Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
199s -
max time network
180s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12/10/2022, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe
Resource
win7-20220812-en
General
-
Target
9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe
-
Size
1.2MB
-
MD5
20414be8ceb675059f5fb9d2f656e7b9
-
SHA1
5dbd2930909ef93772b592a6fc3452ce173b1a63
-
SHA256
9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a
-
SHA512
15f78877242404125e50bcfc9989d1b906daea2a4f9feb4b067900fefe62e91eb74492938d06c123e37fa8ff46789216d2d6797c9ba4aa72161aee331c85b2d5
-
SSDEEP
24576:dXvVcG5KIkfbO8FuS/uWFYHLss1kLIM6VPdzMcGEcdoV8Kv:dXvVJPibx/rFYHwswInVPdIRRdhKv
Malware Config
Extracted
danabot
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
-
embedded_hash
F11D3871631E16E8DE15C24B32328D98
-
type
loader
Signatures
-
Program crash 3 IoCs
pid pid_target Process procid_target 1932 4240 WerFault.exe 29 3656 4240 WerFault.exe 29 1540 4240 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4240 wrote to memory of 5096 4240 9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe 67 PID 4240 wrote to memory of 5096 4240 9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe 67 PID 4240 wrote to memory of 5096 4240 9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe 67 PID 4240 wrote to memory of 4036 4240 9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe 68 PID 4240 wrote to memory of 4036 4240 9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe 68 PID 4240 wrote to memory of 4036 4240 9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe 68 PID 4240 wrote to memory of 4036 4240 9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe 68 PID 4240 wrote to memory of 4036 4240 9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe 68 PID 4240 wrote to memory of 4036 4240 9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe 68 PID 4240 wrote to memory of 4036 4240 9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe 68 PID 4240 wrote to memory of 4036 4240 9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe 68 PID 4240 wrote to memory of 4036 4240 9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe 68 PID 4240 wrote to memory of 4036 4240 9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe 68 PID 4240 wrote to memory of 4036 4240 9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe 68 PID 4240 wrote to memory of 4036 4240 9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe 68 PID 4240 wrote to memory of 4036 4240 9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe"C:\Users\Admin\AppData\Local\Temp\9e2e09592af42e6493216ccfa7b4c8d9e6a09249082edfdbdcd293cb5a8f1e9a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\appidtel.exeC:\Windows\system32\appidtel.exe2⤵PID:5096
-
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵PID:4036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 6322⤵
- Program crash
PID:1932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 6202⤵
- Program crash
PID:3656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 6882⤵
- Program crash
PID:1540
-