Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
76b7125cafff8d6b77629def5a86199d912e7d76.exe
Resource
win7-20240903-en
General
-
Target
76b7125cafff8d6b77629def5a86199d912e7d76.exe
-
Size
1.2MB
-
MD5
0cd7b22bfcd2ae0ee4994e82b54fcf81
-
SHA1
76b7125cafff8d6b77629def5a86199d912e7d76
-
SHA256
d79c1cf0eb9bae702ffb9d6b9f571ad6ca15f5e3c532616b35895561a30335ed
-
SHA512
1987b54d334523f89eaa9fa4084357062c86893d23d1cfd54cf10d10a58e41eace3d7f0cd3d075bf29d0d068225df38de09b89a3b55dad647770f13c6558fa50
-
SSDEEP
24576:tqv8Vv5zCjHuU4izn7QRXDr1a0MIdYxJylZL6L9:tq0ZUlnkRXDr1xMIqLy2x
Malware Config
Extracted
danabot
4
142.11.192.232:443
142.11.242.31:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Signatures
-
Danabot Loader Component 10 IoCs
resource yara_rule behavioral2/files/0x000600000001e4dc-6.dat DanabotLoader2021 behavioral2/memory/3444-11-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/3444-19-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/3444-20-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/3444-21-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/3444-22-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/3444-23-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/3444-24-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/3444-25-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/3444-26-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 -
Danabot family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 56 3444 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 3444 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3720 4396 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76b7125cafff8d6b77629def5a86199d912e7d76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4396 wrote to memory of 3444 4396 76b7125cafff8d6b77629def5a86199d912e7d76.exe 91 PID 4396 wrote to memory of 3444 4396 76b7125cafff8d6b77629def5a86199d912e7d76.exe 91 PID 4396 wrote to memory of 3444 4396 76b7125cafff8d6b77629def5a86199d912e7d76.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\76b7125cafff8d6b77629def5a86199d912e7d76.exe"C:\Users\Admin\AppData\Local\Temp\76b7125cafff8d6b77629def5a86199d912e7d76.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\76B712~1.DLL,s C:\Users\Admin\AppData\Local\Temp\76B712~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 5082⤵
- Program crash
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4396 -ip 43961⤵PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD56322d33f0db30b3a3a43453ce2700cb5
SHA119a330da46cdd07867604241857b45af38888078
SHA256087b81a295374cf8c7b59a3c4e75a5fa181007edff0c9a20528b55cf35a6dd84
SHA512f554dabd537cde798861cc699f9fdd6a8aae90b8b12529ddfa97b38f5077fe8edd8a8a41e5f6319209cd61f854a71c4838394246891ade6f2c4eda476294d70c