Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
325s -
max time network
333s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe
Resource
win7-20220812-en
General
-
Target
221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe
-
Size
1.3MB
-
MD5
4015906016f5a97e82516c5313add3ec
-
SHA1
b5335aa1cc93ed08a37f22bef57ccb986ef862d9
-
SHA256
221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539
-
SHA512
2c8eac5f8f672b6c56430622331a4adc24a0fb18a5b6e34fd4b6a78c3712b6099e7bc770415c61b7792cdcaa4093e122e16e6475f917029aa682d80cace5908a
-
SSDEEP
24576:D/cPXh/olaaaRtNPCCBp7BwTevDaulxRA5zqT47egGoz6JqV17PFr4ah5Qrlj7:w5/4vaRtNPvBwTeb1A5+TKxj7Xl4ahC
Malware Config
Extracted
danabot
198.15.112.179:443
185.62.56.245:443
153.92.223.225:443
192.119.70.159:443
-
embedded_hash
6618C163D57D6441FCCA65D86C4D380D
-
type
loader
Signatures
-
Blocklisted process makes network request 17 IoCs
flow pid Process 3 1440 rundll32.exe 5 1440 rundll32.exe 6 1440 rundll32.exe 7 1440 rundll32.exe 10 1440 rundll32.exe 11 1440 rundll32.exe 13 1440 rundll32.exe 14 1440 rundll32.exe 15 1440 rundll32.exe 16 1440 rundll32.exe 17 1440 rundll32.exe 18 1440 rundll32.exe 19 1440 rundll32.exe 20 1440 rundll32.exe 21 1440 rundll32.exe 22 1440 rundll32.exe 23 1440 rundll32.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1696 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 27 PID 1996 wrote to memory of 1696 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 27 PID 1996 wrote to memory of 1696 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 27 PID 1996 wrote to memory of 1696 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 27 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28 PID 1996 wrote to memory of 1440 1996 221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe"C:\Users\Admin\AppData\Local\Temp\221572613439d57ea9311ef6b9e729c886cc273c9d9d73ce61f4ee8a65c44539.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\AdapterTroubleshooter.exeC:\Windows\system32\AdapterTroubleshooter.exe2⤵PID:1696
-
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:1440
-