Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/10/2022, 04:17

General

  • Target

    8c9143ae4670b98579f711c960206fe0e20386e87340188c1c37673545ea3d9e.exe

  • Size

    267KB

  • MD5

    f56a6b0c5dece27be9c0dfcd5ba3dd05

  • SHA1

    1f44751fe41663d9b3f5a0fec658321ec962acc5

  • SHA256

    8c9143ae4670b98579f711c960206fe0e20386e87340188c1c37673545ea3d9e

  • SHA512

    fed3dc8971c1bf39d34fb330d0219380bccd4030f9740883fe89105abe9517b11f434e5330dd0e03db68b1d2415663c7de61c64be77c79476ba51eaff875cbb9

  • SSDEEP

    3072:YXIEuKOnkmql6N2x5ceSle3BnwKB5Xmb2KTncL60PwPT0WrxpzbgqruhA5QKWuDq:s+ol6H6Bf7McWLPT0uzbgwuhAgIwVfU

Malware Config

Extracted

Family

danabot

C2

192.236.233.188:443

192.119.70.159:443

23.106.124.171:443

213.227.155.103:443

49.0.50.0:57

51.0.52.0:0

53.0.54.0:1200

55.0.56.0:65535

Attributes
  • embedded_hash

    56951C922035D696BFCE443750496462

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 42 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 47 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c9143ae4670b98579f711c960206fe0e20386e87340188c1c37673545ea3d9e.exe
    "C:\Users\Admin\AppData\Local\Temp\8c9143ae4670b98579f711c960206fe0e20386e87340188c1c37673545ea3d9e.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3536
  • C:\Users\Admin\AppData\Local\Temp\E29.exe
    C:\Users\Admin\AppData\Local\Temp\E29.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Windows\SysWOW64\agentactivationruntimestarter.exe
      C:\Windows\system32\agentactivationruntimestarter.exe
      2⤵
        PID:4000
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        PID:1268
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 620
        2⤵
        • Program crash
        PID:1004
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 880
        2⤵
        • Program crash
        PID:2304
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 924
        2⤵
        • Program crash
        PID:4928
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 904
        2⤵
        • Program crash
        PID:2536
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:2852
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 1032
        2⤵
        • Program crash
        PID:968
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:2960
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x2ec 0x498
      1⤵
        PID:4552
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3424 -ip 3424
        1⤵
          PID:1420
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3424 -ip 3424
          1⤵
            PID:4892
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3424 -ip 3424
            1⤵
              PID:4716
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3424 -ip 3424
              1⤵
                PID:4400
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3424 -ip 3424
                1⤵
                  PID:2072
                • C:\Users\Admin\AppData\Roaming\wsdrhbd
                  C:\Users\Admin\AppData\Roaming\wsdrhbd
                  1⤵
                  • Executes dropped EXE
                  • Checks SCSI registry key(s)
                  PID:4816

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\E29.exe

                  Filesize

                  1.3MB

                  MD5

                  8b97a9004a611ee5f1eda58cc8d057c6

                  SHA1

                  18307e806c6e289a048a9e82635bdf9be21de5c6

                  SHA256

                  e03f5bd6defc4d57b263955bafd77b8c8ceaf2d9ad4e6108948b7b558177dace

                  SHA512

                  362984800177f5804b99ed5a492c01a117f84cc02bdf1ecb00b47a4dae5a2b00b60ea89826e3a8ac6ffc82cbebf1ec2cafcca59ea44c3daff1b9b4b83eafc187

                • C:\Users\Admin\AppData\Local\Temp\E29.exe

                  Filesize

                  1.3MB

                  MD5

                  8b97a9004a611ee5f1eda58cc8d057c6

                  SHA1

                  18307e806c6e289a048a9e82635bdf9be21de5c6

                  SHA256

                  e03f5bd6defc4d57b263955bafd77b8c8ceaf2d9ad4e6108948b7b558177dace

                  SHA512

                  362984800177f5804b99ed5a492c01a117f84cc02bdf1ecb00b47a4dae5a2b00b60ea89826e3a8ac6ffc82cbebf1ec2cafcca59ea44c3daff1b9b4b83eafc187

                • C:\Users\Admin\AppData\Local\Temp\Sepawuaopqtypsq.tmp

                  Filesize

                  3.3MB

                  MD5

                  8b9c0f72deaf2ee06e7441209cbe4ffb

                  SHA1

                  34912f3c7f4285d85497c96e95c33e5d6a597c97

                  SHA256

                  1e7242ac7c025b87636e59c07e3601f1bbf5894ce0b23709405b6fefbca4dabe

                  SHA512

                  db8fb980b6331f494fea8dd4adf6d8724c9ad1a7a2048c6d91e49d9e81fc83700c1195854efc5dcbe2b3aef8d94b5f0ddd7ae8910f40b9cdab017e381f855cd7

                • C:\Users\Admin\AppData\Roaming\wsdrhbd

                  Filesize

                  267KB

                  MD5

                  f56a6b0c5dece27be9c0dfcd5ba3dd05

                  SHA1

                  1f44751fe41663d9b3f5a0fec658321ec962acc5

                  SHA256

                  8c9143ae4670b98579f711c960206fe0e20386e87340188c1c37673545ea3d9e

                  SHA512

                  fed3dc8971c1bf39d34fb330d0219380bccd4030f9740883fe89105abe9517b11f434e5330dd0e03db68b1d2415663c7de61c64be77c79476ba51eaff875cbb9

                • C:\Users\Admin\AppData\Roaming\wsdrhbd

                  Filesize

                  267KB

                  MD5

                  f56a6b0c5dece27be9c0dfcd5ba3dd05

                  SHA1

                  1f44751fe41663d9b3f5a0fec658321ec962acc5

                  SHA256

                  8c9143ae4670b98579f711c960206fe0e20386e87340188c1c37673545ea3d9e

                  SHA512

                  fed3dc8971c1bf39d34fb330d0219380bccd4030f9740883fe89105abe9517b11f434e5330dd0e03db68b1d2415663c7de61c64be77c79476ba51eaff875cbb9

                • memory/1268-153-0x0000000000F70000-0x0000000000F74000-memory.dmp

                  Filesize

                  16KB

                • memory/1268-147-0x0000000000F10000-0x0000000000F14000-memory.dmp

                  Filesize

                  16KB

                • memory/1268-158-0x0000000000FC0000-0x0000000000FC4000-memory.dmp

                  Filesize

                  16KB

                • memory/1268-157-0x0000000000FB0000-0x0000000000FB4000-memory.dmp

                  Filesize

                  16KB

                • memory/1268-156-0x0000000000FA0000-0x0000000000FA4000-memory.dmp

                  Filesize

                  16KB

                • memory/1268-148-0x0000000000F20000-0x0000000000F24000-memory.dmp

                  Filesize

                  16KB

                • memory/1268-154-0x0000000000F80000-0x0000000000F84000-memory.dmp

                  Filesize

                  16KB

                • memory/1268-159-0x0000000000FD0000-0x0000000000FD4000-memory.dmp

                  Filesize

                  16KB

                • memory/1268-160-0x0000000000FD0000-0x0000000000FD4000-memory.dmp

                  Filesize

                  16KB

                • memory/1268-149-0x0000000000F30000-0x0000000000F34000-memory.dmp

                  Filesize

                  16KB

                • memory/1268-155-0x0000000000F90000-0x0000000000F94000-memory.dmp

                  Filesize

                  16KB

                • memory/1268-152-0x0000000000F60000-0x0000000000F64000-memory.dmp

                  Filesize

                  16KB

                • memory/1268-150-0x0000000000F40000-0x0000000000F44000-memory.dmp

                  Filesize

                  16KB

                • memory/1268-151-0x0000000000F50000-0x0000000000F54000-memory.dmp

                  Filesize

                  16KB

                • memory/2852-180-0x00000000033A0000-0x0000000003E63000-memory.dmp

                  Filesize

                  10.8MB

                • memory/2852-179-0x00000000033A0000-0x0000000003E63000-memory.dmp

                  Filesize

                  10.8MB

                • memory/2852-175-0x00000000033A0000-0x0000000003E63000-memory.dmp

                  Filesize

                  10.8MB

                • memory/2852-176-0x0000000003EF0000-0x0000000004030000-memory.dmp

                  Filesize

                  1.2MB

                • memory/2852-177-0x0000000003EF0000-0x0000000004030000-memory.dmp

                  Filesize

                  1.2MB

                • memory/2852-178-0x0000000001000000-0x00000000019A4000-memory.dmp

                  Filesize

                  9.6MB

                • memory/3424-144-0x0000000000400000-0x00000000006CE000-memory.dmp

                  Filesize

                  2.8MB

                • memory/3424-143-0x0000000000400000-0x00000000006CE000-memory.dmp

                  Filesize

                  2.8MB

                • memory/3424-182-0x0000000003150000-0x0000000003C13000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3424-162-0x0000000003150000-0x0000000003C13000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3424-163-0x0000000003150000-0x0000000003C13000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3424-164-0x0000000003150000-0x0000000003C13000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3424-165-0x0000000003E50000-0x0000000003F90000-memory.dmp

                  Filesize

                  1.2MB

                • memory/3424-166-0x0000000003E50000-0x0000000003F90000-memory.dmp

                  Filesize

                  1.2MB

                • memory/3424-168-0x0000000003E50000-0x0000000003F90000-memory.dmp

                  Filesize

                  1.2MB

                • memory/3424-167-0x0000000003E50000-0x0000000003F90000-memory.dmp

                  Filesize

                  1.2MB

                • memory/3424-169-0x0000000003E50000-0x0000000003F90000-memory.dmp

                  Filesize

                  1.2MB

                • memory/3424-170-0x0000000003E50000-0x0000000003F90000-memory.dmp

                  Filesize

                  1.2MB

                • memory/3424-171-0x0000000003E50000-0x0000000003F90000-memory.dmp

                  Filesize

                  1.2MB

                • memory/3424-145-0x0000000000400000-0x00000000006CE000-memory.dmp

                  Filesize

                  2.8MB

                • memory/3424-172-0x0000000003E50000-0x0000000003F90000-memory.dmp

                  Filesize

                  1.2MB

                • memory/3424-174-0x0000000000400000-0x00000000006CE000-memory.dmp

                  Filesize

                  2.8MB

                • memory/3424-142-0x0000000000400000-0x00000000006CE000-memory.dmp

                  Filesize

                  2.8MB

                • memory/3424-141-0x0000000002680000-0x0000000002942000-memory.dmp

                  Filesize

                  2.8MB

                • memory/3424-140-0x0000000002558000-0x0000000002676000-memory.dmp

                  Filesize

                  1.1MB

                • memory/3424-181-0x0000000000400000-0x00000000006CE000-memory.dmp

                  Filesize

                  2.8MB

                • memory/3536-135-0x0000000000400000-0x0000000000448000-memory.dmp

                  Filesize

                  288KB

                • memory/3536-132-0x000000000053D000-0x000000000054E000-memory.dmp

                  Filesize

                  68KB

                • memory/3536-134-0x0000000000400000-0x0000000000448000-memory.dmp

                  Filesize

                  288KB

                • memory/3536-133-0x00000000004C0000-0x00000000004C9000-memory.dmp

                  Filesize

                  36KB

                • memory/4816-185-0x00000000006BD000-0x00000000006CE000-memory.dmp

                  Filesize

                  68KB

                • memory/4816-186-0x0000000000400000-0x0000000000448000-memory.dmp

                  Filesize

                  288KB