Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2022, 06:10

General

  • Target

    0d61854433bd9993177f977182bb1a3c29a339029e969515362910dc12d7c5ff.exe

  • Size

    1.4MB

  • MD5

    ad249734c9084190f4a7de38913a5d6a

  • SHA1

    a949eb32b55a621adc6f1471d5de85d1e8450e87

  • SHA256

    0d61854433bd9993177f977182bb1a3c29a339029e969515362910dc12d7c5ff

  • SHA512

    e4d7473529b98ce1a8e239d781a27b769d5565681c5b8f68d73a0321636137bbd87d57351bf8b144449669c0c780255e6ef814df8a21870ea935981f47014fe0

  • SSDEEP

    24576:QregzTQdvsek+yLJzKf3FF3Ys+w2hJ5P34cyjs9Q83z7v7SxEPHR:QqgzTOk+y1zyF3Ys/2Qjz83zb7EoH

Score
10/10

Malware Config

Extracted

Family

danabot

C2

192.236.233.188:443

23.106.124.171:443

192.119.70.159:443

Attributes
  • embedded_hash

    A813CAF845B5703DA814AF785BB60B21

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 36 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 51 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d61854433bd9993177f977182bb1a3c29a339029e969515362910dc12d7c5ff.exe
    "C:\Users\Admin\AppData\Local\Temp\0d61854433bd9993177f977182bb1a3c29a339029e969515362910dc12d7c5ff.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Windows\SysWOW64\agentactivationruntimestarter.exe
      C:\Windows\system32\agentactivationruntimestarter.exe
      2⤵
        PID:3084
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        PID:4980
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 596
        2⤵
        • Program crash
        PID:4960
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 928
        2⤵
        • Program crash
        PID:5012
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 928
        2⤵
        • Program crash
        PID:2736
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 1072
        2⤵
        • Program crash
        PID:3384
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:5036
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 1080
        2⤵
        • Program crash
        PID:4292
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:2408
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x150 0x2cc
      1⤵
        PID:448
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2228 -ip 2228
        1⤵
          PID:4692
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2228 -ip 2228
          1⤵
            PID:4968
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k netsvcs -p
            1⤵
            • Drops file in System32 directory
            • Checks processor information in registry
            • Enumerates system info in registry
            PID:628
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2228 -ip 2228
            1⤵
              PID:3684
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2228 -ip 2228
              1⤵
                PID:860
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2228 -ip 2228
                1⤵
                  PID:1408

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\Pyttofehs.tmp

                  Filesize

                  3.3MB

                  MD5

                  2650634b147c287fe1040f3efb6e9a15

                  SHA1

                  0a4aea004ebc7d42249909cab658b09f87e4cd16

                  SHA256

                  39668f3125e1fb7e220f6f3566783eb6b3126c39d3b63be287172d16018accbf

                  SHA512

                  d7634b9f01a6b055433643a04f89ce5c623879c5a8acac52beea9b0918388e7d291db541f4ce7f8b2dfb83ddbd5780b3a6fbf97579b4441e59142c812b62dc50

                • memory/2228-154-0x0000000003E50000-0x0000000003F90000-memory.dmp

                  Filesize

                  1.2MB

                • memory/2228-134-0x00000000024B0000-0x000000000277E000-memory.dmp

                  Filesize

                  2.8MB

                • memory/2228-135-0x0000000000400000-0x00000000006DA000-memory.dmp

                  Filesize

                  2.9MB

                • memory/2228-136-0x0000000000400000-0x00000000006DA000-memory.dmp

                  Filesize

                  2.9MB

                • memory/2228-137-0x0000000000400000-0x00000000006DA000-memory.dmp

                  Filesize

                  2.9MB

                • memory/2228-138-0x0000000000400000-0x00000000006DA000-memory.dmp

                  Filesize

                  2.9MB

                • memory/2228-164-0x00000000031D0000-0x0000000003C87000-memory.dmp

                  Filesize

                  10.7MB

                • memory/2228-152-0x0000000003E50000-0x0000000003F90000-memory.dmp

                  Filesize

                  1.2MB

                • memory/2228-153-0x0000000003E50000-0x0000000003F90000-memory.dmp

                  Filesize

                  1.2MB

                • memory/2228-155-0x0000000003E50000-0x0000000003F90000-memory.dmp

                  Filesize

                  1.2MB

                • memory/2228-144-0x00000000031D0000-0x0000000003C87000-memory.dmp

                  Filesize

                  10.7MB

                • memory/2228-145-0x0000000000400000-0x00000000006DA000-memory.dmp

                  Filesize

                  2.9MB

                • memory/2228-133-0x0000000000B6C000-0x0000000000C8E000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2228-146-0x00000000031D0000-0x0000000003C87000-memory.dmp

                  Filesize

                  10.7MB

                • memory/2228-147-0x00000000031D0000-0x0000000003C87000-memory.dmp

                  Filesize

                  10.7MB

                • memory/2228-148-0x0000000003E50000-0x0000000003F90000-memory.dmp

                  Filesize

                  1.2MB

                • memory/2228-149-0x0000000003E50000-0x0000000003F90000-memory.dmp

                  Filesize

                  1.2MB

                • memory/2228-150-0x0000000003E50000-0x0000000003F90000-memory.dmp

                  Filesize

                  1.2MB

                • memory/2228-151-0x0000000003E50000-0x0000000003F90000-memory.dmp

                  Filesize

                  1.2MB

                • memory/4980-141-0x0000000000A30000-0x0000000000A34000-memory.dmp

                  Filesize

                  16KB

                • memory/4980-142-0x0000000000A30000-0x0000000000A34000-memory.dmp

                  Filesize

                  16KB

                • memory/4980-140-0x0000000000A20000-0x0000000000A24000-memory.dmp

                  Filesize

                  16KB

                • memory/5036-157-0x0000000000A30000-0x00000000013C8000-memory.dmp

                  Filesize

                  9.6MB

                • memory/5036-158-0x0000000002FB0000-0x0000000003A67000-memory.dmp

                  Filesize

                  10.7MB

                • memory/5036-159-0x0000000003B30000-0x0000000003C70000-memory.dmp

                  Filesize

                  1.2MB

                • memory/5036-160-0x0000000003B30000-0x0000000003C70000-memory.dmp

                  Filesize

                  1.2MB

                • memory/5036-161-0x0000000002FB0000-0x0000000003A67000-memory.dmp

                  Filesize

                  10.7MB

                • memory/5036-162-0x0000000002FB0000-0x0000000003A67000-memory.dmp

                  Filesize

                  10.7MB

                • memory/5036-163-0x0000000000A30000-0x00000000013C8000-memory.dmp

                  Filesize

                  9.6MB