Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
387s -
max time network
389s -
platform
windows10-1703_x64 -
resource
win10-20240319-en -
resource tags
arch:x64arch:x86image:win10-20240319-enlocale:en-usos:windows10-1703-x64system -
submitted
29/03/2024, 12:26
Static task
static1
General
-
Target
danabot_sample.exe
-
Size
948KB
-
MD5
72fa468dd1c931ad5eafd8423d76639d
-
SHA1
db9de9890ac62eb8896133ab1dde66d01b3cee2d
-
SHA256
9a4e68d142593c0b68ce959f4c34bbdf477d67096eaa6db92b1577270e63c122
-
SHA512
bc3ec5c56f6253b1842e838067250aa1c3efc6ff58d1fadf1b1cd53d488fe5e11a426abc64dfc537915cd62da07f4a3e08bb31a6682eb5d2987b46ba82a34a2a
-
SSDEEP
24576:2PwCztr2dnOG8d3bS4ID4TpwkzXCD4D2ofZskmgPr:dCzIhWpIvkLCD2f1mgP
Malware Config
Extracted
danabot
5.61.58.130
2.56.213.39
5.61.56.192
Signatures
-
Danabot x86 payload 1 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
resource yara_rule behavioral1/files/0x000900000001ab2b-7.dat family_danabot -
Blocklisted process makes network request 38 IoCs
flow pid Process 1 2552 rundll32.exe 3 2552 rundll32.exe 4 2552 rundll32.exe 5 2552 rundll32.exe 8 2552 rundll32.exe 9 2552 rundll32.exe 10 2552 rundll32.exe 11 2552 rundll32.exe 12 2552 rundll32.exe 14 2552 rundll32.exe 49 2552 rundll32.exe 50 2552 rundll32.exe 51 2552 rundll32.exe 52 2552 rundll32.exe 53 2552 rundll32.exe 54 2552 rundll32.exe 55 2552 rundll32.exe 56 2552 rundll32.exe 57 2552 rundll32.exe 58 2552 rundll32.exe 59 2552 rundll32.exe 60 2552 rundll32.exe 61 2552 rundll32.exe 62 2552 rundll32.exe 63 2552 rundll32.exe 64 2552 rundll32.exe 65 2552 rundll32.exe 66 2552 rundll32.exe 67 2552 rundll32.exe 68 2552 rundll32.exe 69 2552 rundll32.exe 70 2552 rundll32.exe 71 2552 rundll32.exe 72 2552 rundll32.exe 73 2552 rundll32.exe 74 2552 rundll32.exe 75 2552 rundll32.exe 76 2552 rundll32.exe -
Loads dropped DLL 3 IoCs
pid Process 3192 regsvr32.exe 3192 regsvr32.exe 2552 rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 980 notepad.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5024 WINWORD.EXE 5024 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 5024 WINWORD.EXE 5024 WINWORD.EXE 5024 WINWORD.EXE 5024 WINWORD.EXE 5024 WINWORD.EXE 5024 WINWORD.EXE 5024 WINWORD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4264 wrote to memory of 3192 4264 danabot_sample.exe 72 PID 4264 wrote to memory of 3192 4264 danabot_sample.exe 72 PID 4264 wrote to memory of 3192 4264 danabot_sample.exe 72 PID 3192 wrote to memory of 2552 3192 regsvr32.exe 73 PID 3192 wrote to memory of 2552 3192 regsvr32.exe 73 PID 3192 wrote to memory of 2552 3192 regsvr32.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\danabot_sample.exe"C:\Users\Admin\AppData\Local\Temp\danabot_sample.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\DANABO~1.DLL f1 C:\Users\Admin\AppData\Local\Temp\DANABO~1.EXE@42642⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\DANABO~1.DLL,f03⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2552
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:68
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\Opened.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5024
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" "C:\Users\Admin\Downloads\BackupMerge.ps1"1⤵
- Opens file in notepad (likely ransom note)
PID:980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225B
MD5f184cc45cbe6f8ec72bb8e2cfc9bf359
SHA198718a5d45f587d78a4f6416db6a01ff9d8dbb44
SHA256d3e8807d2df288ff98ff781912021e3d3f852a00da47493526ee0cd7a985bbc2
SHA5123610e87638ce554e794cfef98a12f2e3b216aa58fb54f6541c91330b4e9b465f8f691fab6099de6a99c4dd6294bc4a50ff181660ea0b9e0b56a1d58ca74bfff9
-
Filesize
723KB
MD5b3c79edc14ddbdce44791450f863bb44
SHA12e047abc381ddd369d47ccf0f6e9af47c197ca3e
SHA256ca4f13f4cd01807847635d06391f88f88387a7b70c76ec2ae9b003f66f88753b
SHA5128b3ce6d0e53837fafe3c41c069b5f817de21a3177fa701f5cf650020e9328a2118afdfcc59c3a555a63cb74bde07817f3264015ff0c964a5925e6316fdef0077