Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    154s
  • max time network
    155s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/10/2022, 00:52

General

  • Target

    8905f89f62de1843087ede5f6aa2d409f97322e0062b9fd86a5d0ecf4b66dc61.exe

  • Size

    274KB

  • MD5

    1b5d8a4ba40a71fd2c0db8c86c01b67d

  • SHA1

    741ff872a93d6c13871f3ad8838d12df6f44a65b

  • SHA256

    8905f89f62de1843087ede5f6aa2d409f97322e0062b9fd86a5d0ecf4b66dc61

  • SHA512

    04a26ebb1169d6f147e2206f5df356c11157d29fab2da7f7e136ea35d3e8a8445ff78b7e33e4402282e6fe3e20f55182f5522b9245caa8883e818944bf0ebacf

  • SSDEEP

    6144:sy7kDXlir/t1l6aeoRNIy3/irwVfquS/:TilS1g3oRO0/id

Score
10/10

Malware Config

Extracted

Family

danabot

C2

192.236.233.188:443

192.119.70.159:443

23.106.124.171:443

213.227.155.103:443

49.0.50.0:57

51.0.52.0:0

53.0.54.0:1200

55.0.56.0:65535

Attributes
  • embedded_hash

    56951C922035D696BFCE443750496462

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 40 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8905f89f62de1843087ede5f6aa2d409f97322e0062b9fd86a5d0ecf4b66dc61.exe
    "C:\Users\Admin\AppData\Local\Temp\8905f89f62de1843087ede5f6aa2d409f97322e0062b9fd86a5d0ecf4b66dc61.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1828
  • C:\Users\Admin\AppData\Local\Temp\665B.exe
    C:\Users\Admin\AppData\Local\Temp\665B.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Windows\SysWOW64\appidtel.exe
      C:\Windows\system32\appidtel.exe
      2⤵
        PID:4196
      • C:\Windows\syswow64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Blocklisted process makes network request
        PID:5116
      • C:\Windows\syswow64\rundll32.exe
        "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
        2⤵
        • Checks processor information in registry
        PID:1984

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\665B.exe

      Filesize

      1.3MB

      MD5

      22b4524f9ce69a16273177149a97ff08

      SHA1

      91f5a2fd3f83f69c915901dd52766aec92226f65

      SHA256

      81ccd84f933b68c3553be88c2782980837cedc7645f3676a9e72f8e5ef76d69f

      SHA512

      7cc7fbc6380de385834b9e80c466526f4e6f229b9c051beeb94ac94dfc916338fdd5a87819ad1226bf4aacb2a6ea0029f8702d62e71d9fbf7e61d0984ea0634c

    • C:\Users\Admin\AppData\Local\Temp\665B.exe

      Filesize

      1.3MB

      MD5

      22b4524f9ce69a16273177149a97ff08

      SHA1

      91f5a2fd3f83f69c915901dd52766aec92226f65

      SHA256

      81ccd84f933b68c3553be88c2782980837cedc7645f3676a9e72f8e5ef76d69f

      SHA512

      7cc7fbc6380de385834b9e80c466526f4e6f229b9c051beeb94ac94dfc916338fdd5a87819ad1226bf4aacb2a6ea0029f8702d62e71d9fbf7e61d0984ea0634c

    • C:\Users\Admin\AppData\Local\Temp\Sepawuaopqtypsq.tmp

      Filesize

      3.3MB

      MD5

      8b9c0f72deaf2ee06e7441209cbe4ffb

      SHA1

      34912f3c7f4285d85497c96e95c33e5d6a597c97

      SHA256

      1e7242ac7c025b87636e59c07e3601f1bbf5894ce0b23709405b6fefbca4dabe

      SHA512

      db8fb980b6331f494fea8dd4adf6d8724c9ad1a7a2048c6d91e49d9e81fc83700c1195854efc5dcbe2b3aef8d94b5f0ddd7ae8910f40b9cdab017e381f855cd7

    • memory/1828-120-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-121-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-122-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-123-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-124-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-125-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-126-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-127-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-128-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-129-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-130-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-131-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-132-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-133-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-134-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-135-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-136-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-137-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-138-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-139-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-140-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-141-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-142-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-143-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-145-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-146-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-147-0x0000000000450000-0x00000000004FE000-memory.dmp

      Filesize

      696KB

    • memory/1828-148-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-149-0x0000000000450000-0x00000000004FE000-memory.dmp

      Filesize

      696KB

    • memory/1828-150-0x0000000000400000-0x000000000044A000-memory.dmp

      Filesize

      296KB

    • memory/1828-151-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-152-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-153-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-155-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-154-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-156-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-157-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/1828-158-0x0000000000400000-0x000000000044A000-memory.dmp

      Filesize

      296KB

    • memory/1984-415-0x0000000002C50000-0x00000000035F4000-memory.dmp

      Filesize

      9.6MB

    • memory/1984-411-0x0000000004EE0000-0x00000000059A3000-memory.dmp

      Filesize

      10.8MB

    • memory/3032-167-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-192-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-165-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-166-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-163-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-169-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-170-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-171-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-172-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-174-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-173-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-175-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-176-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-177-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-178-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-179-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-180-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-181-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-182-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-183-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-184-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-185-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-187-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-188-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-189-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-190-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-191-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-164-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-193-0x00000000024B0000-0x00000000025DC000-memory.dmp

      Filesize

      1.2MB

    • memory/3032-194-0x00000000025E0000-0x00000000028A2000-memory.dmp

      Filesize

      2.8MB

    • memory/3032-195-0x0000000000400000-0x00000000006CE000-memory.dmp

      Filesize

      2.8MB

    • memory/3032-208-0x00000000024B0000-0x00000000025DC000-memory.dmp

      Filesize

      1.2MB

    • memory/3032-209-0x0000000000400000-0x00000000006CE000-memory.dmp

      Filesize

      2.8MB

    • memory/3032-211-0x0000000000400000-0x00000000006CE000-memory.dmp

      Filesize

      2.8MB

    • memory/3032-286-0x0000000000400000-0x00000000006CE000-memory.dmp

      Filesize

      2.8MB

    • memory/3032-414-0x0000000002F20000-0x00000000039E3000-memory.dmp

      Filesize

      10.8MB

    • memory/3032-161-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-410-0x0000000000400000-0x00000000006CE000-memory.dmp

      Filesize

      2.8MB

    • memory/3032-162-0x0000000077390000-0x000000007751E000-memory.dmp

      Filesize

      1.6MB

    • memory/3032-338-0x0000000002F20000-0x00000000039E3000-memory.dmp

      Filesize

      10.8MB

    • memory/5116-284-0x0000000003110000-0x0000000003113000-memory.dmp

      Filesize

      12KB

    • memory/5116-280-0x00000000030D0000-0x00000000030D3000-memory.dmp

      Filesize

      12KB

    • memory/5116-281-0x00000000030E0000-0x00000000030E3000-memory.dmp

      Filesize

      12KB

    • memory/5116-282-0x00000000030F0000-0x00000000030F3000-memory.dmp

      Filesize

      12KB

    • memory/5116-283-0x0000000003100000-0x0000000003103000-memory.dmp

      Filesize

      12KB

    • memory/5116-278-0x00000000030B0000-0x00000000030B3000-memory.dmp

      Filesize

      12KB

    • memory/5116-277-0x00000000030A0000-0x00000000030A3000-memory.dmp

      Filesize

      12KB

    • memory/5116-276-0x0000000003090000-0x0000000003093000-memory.dmp

      Filesize

      12KB

    • memory/5116-275-0x0000000003080000-0x0000000003083000-memory.dmp

      Filesize

      12KB

    • memory/5116-272-0x0000000003070000-0x0000000003073000-memory.dmp

      Filesize

      12KB

    • memory/5116-279-0x00000000030C0000-0x00000000030C3000-memory.dmp

      Filesize

      12KB

    • memory/5116-317-0x0000000003110000-0x0000000003113000-memory.dmp

      Filesize

      12KB