Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 20:02 UTC

General

  • Target

    85fc00cd373580ff152c181e4ccf12f9bcd2df6a716a0952cbbf8252d6b33486.exe

  • Size

    5.9MB

  • MD5

    61f67b134cee1f90ff97aeb9230409d7

  • SHA1

    a0297a19487ef861c36485231920be809a759d13

  • SHA256

    85fc00cd373580ff152c181e4ccf12f9bcd2df6a716a0952cbbf8252d6b33486

  • SHA512

    5c037018731c5e2439a7e2105bf0bfd8fd4a61a93aa1ad26dfbecbd30c67eca62a6c5b5637793a2988ab5533a6fd83f14c80e6b6c419d0085dd77d4a313f87ee

  • SSDEEP

    98304:8GREmNruWZtR7cOjO2ep2X0IbHcgdwZ+KWZegWtvPC3nM5boKeHpGrpoVtm5G:VREQuotR4OjO2O0XM+degWs3nM5bqHpb

Malware Config

Extracted

Family

danabot

Version

1765

Botnet

3

C2

192.3.26.98:443

192.236.146.203:443

142.44.224.16:443

192.161.48.5:443

Attributes
  • embedded_hash

    B2585F6479280F48B64C99F950BBF36D

  • type

    main

rsa_pubkey.plain
1
-----BEGIN PUBLIC KEY-----
2
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDh/lNe6SSLwPc2gNhUE+iVi9dO
3
d3gIHfMzNnbEl96/p4BRjjRxB+j6kCaz2/jzEAoje4X5z/TJ2CPoqdmYFssgEq7/
4
bX2ir0VyilMqXOeL+f5JYe7Q/q2+PC29MKZnJv++5nQKH+Iss9IqF8kZ8stZfXY6
5
lOfrrkD1xZ6/PSMnuwIDAQAB
6
-----END PUBLIC KEY-----
rsa_pubkey.plain
1
-----BEGIN PUBLIC KEY-----
2
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDXE9ggBguFjDH/zGgTHPy0K3Jj
3
xO+pvrY419Sx+g8wwe6iXo1EADtloHnXef2s8Alna+pwVxyib0PiJuC7BJ1j84re
4
Zr2X8CUlvHUmDMFSNZ1S3aWE2y1bSzwNTsw/pqfM+2ICA+Im0wGGfnnaonEg2YJW
5
U+7pUNNUPlxGOtLq/QIDAQAB
6
-----END PUBLIC KEY-----

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 4 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 2 IoCs
  • Checks processor information in registry 2 TTPs 19 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85fc00cd373580ff152c181e4ccf12f9bcd2df6a716a0952cbbf8252d6b33486.exe
    "C:\Users\Admin\AppData\Local\Temp\85fc00cd373580ff152c181e4ccf12f9bcd2df6a716a0952cbbf8252d6b33486.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\85FC00~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\85FC00~1.EXE
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\SysWOW64\RUNDLL32.EXE
        C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\85FC00~1.DLL,ijhSjByrAmj4
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Drops desktop.ini file(s)
        • Checks processor information in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:2592

Network

    No results found
  • 192.3.26.98:443
    RUNDLL32.EXE
    152 B
    3
  • 192.236.146.203:443
    RUNDLL32.EXE
    152 B
    3
  • 142.44.224.16:443
    RUNDLL32.EXE
    152 B
    3
  • 192.161.48.5:443
    https
    RUNDLL32.EXE
    1.2kB
    252 B
    6
    6
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Peacock.jpg

    Filesize

    4KB

    MD5

    2c8e4b5c21697cc270c2024064c4eb93

    SHA1

    3a9b25c868cf0b2ce9503c802da78f22f689fc6b

    SHA256

    b5f9b106011e1d84aa5349ce86b76b46da8bf7c6b5c580b7da27fb97dd1688e8

    SHA512

    919b9ddf5f2b40083940e509bca9bb089919ab20d6ed1481bcd295ee0b270656c826b64c3364e2e147d6e825adcbbaa663ed23e38e897374e913cee4110b9c3d

  • C:\Users\Admin\AppData\Local\Temp\85FC00~1.DLL

    Filesize

    5.7MB

    MD5

    7daab1cfff460632833453f41925141e

    SHA1

    728b0a67930de5b86ed91b9a953d1101f45bcb7a

    SHA256

    2175991645153bed680b94b99d5666d7031a7abee2fb108d0c172de7766b88e4

    SHA512

    a0f1739e9a093554df58bb5ff38ccefb66c0fba3f2d3107c05a48dad4f3f0e1c147500394d4f1ed5ba030737ac07385eb67780729a5512ea0dd78a59622c2615

  • C:\Users\Admin\AppData\Local\Temp\apdlsak.tmp

    Filesize

    256B

    MD5

    a8eeae4ad17833fd026bb5e3acf9e0f3

    SHA1

    b3e3a03f616bc47d6e9897610ce392e011c52366

    SHA256

    ba6d35de1cbeb663a23c5644882579498d66e8798ecd4d82308e4f329b416b4e

    SHA512

    733216be59a6e6fe698bb277755a3ce31f510df67dbf64eb4852564a136faa3cbf35dea6e67ac4e0e6d9824611b5670557523440c32c680204b9b6699a3dd86e

  • memory/1940-7-0x0000000000400000-0x0000000000DDA000-memory.dmp

    Filesize

    9.9MB

  • memory/1940-4-0x0000000000400000-0x0000000000B02000-memory.dmp

    Filesize

    7.0MB

  • memory/1940-5-0x0000000000400000-0x0000000000DDA000-memory.dmp

    Filesize

    9.9MB

  • memory/1940-0-0x0000000001000000-0x00000000015BD000-memory.dmp

    Filesize

    5.7MB

  • memory/1940-3-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1940-15-0x0000000001000000-0x00000000015BD000-memory.dmp

    Filesize

    5.7MB

  • memory/1940-16-0x00000000015C0000-0x0000000001CB7000-memory.dmp

    Filesize

    7.0MB

  • memory/1940-2-0x00000000015C0000-0x0000000001CB7000-memory.dmp

    Filesize

    7.0MB

  • memory/1940-14-0x0000000000400000-0x0000000000B02000-memory.dmp

    Filesize

    7.0MB

  • memory/1940-1-0x0000000001000000-0x00000000015BD000-memory.dmp

    Filesize

    5.7MB

  • memory/2592-28-0x0000000003230000-0x0000000003892000-memory.dmp

    Filesize

    6.4MB

  • memory/2592-26-0x0000000003230000-0x0000000003892000-memory.dmp

    Filesize

    6.4MB

  • memory/2592-27-0x0000000002980000-0x0000000002981000-memory.dmp

    Filesize

    4KB

  • memory/2592-29-0x0000000003230000-0x0000000003892000-memory.dmp

    Filesize

    6.4MB

  • memory/2592-39-0x0000000003230000-0x0000000003892000-memory.dmp

    Filesize

    6.4MB

  • memory/2592-40-0x00000000023C0000-0x000000000297C000-memory.dmp

    Filesize

    5.7MB

  • memory/2592-72-0x0000000003230000-0x0000000003892000-memory.dmp

    Filesize

    6.4MB

  • memory/2592-73-0x0000000003230000-0x0000000003892000-memory.dmp

    Filesize

    6.4MB

  • memory/2796-19-0x00000000031A0000-0x0000000003802000-memory.dmp

    Filesize

    6.4MB

  • memory/2796-18-0x0000000003820000-0x0000000003821000-memory.dmp

    Filesize

    4KB

  • memory/2796-25-0x00000000031A0000-0x0000000003802000-memory.dmp

    Filesize

    6.4MB

  • memory/2796-17-0x00000000031A0000-0x0000000003802000-memory.dmp

    Filesize

    6.4MB

  • memory/2796-13-0x00000000023C0000-0x000000000297C000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.