Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
155s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12/10/2022, 00:52
Static task
static1
General
-
Target
8905f89f62de1843087ede5f6aa2d409f97322e0062b9fd86a5d0ecf4b66dc61.exe
-
Size
274KB
-
MD5
1b5d8a4ba40a71fd2c0db8c86c01b67d
-
SHA1
741ff872a93d6c13871f3ad8838d12df6f44a65b
-
SHA256
8905f89f62de1843087ede5f6aa2d409f97322e0062b9fd86a5d0ecf4b66dc61
-
SHA512
04a26ebb1169d6f147e2206f5df356c11157d29fab2da7f7e136ea35d3e8a8445ff78b7e33e4402282e6fe3e20f55182f5522b9245caa8883e818944bf0ebacf
-
SSDEEP
6144:sy7kDXlir/t1l6aeoRNIy3/irwVfquS/:TilS1g3oRO0/id
Malware Config
Extracted
danabot
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 50 5116 rundll32.exe 52 5116 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3032 665B.exe -
Deletes itself 1 IoCs
pid Process 3012 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3032 set thread context of 1984 3032 665B.exe 70 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8905f89f62de1843087ede5f6aa2d409f97322e0062b9fd86a5d0ecf4b66dc61.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8905f89f62de1843087ede5f6aa2d409f97322e0062b9fd86a5d0ecf4b66dc61.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8905f89f62de1843087ede5f6aa2d409f97322e0062b9fd86a5d0ecf4b66dc61.exe -
Checks processor information in registry 2 TTPs 40 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 665B.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString 665B.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 665B.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 665B.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data 665B.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information 665B.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 665B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 665B.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1828 8905f89f62de1843087ede5f6aa2d409f97322e0062b9fd86a5d0ecf4b66dc61.exe 1828 8905f89f62de1843087ede5f6aa2d409f97322e0062b9fd86a5d0ecf4b66dc61.exe 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3012 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1828 8905f89f62de1843087ede5f6aa2d409f97322e0062b9fd86a5d0ecf4b66dc61.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 3012 Process not Found Token: SeCreatePagefilePrivilege 3012 Process not Found Token: SeShutdownPrivilege 3012 Process not Found Token: SeCreatePagefilePrivilege 3012 Process not Found Token: SeShutdownPrivilege 3012 Process not Found Token: SeCreatePagefilePrivilege 3012 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3012 Process not Found 3012 Process not Found -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3032 3012 Process not Found 66 PID 3012 wrote to memory of 3032 3012 Process not Found 66 PID 3012 wrote to memory of 3032 3012 Process not Found 66 PID 3032 wrote to memory of 4196 3032 665B.exe 67 PID 3032 wrote to memory of 4196 3032 665B.exe 67 PID 3032 wrote to memory of 4196 3032 665B.exe 67 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 5116 3032 665B.exe 69 PID 3032 wrote to memory of 1984 3032 665B.exe 70 PID 3032 wrote to memory of 1984 3032 665B.exe 70 PID 3032 wrote to memory of 1984 3032 665B.exe 70 PID 3032 wrote to memory of 1984 3032 665B.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\8905f89f62de1843087ede5f6aa2d409f97322e0062b9fd86a5d0ecf4b66dc61.exe"C:\Users\Admin\AppData\Local\Temp\8905f89f62de1843087ede5f6aa2d409f97322e0062b9fd86a5d0ecf4b66dc61.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1828
-
C:\Users\Admin\AppData\Local\Temp\665B.exeC:\Users\Admin\AppData\Local\Temp\665B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\appidtel.exeC:\Windows\system32\appidtel.exe2⤵PID:4196
-
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:5116
-
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Checks processor information in registry
PID:1984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD522b4524f9ce69a16273177149a97ff08
SHA191f5a2fd3f83f69c915901dd52766aec92226f65
SHA25681ccd84f933b68c3553be88c2782980837cedc7645f3676a9e72f8e5ef76d69f
SHA5127cc7fbc6380de385834b9e80c466526f4e6f229b9c051beeb94ac94dfc916338fdd5a87819ad1226bf4aacb2a6ea0029f8702d62e71d9fbf7e61d0984ea0634c
-
Filesize
1.3MB
MD522b4524f9ce69a16273177149a97ff08
SHA191f5a2fd3f83f69c915901dd52766aec92226f65
SHA25681ccd84f933b68c3553be88c2782980837cedc7645f3676a9e72f8e5ef76d69f
SHA5127cc7fbc6380de385834b9e80c466526f4e6f229b9c051beeb94ac94dfc916338fdd5a87819ad1226bf4aacb2a6ea0029f8702d62e71d9fbf7e61d0984ea0634c
-
Filesize
3.3MB
MD58b9c0f72deaf2ee06e7441209cbe4ffb
SHA134912f3c7f4285d85497c96e95c33e5d6a597c97
SHA2561e7242ac7c025b87636e59c07e3601f1bbf5894ce0b23709405b6fefbca4dabe
SHA512db8fb980b6331f494fea8dd4adf6d8724c9ad1a7a2048c6d91e49d9e81fc83700c1195854efc5dcbe2b3aef8d94b5f0ddd7ae8910f40b9cdab017e381f855cd7