Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    88s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/09/2022, 22:40

General

  • Target

    9115677abd44ce89dde29c1b9bddeffff32ba6c8c7bac42090facf075eb487fd.exe

  • Size

    300KB

  • MD5

    07c209d0c5735ccb40e429f9296eb277

  • SHA1

    d1b451db40f173f5310126cbd8284147ec5eda02

  • SHA256

    9115677abd44ce89dde29c1b9bddeffff32ba6c8c7bac42090facf075eb487fd

  • SHA512

    747127ce8377c974158181d52392bff265351ec179767b40cca05f49b99d369343f8c3e26694364df210255fb3e2556f412026293241861115cd53a51f834aca

  • SSDEEP

    6144:vwnsL5FbOB5jzO9cgNJvEb0I5nigabwVf:IsNFKXja9ZvTI5i

Malware Config

Extracted

Family

danabot

C2

103.144.139.228:443

213.227.154.98:443

66.85.147.23:443

153.92.223.225:443

Attributes
  • embedded_hash

    A64A3A6ED13022027B84C77D31BE0C74

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9115677abd44ce89dde29c1b9bddeffff32ba6c8c7bac42090facf075eb487fd.exe
    "C:\Users\Admin\AppData\Local\Temp\9115677abd44ce89dde29c1b9bddeffff32ba6c8c7bac42090facf075eb487fd.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4928
  • C:\Users\Admin\AppData\Local\Temp\8DB9.exe
    C:\Users\Admin\AppData\Local\Temp\8DB9.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Etfrehti.dll,start C:\Users\Admin\AppData\Local\Temp\8DB9.exe
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Checks processor information in registry
      PID:1688
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:4152
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14102
          3⤵
            PID:2276
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
            3⤵
              PID:5116
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 508
            2⤵
            • Program crash
            PID:3764
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4828 -ip 4828
          1⤵
            PID:3904

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\8DB9.exe

            Filesize

            1.9MB

            MD5

            7daa71c2b7cfd89fd90d09754c57060f

            SHA1

            fd9cb190360eb5518b8480530bf1b0c5cb8d9256

            SHA256

            2cbbf29f2b68edcbae03779cddf46e361de1eb162d9676777e89878b76c23ce9

            SHA512

            aaee953da7a7ed498809cb332381072fa09d405d1e9d975660e1f942725a87b367e409286089d4bf46ac63c9ec63ad78c12a8de5129e573cc5d480b6c427e8af

          • C:\Users\Admin\AppData\Local\Temp\8DB9.exe

            Filesize

            1.9MB

            MD5

            7daa71c2b7cfd89fd90d09754c57060f

            SHA1

            fd9cb190360eb5518b8480530bf1b0c5cb8d9256

            SHA256

            2cbbf29f2b68edcbae03779cddf46e361de1eb162d9676777e89878b76c23ce9

            SHA512

            aaee953da7a7ed498809cb332381072fa09d405d1e9d975660e1f942725a87b367e409286089d4bf46ac63c9ec63ad78c12a8de5129e573cc5d480b6c427e8af

          • C:\Users\Admin\AppData\Local\Temp\Etfrehti.dll

            Filesize

            2.5MB

            MD5

            d7a66ca4622307cefbaf2d548edf21c1

            SHA1

            d6e7396cf81fddc86bd9a6adb17dbec09fbd532d

            SHA256

            c692330b06a1c232eafe7e68f867c6f339ca9545834010b0997e19f936ad0b5d

            SHA512

            4d9e5fa064ea98af43d5fef363a69a593fdd0ae5f4b79db0794bd5b12e9ffd0c52bb53b7c7b08141f4a33ea7b786f2164504af3295ee9466477270e69b87f41c

          • C:\Users\Admin\AppData\Local\Temp\Etfrehti.dll

            Filesize

            2.5MB

            MD5

            d7a66ca4622307cefbaf2d548edf21c1

            SHA1

            d6e7396cf81fddc86bd9a6adb17dbec09fbd532d

            SHA256

            c692330b06a1c232eafe7e68f867c6f339ca9545834010b0997e19f936ad0b5d

            SHA512

            4d9e5fa064ea98af43d5fef363a69a593fdd0ae5f4b79db0794bd5b12e9ffd0c52bb53b7c7b08141f4a33ea7b786f2164504af3295ee9466477270e69b87f41c

          • C:\Users\Admin\AppData\Local\Temp\Etfrehti.dll

            Filesize

            2.5MB

            MD5

            d7a66ca4622307cefbaf2d548edf21c1

            SHA1

            d6e7396cf81fddc86bd9a6adb17dbec09fbd532d

            SHA256

            c692330b06a1c232eafe7e68f867c6f339ca9545834010b0997e19f936ad0b5d

            SHA512

            4d9e5fa064ea98af43d5fef363a69a593fdd0ae5f4b79db0794bd5b12e9ffd0c52bb53b7c7b08141f4a33ea7b786f2164504af3295ee9466477270e69b87f41c

          • memory/980-142-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-154-0x0000000003000000-0x0000000003010000-memory.dmp

            Filesize

            64KB

          • memory/980-139-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-140-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-141-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-189-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-143-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-144-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-145-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-146-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-147-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-148-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-149-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-150-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-151-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-152-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-153-0x0000000003030000-0x0000000003040000-memory.dmp

            Filesize

            64KB

          • memory/980-138-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-155-0x0000000003000000-0x0000000003010000-memory.dmp

            Filesize

            64KB

          • memory/980-156-0x0000000003000000-0x0000000003010000-memory.dmp

            Filesize

            64KB

          • memory/980-157-0x0000000003000000-0x0000000003010000-memory.dmp

            Filesize

            64KB

          • memory/980-158-0x0000000003000000-0x0000000003010000-memory.dmp

            Filesize

            64KB

          • memory/980-159-0x0000000003000000-0x0000000003010000-memory.dmp

            Filesize

            64KB

          • memory/980-137-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-200-0x00000000088B0000-0x00000000088C0000-memory.dmp

            Filesize

            64KB

          • memory/980-136-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-196-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-195-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-194-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-193-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-199-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-192-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-204-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/980-205-0x00000000087F0000-0x0000000008800000-memory.dmp

            Filesize

            64KB

          • memory/980-191-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/1688-173-0x00000000023B0000-0x0000000002644000-memory.dmp

            Filesize

            2.6MB

          • memory/1688-174-0x0000000002DA0000-0x00000000037E4000-memory.dmp

            Filesize

            10.3MB

          • memory/1688-175-0x0000000002DA0000-0x00000000037E4000-memory.dmp

            Filesize

            10.3MB

          • memory/1688-176-0x0000000002DA0000-0x00000000037E4000-memory.dmp

            Filesize

            10.3MB

          • memory/1688-170-0x00000000023B0000-0x0000000002644000-memory.dmp

            Filesize

            2.6MB

          • memory/1688-178-0x00000000038F0000-0x0000000003A30000-memory.dmp

            Filesize

            1.2MB

          • memory/1688-179-0x00000000038F0000-0x0000000003A30000-memory.dmp

            Filesize

            1.2MB

          • memory/1688-180-0x00000000038F0000-0x0000000003A30000-memory.dmp

            Filesize

            1.2MB

          • memory/1688-181-0x00000000038F0000-0x0000000003A30000-memory.dmp

            Filesize

            1.2MB

          • memory/1688-182-0x00000000038F0000-0x0000000003A30000-memory.dmp

            Filesize

            1.2MB

          • memory/1688-183-0x00000000038F0000-0x0000000003A30000-memory.dmp

            Filesize

            1.2MB

          • memory/1688-171-0x00000000023B0000-0x0000000002644000-memory.dmp

            Filesize

            2.6MB

          • memory/2276-187-0x000001DD90360000-0x000001DD904A0000-memory.dmp

            Filesize

            1.2MB

          • memory/2276-185-0x000001DD90360000-0x000001DD904A0000-memory.dmp

            Filesize

            1.2MB

          • memory/2276-188-0x000001DD8EB60000-0x000001DD8ED4D000-memory.dmp

            Filesize

            1.9MB

          • memory/2276-186-0x0000000000700000-0x00000000008DE000-memory.dmp

            Filesize

            1.9MB

          • memory/4828-172-0x0000000000400000-0x00000000005EA000-memory.dmp

            Filesize

            1.9MB

          • memory/4828-165-0x0000000000400000-0x00000000005EA000-memory.dmp

            Filesize

            1.9MB

          • memory/4828-164-0x0000000002470000-0x000000000264C000-memory.dmp

            Filesize

            1.9MB

          • memory/4828-163-0x00000000022C6000-0x000000000246F000-memory.dmp

            Filesize

            1.7MB

          • memory/4928-132-0x0000000000759000-0x000000000076A000-memory.dmp

            Filesize

            68KB

          • memory/4928-135-0x0000000000400000-0x0000000000450000-memory.dmp

            Filesize

            320KB

          • memory/4928-134-0x0000000000400000-0x0000000000450000-memory.dmp

            Filesize

            320KB

          • memory/4928-133-0x00000000006E0000-0x00000000006E9000-memory.dmp

            Filesize

            36KB