Overview
overview
7Static
static
7Danger/Danger.exe
windows7-x64
3Danger/Danger.exe
windows10-2004-x64
3Danger/Danger.exe.lnk
windows7-x64
3Danger/Danger.exe.lnk
windows10-2004-x64
7Danger/cmdbkg.exe
windows7-x64
1Danger/cmdbkg.exe
windows10-2004-x64
1cmdbkg.exe
windows7-x64
1cmdbkg.exe
windows10-2004-x64
1makeall.bat
windows7-x64
1makeall.bat
windows10-2004-x64
1Danger/makeall.bat
windows7-x64
1Danger/makeall.bat
windows10-2004-x64
1Danger/nmap.exe
windows7-x64
4Danger/nmap.exe
windows10-2004-x64
4$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...71.exe
windows7-x64
4$PLUGINSDI...71.exe
windows10-2004-x64
4$PLUGINSDI...86.exe
windows7-x64
7$PLUGINSDI...86.exe
windows10-2004-x64
7Uninstall.exe
windows7-x64
4Uninstall.exe
windows10-2004-x64
4ncat.exe
windows7-x64
1ncat.exe
windows10-2004-x64
1ndiff.exe
windows7-x64
1ndiff.exe
windows10-2004-x64
1nmap.exe
windows7-x64
1nmap.exe
windows10-2004-x64
1nping.exe
windows7-x64
1nping.exe
windows10-2004-x64
1nse_main.js
windows7-x64
1nse_main.js
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-03-2024 12:40
Behavioral task
behavioral1
Sample
Danger/Danger.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Danger/Danger.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Danger/Danger.exe.lnk
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Danger/Danger.exe.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Danger/cmdbkg.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
Danger/cmdbkg.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
cmdbkg.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
cmdbkg.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
makeall.bat
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
makeall.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Danger/makeall.bat
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Danger/makeall.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Danger/nmap.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Danger/nmap.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/npcap-1.71.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/npcap-1.71.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/vc_redist.x86.exe
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/vc_redist.x86.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Uninstall.exe
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
Uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
ncat.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
ncat.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
ndiff.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
ndiff.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
nmap.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
nmap.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
nping.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
nping.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
nse_main.js
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
nse_main.js
Resource
win10v2004-20240226-en
General
-
Target
Danger/Danger.exe.lnk
-
Size
754B
-
MD5
3aa93f1683c12eda4052f23f41dbc3f5
-
SHA1
b7882957f4dbe44635090b03549e4caf46904f95
-
SHA256
0f910c6ab06b9a7b71bafd53fae092e83fb260f91e6b2046938aa8d3028b4d6b
-
SHA512
8ba33c3c408780b613ec2f26823383e73d316c59f9463bfa703652b1dd86e639b96c5b1d56d9c81da61ee431546216575d520b357d0bf8af686b15606255f1ac
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2428 cmdbkg.exe 2428 cmdbkg.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1192 wrote to memory of 4340 1192 cmd.exe 88 PID 1192 wrote to memory of 4340 1192 cmd.exe 88 PID 1192 wrote to memory of 4340 1192 cmd.exe 88 PID 4340 wrote to memory of 4940 4340 Danger.exe 90 PID 4340 wrote to memory of 4940 4340 Danger.exe 90 PID 4940 wrote to memory of 2908 4940 cmd.exe 92 PID 4940 wrote to memory of 2908 4940 cmd.exe 92 PID 4940 wrote to memory of 4324 4940 cmd.exe 94 PID 4940 wrote to memory of 4324 4940 cmd.exe 94 PID 4940 wrote to memory of 4324 4940 cmd.exe 94 PID 4324 wrote to memory of 2428 4324 cmdbkg.exe 95 PID 4324 wrote to memory of 2428 4324 cmdbkg.exe 95 PID 4324 wrote to memory of 2428 4324 cmdbkg.exe 95
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Danger\Danger.exe.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\Danger\Danger.exe"C:\Users\Admin\AppData\Local\Temp\Danger\Danger.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\3C8C.tmp\3C8D.tmp\3C8E.bat C:\Users\Admin\AppData\Local\Temp\Danger\Danger.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\Danger\cmdbkg.execmdbkg anon.jpg /t 30 /c /b4⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\Danger\cmdbkg.execmdbkg anon.jpg /t 30 /c /b5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52d65b6e5544d98e77b8091cd73ae1843
SHA1c4670cf1876484ab2df8059608248cec20e37152
SHA2560a8248ff4b5a2f17babd05dfc19d7f6333d1e58e9996308ae08064b90827d0a5
SHA512a40b507bf4c5b3d4a5f0eebc1c1b0d652d63dc674890caf06c389f6a1427a4ba3a22f3a62d3dd8874e0aac7aa890a31cf76198b7caa0e7d78bb150af39182943