-0x00000000024D2000-memory.dmp DanabotLoader2021 behavioral2/memory/5020-22-0x0000000002370000-0x00000000024D2000-memory.dmp DanabotLoader2021 behavioral2/memory/5020-23-0x0000000002370000-0x00000000024D2000-memory.dmp DanabotLoader2021 behavioral2/memory/5020-24-0x0000000002370000-0x00000000024D2000-memory.dmp DanabotLoader2021 behavioral2/memory/5020-25-0x0000000002370000-0x00000000024D2000-memory.dmp DanabotLoader2021 behavioral2/memory/5020-26-0x0000000002370000-0x00000000024D2000-memory.dmp DanabotLoader2021 behavioral2/memory/5020-27-0x0000000002370000-0x00000000024D2000-memory.dmp DanabotLoader2021 behavioral2/memory/5020-28-0x0000000002370000-0x00000000024D2000-memory.dmp DanabotLoader2021 -
Danabot family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 58 5020 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 5020 rundll32.exe 5020 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1864 1132 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76b7125cafff8d6b77629def5a86199d912e7d76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1132 wrote to memory of 5020 1132 76b7125cafff8d6b77629def5a86199d912e7d76.exe 91 PID 1132 wrote to memory of 5020 1132 76b7125cafff8d6b77629def5a86199d912e7d76.exe 91 PID 1132 wrote to memory of 5020 1132 76b7125cafff8d6b77629def5a86199d912e7d76.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\76b7125cafff8d6b77629def5a86199d912e7d76.exe"C:\Users\Admin\AppData\Local\Temp\76b7125cafff8d6b77629def5a86199d912e7d76.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\76B712~1.DLL,s C:\Users\Admin\AppData\Local\Temp\76B712~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 5082⤵
- Program crash
PID:1864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1132 -ip 11321⤵PID:3736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5d35afc8295000e64904a97dfe00fcecd
SHA1231c02f3784ddaf2fb332987f793a579c62a20d3
SHA2565760e146167773329bb9551cc9f571b1b82e5429f33cfb398d741ca461e2082e
SHA512af65ab37f26990bbf31d6ccdbc354d8daa94a4b66ee4fcbadb8b94483e8d07ad903c7171ebbd38b23b5e951b98545428dece0a2bdd34a83488775088baccc3fb