Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    387s
  • max time network
    389s
  • platform
    windows10-1703_x64
  • resource
    win10-20240319-en
  • resource tags

    arch:x64arch:x86image:win10-20240319-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29/03/2024, 12:26

General

  • Target

    danabot_sample.exe

  • Size

    948KB

  • MD5

    72fa468dd1c931ad5eafd8423d76639d

  • SHA1

    db9de9890ac62eb8896133ab1dde66d01b3cee2d

  • SHA256

    9a4e68d142593c0b68ce959f4c34bbdf477d67096eaa6db92b1577270e63c122

  • SHA512

    bc3ec5c56f6253b1842e838067250aa1c3efc6ff58d1fadf1b1cd53d488fe5e11a426abc64dfc537915cd62da07f4a3e08bb31a6682eb5d2987b46ba82a34a2a

  • SSDEEP

    24576:2PwCztr2dnOG8d3bS4ID4TpwkzXCD4D2ofZskmgPr:dCzIhWpIvkLCD2f1mgP

Malware Config

Extracted

Family

danabot

C2

5.61.58.130

2.56.213.39

5.61.56.192

rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot x86 payload 1 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

  • Blocklisted process makes network request 38 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\danabot_sample.exe
    "C:\Users\Admin\AppData\Local\Temp\danabot_sample.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4264
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\DANABO~1.DLL f1 C:\Users\Admin\AppData\Local\Temp\DANABO~1.EXE@4264
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3192
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\DANABO~1.DLL,f0
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        PID:2552
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:68
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\Opened.docx" /o ""
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:5024
    • C:\Windows\System32\notepad.exe
      "C:\Windows\System32\notepad.exe" "C:\Users\Admin\Downloads\BackupMerge.ps1"
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:980

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      225B

      MD5

      f184cc45cbe6f8ec72bb8e2cfc9bf359

      SHA1

      98718a5d45f587d78a4f6416db6a01ff9d8dbb44

      SHA256

      d3e8807d2df288ff98ff781912021e3d3f852a00da47493526ee0cd7a985bbc2

      SHA512

      3610e87638ce554e794cfef98a12f2e3b216aa58fb54f6541c91330b4e9b465f8f691fab6099de6a99c4dd6294bc4a50ff181660ea0b9e0b56a1d58ca74bfff9

    • \Users\Admin\AppData\Local\Temp\DANABO~1.DLL

      Filesize

      723KB

      MD5

      b3c79edc14ddbdce44791450f863bb44

      SHA1

      2e047abc381ddd369d47ccf0f6e9af47c197ca3e

      SHA256

      ca4f13f4cd01807847635d06391f88f88387a7b70c76ec2ae9b003f66f88753b

      SHA512

      8b3ce6d0e53837fafe3c41c069b5f817de21a3177fa701f5cf650020e9328a2118afdfcc59c3a555a63cb74bde07817f3264015ff0c964a5925e6316fdef0077

    • memory/2552-14-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2552-316-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2552-318-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2552-319-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2552-12-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/3192-9-0x00000000028C0000-0x0000000002982000-memory.dmp

      Filesize

      776KB

    • memory/4264-5-0x0000000000400000-0x0000000002E67000-memory.dmp

      Filesize

      42.4MB

    • memory/4264-10-0x0000000003500000-0x00000000035E1000-memory.dmp

      Filesize

      900KB

    • memory/4264-1-0x00000000033B0000-0x0000000003483000-memory.dmp

      Filesize

      844KB

    • memory/4264-3-0x0000000000400000-0x0000000002E67000-memory.dmp

      Filesize

      42.4MB

    • memory/4264-2-0x0000000003500000-0x00000000035E1000-memory.dmp

      Filesize

      900KB

    • memory/5024-32-0x00007FFC14150000-0x00007FFC1432B000-memory.dmp

      Filesize

      1.9MB

    • memory/5024-38-0x00007FFBD0A10000-0x00007FFBD0A20000-memory.dmp

      Filesize

      64KB

    • memory/5024-24-0x00007FFC13670000-0x00007FFC1371E000-memory.dmp

      Filesize

      696KB

    • memory/5024-26-0x00007FFC14150000-0x00007FFC1432B000-memory.dmp

      Filesize

      1.9MB

    • memory/5024-27-0x00007FFC14150000-0x00007FFC1432B000-memory.dmp

      Filesize

      1.9MB

    • memory/5024-28-0x00007FFC14150000-0x00007FFC1432B000-memory.dmp

      Filesize

      1.9MB

    • memory/5024-30-0x00007FFC14150000-0x00007FFC1432B000-memory.dmp

      Filesize

      1.9MB

    • memory/5024-23-0x00007FFBD41E0000-0x00007FFBD41F0000-memory.dmp

      Filesize

      64KB

    • memory/5024-33-0x00007FFC13670000-0x00007FFC1371E000-memory.dmp

      Filesize

      696KB

    • memory/5024-34-0x00007FFC13670000-0x00007FFC1371E000-memory.dmp

      Filesize

      696KB

    • memory/5024-35-0x00007FFC14150000-0x00007FFC1432B000-memory.dmp

      Filesize

      1.9MB

    • memory/5024-36-0x00007FFBD0A10000-0x00007FFBD0A20000-memory.dmp

      Filesize

      64KB

    • memory/5024-37-0x00007FFC14150000-0x00007FFC1432B000-memory.dmp

      Filesize

      1.9MB

    • memory/5024-25-0x00007FFBD41E0000-0x00007FFBD41F0000-memory.dmp

      Filesize

      64KB

    • memory/5024-21-0x00007FFBD41E0000-0x00007FFBD41F0000-memory.dmp

      Filesize

      64KB

    • memory/5024-285-0x00007FFC13670000-0x00007FFC1371E000-memory.dmp

      Filesize

      696KB

    • memory/5024-287-0x00007FFC13670000-0x00007FFC1371E000-memory.dmp

      Filesize

      696KB

    • memory/5024-288-0x00007FFBD41E0000-0x00007FFBD41F0000-memory.dmp

      Filesize

      64KB

    • memory/5024-289-0x00007FFC14150000-0x00007FFC1432B000-memory.dmp

      Filesize

      1.9MB

    • memory/5024-286-0x00007FFBD41E0000-0x00007FFBD41F0000-memory.dmp

      Filesize

      64KB

    • memory/5024-284-0x00007FFBD41E0000-0x00007FFBD41F0000-memory.dmp

      Filesize

      64KB

    • memory/5024-283-0x00007FFBD41E0000-0x00007FFBD41F0000-memory.dmp

      Filesize

      64KB

    • memory/5024-290-0x00007FFC14150000-0x00007FFC1432B000-memory.dmp

      Filesize

      1.9MB

    • memory/5024-291-0x00007FFC13670000-0x00007FFC1371E000-memory.dmp

      Filesize

      696KB

    • memory/5024-22-0x00007FFC14150000-0x00007FFC1432B000-memory.dmp

      Filesize

      1.9MB

    • memory/5024-19-0x00007FFBD41E0000-0x00007FFBD41F0000-memory.dmp

      Filesize

      64KB

    • memory/5024-20-0x00007FFC14150000-0x00007FFC1432B000-memory.dmp

      Filesize

      1.9MB