Analysis

  • max time kernel
    120s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-03-2024 12:40

General

  • Target

    Danger/Danger.exe

  • Size

    93KB

  • MD5

    5bbe037d7194508d83c28a01bf2dcf85

  • SHA1

    ef36d69adb37bcb057e2b8982d0155cb147703a7

  • SHA256

    237e4dba5a854dbc405369faa5290c2c5e238eebe9a78da1ab61e07332a44e22

  • SHA512

    d00532b03a998d42f2f80bf9c5cf51fce4af14eb22501f25fb24061a9589ab4efcb2a7977317197fbda3f313d738b889f17c43147dbc16322f08662b153ca4e3

  • SSDEEP

    1536:37fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfew9/gOm:r7DhdC6kzWypvaQ0FxyNTBfe+i

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Danger\Danger.exe
    "C:\Users\Admin\AppData\Local\Temp\Danger\Danger.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\454A.tmp\454B.tmp\454C.bat C:\Users\Admin\AppData\Local\Temp\Danger\Danger.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2024
        • C:\Users\Admin\AppData\Local\Temp\Danger\cmdbkg.exe
          cmdbkg anon.jpg /t 30 /c /b
          3⤵
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:1704
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://check-host.net/
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2560
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      67KB

      MD5

      753df6889fd7410a2e9fe333da83a429

      SHA1

      3c425f16e8267186061dd48ac1c77c122962456e

      SHA256

      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

      SHA512

      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e2b9766c1983c9fc6129b24a8416d8c1

      SHA1

      b157c78d5885c44079c25cae6f396e34464bc5c3

      SHA256

      350a2ec7abe947c9116fd06525ad319259a45605f43aad81d31bf2d389e1efef

      SHA512

      600a390330ad0dcc9d7cfc78585a5b8902fac334bcdeee3a45b05539475e70ab3753c8c9445da5b1c821beec8a7fa31f09574d0fa7828d4618a1c853375a5fb7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      05c5d5cc9fc613e71f100e27ac2a9bd4

      SHA1

      8e554bcfab8ff9f618d41219089725626a22d39e

      SHA256

      f839a21d71de98eb0d18fd78344223027d152ebed78ce3b2b0fee23a63b2eac8

      SHA512

      41472f67dcc3168c5657275b0eeca7c4eec7832a845a4003b8751ec319c2a03cb68d68bc8edcc82ca18cd2183ae525338d8072d1223c7ba35d1a862af3f8cae7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c0c9bd9d63abb4d8dc188c1a02cfe014

      SHA1

      a926041411ba5e9f30e2f1396ebbe36bc644c097

      SHA256

      0852a00b8cbe34c0342948b20ad531770ac049f28deebee5cc7b05141873bcc4

      SHA512

      ee24bb1fa7dcffef3936c2686a3afb06bcb48409ab8c2bb0e58bef5ee38fe23c96f0252776939b329585070a3cca6fa31955409a8d06bae4ea16b761756ff20e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9f78c5e3e54ed684f2488ec3cbd06671

      SHA1

      b68c23361fe15dccaff3f58a4e48233c7940f64d

      SHA256

      5f68605ef01a07c890fe303eeb9bde342f93d0d60037645164248b6a9881a4f7

      SHA512

      3ffb07df2b2ad9e7c1790b8a3e011b180665204e328664b31dc685cdd4b98bc96b3386d0b0790e36d5dccced4dff1d6b5787759396b0d570e091105966c5402d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      bfbac9284fecae3048b3257332b8910b

      SHA1

      055a833abd3d4af92a3c4087f0bfbb4ea47491be

      SHA256

      af59dfcb83e4e3bf379dafd96037e7978f21ac63da705a8f365ade9e6c1e301a

      SHA512

      327f3d6feaa668fee7c9f3ef82137a0cd34f1d3c4f7e6c218b2a8d10960c2fccd5849bc5520f0a270722519a8ee87495e6d5773194e38f7e2f5960f046e2d41c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      35e7f31b969fe7e7fe83a771761df5b3

      SHA1

      1d3a36a376dcf77c15d316f631b7dd6cc0ac26a2

      SHA256

      b4639080523bccc7b599ed18c5dcff5e6774fac83fcfcf4e45521d2abe8ec829

      SHA512

      d54bfc0f86226cef4496c437f5eca503c9f9655c54ee68eb47e07962539d74144c50ec112ef0886c94d3687d47ad5b03a4eb5884b75bcab30a4fc5bd1d9de696

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7095941a8211a4bbec3b8756d6fc9b50

      SHA1

      aaf41fa0a1ac7a6a967ecdd03ef7a6bc615a937e

      SHA256

      1421d5275eb6d2d66152145941a4e2331db1b030427b8e17f6c3c9331e622ac4

      SHA512

      301c7aa45b551cc067a868a28a2dc74821917e4d95fe2cb376157bd02dce6104a68f26c277c0ebdd4f877163bc246a194b19d20ec0d365906827b88aec3afddc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c1655d2daf02edf2a9fe01b4a6432e2b

      SHA1

      b7d2647f3870b003e9ea366f1dc41e6d3760dde3

      SHA256

      cf97d02173c5bc419f0305a71d8bdfc095724b507600646ad959d5fd6294a5cd

      SHA512

      5c63ca958a59d0f6719e6721cdc218b19ffc2ef3192582fdc3d4f96f8bd981262fa2f9ca9d992181f7982f638d03730c426c8b1739b6c05c93987deaf274f90c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0b51ff0d5aaf286b24f1daa41e486190

      SHA1

      19e9e4917e4e0d6b66c163e0409cc69c1f3192bb

      SHA256

      1693140d3066e7a54a53a20bee50e9503f16394691cb59aef0077695393cd7c4

      SHA512

      1c2fe4e97cfd999147b2ab9e7dc714f18068cce1dec29c0b0b44a97715aa5c138ef89ad919f08be5993a55622e92816ff7f740d335124cf8dfadc4df853db22c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4fbe4b364cbdf910f2c3b5980c08e69c

      SHA1

      d121263cf0084d48ae8c6497bd4c725da5e640ec

      SHA256

      7c2c1c096906f81cf0330a688f799b6ae5a0d586fa56dd2dd16943d33025d8dd

      SHA512

      bd473307940bf227a8d712ad33d5236658f255084ca9daadd1f0c5950151688936f971877237024e5f3a52d2c7610ac7dd453515e12f208281d43c72feff5472

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4b05ba0efa0a51b01e59874ef36c74c3

      SHA1

      1eb9db492aed1904b3641c1ef294685b7392fed6

      SHA256

      0c73d83057df93aa0d9c114d9da9e51dd21466864f82058000d90b80e1edd09c

      SHA512

      85e7e611d9e19b61e9d5cd33aed653da2fdb90b2a298e5b513f66bc0d9983471c719ce5733c2a2beac18cc431e7be7c8606652c280d729f0a96c3eb8becb89eb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9b87a6fc0f913f697d07601274ece19a

      SHA1

      414af7b3b33b68bde65eec0d778a0063847b4206

      SHA256

      eeeb67a2ca938454d7007e356f82593c3e83e86e5528e163f1cbc345af166019

      SHA512

      1b7306698c7f8e308fb6761aaf5a9bda6a6800c474c427ac5e155d69b22e352464610507b3d257bddc69a27dcc4b8bc0bdeb7b5266c3d3bd549f58d768d6dbb8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8f04e5a6f44f6cc7004c028913969fcb

      SHA1

      a2edd11b250cebf61811ff9bd53ae6fcbccbb720

      SHA256

      48c3ea03d369c4fe8524da0900c84c6208f08e81deed2d927d2b8b7c76c0099d

      SHA512

      ce65b24a7c7c26b85a5e5b6ad942116b2585a37ff83f1b18c0c048f316617f3af0214a7391fb3bc4dbdc5541f8052276ead802423c976f51dd0d1bd736dac9b8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      aafe1d3040d5611e72e8e07790f24dab

      SHA1

      b0af23cd164f6c4483923f52b584ee28680cfdd8

      SHA256

      c14592a481b8c494b775f52d79c99e9356a502e2f900e901dc6660cfc066c8f2

      SHA512

      00fb76267c2652734e9016bcccb8b25e9e09aa50c9a0ca658c82eff8733bdf7775de57e089763cfe082f5c3f370af52a2eed150bebf159bfb6c7b272f5a40d3a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      481d0b9ad7e650dd031ac0e64f0fabd5

      SHA1

      0a449a2e44a63abf7a7f2cb999c55fc4922d192b

      SHA256

      c5489e9010fbaa6278581db4506719277fc54cad7a13c867d716d9af17134bcb

      SHA512

      b94715bae389ef3c6b8fc0b1eeda56210c0c566d37651db238653754930bdcec8c03d6ca5999d94d1de4d6af3f709215d8642ea68b03ef605aa57be7e723029f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      442560913428f71a74fe101c77cd6c3a

      SHA1

      1eaa57aad873b5802539ba26ea8ec1a194707703

      SHA256

      1035f0d3a8426158e4a8491bdd1af3750962c13d26ca841565a45c69f31dc6f6

      SHA512

      65fb9936bd09a6885c7a4fd568f1999c4dff6d8c002b2299edb93eeb27b66ec01aeaaa5d492d4f0d7c95290d3f31fb545a7092cb0d83c691bb6ce3c57e69ec87

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b9685f7f66c71acb46dd7e7672dd33c7

      SHA1

      b3720b0e3a49ef0b809ab84f1bdf4e20c6a52b4c

      SHA256

      640abe6bfb67be165261f57b80901aec1290dcf94af41f346a513b60d3d143b8

      SHA512

      1a89c1b61be476b2ce3d514e0496bdc30df700da8719b1a2a5e05e989135cc850cd9318d34505004641c83b87a7024f27c30fe8a10c3bc418fea903650e8d29c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      25937fe92409307784a0e159d45c3800

      SHA1

      960c7f8adf1b5ca89086c0b265c9db0869bebe6b

      SHA256

      5a918327053186d5ee357d4fd5fa47ebf80cf3b1b20afb76e3587deec1f478bf

      SHA512

      0f1ec0f755ab5f275ef09be5b601a0c64007f91dd3eba63fa1759e9cb148c02f8ff1e4ddba8fac5f645c502cfb560b748eac060a9d22da7da26c4e91b1d481d6

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\jq7rho9\imagestore.dat

      Filesize

      1KB

      MD5

      dad3d2999dc2fcb9dbc4b75a0d0bc4b3

      SHA1

      a3391b61f3b22ab1d1c67be49f38022c32e82eb9

      SHA256

      7eb6edaeb98905d8e15d06818c8a257c69f3420974b8692d4a2d0510dc0cdc1a

      SHA512

      b3b47dfde5e5d627837694bb2cad805602c4f25b7472daa06778f465d27cc85e69a51deed31bf4b24419049eeda6a7372fcc5da1a87b9ff819797c3a80974da5

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OFFQJ7AH\checkhost-favicon[1].png

      Filesize

      1KB

      MD5

      c28aac98c815e7a9934ddebbb6d6a5fc

      SHA1

      fa8b19b7c923a0fbf145689772ebfe3ed335264d

      SHA256

      81d434246aa6e50699af645bb1789633205f8d18d8ece576e25c24b988e39c25

      SHA512

      6c5f7d5ea2a42d00b757b2f7ba33c01ced1d531ca1f565546bfb8982d0d7aade945d4068b4f8ca9a37d6e77c8d4f44ce7514903b657f00be14c12447ca44bc5e

    • C:\Users\Admin\AppData\Local\Temp\454A.tmp\454B.tmp\454C.bat

      Filesize

      2KB

      MD5

      2d65b6e5544d98e77b8091cd73ae1843

      SHA1

      c4670cf1876484ab2df8059608248cec20e37152

      SHA256

      0a8248ff4b5a2f17babd05dfc19d7f6333d1e58e9996308ae08064b90827d0a5

      SHA512

      a40b507bf4c5b3d4a5f0eebc1c1b0d652d63dc674890caf06c389f6a1427a4ba3a22f3a62d3dd8874e0aac7aa890a31cf76198b7caa0e7d78bb150af39182943

    • C:\Users\Admin\AppData\Local\Temp\Cab7CE0.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar7D10.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\Tar7F19.tmp

      Filesize

      175KB

      MD5

      dd73cead4b93366cf3465c8cd32e2796

      SHA1

      74546226dfe9ceb8184651e920d1dbfb432b314e

      SHA256

      a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

      SHA512

      ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

    • memory/1704-2-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB